Overview; Vlans; Private Vlans; C H A P T E - Cisco Nexus 3000 series Configuration Manual

Nx-os layer 2
Hide thumbs Also See for Nexus 3000 series:
Table of Contents

Advertisement

Overview

Cisco Nexus 3000 Series switches support the Layer 2 features that are described in this guide.

VLANs

A VLAN is a switched network that is logically segmented by function, project team, or application, without
regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can
group end stations even if they are not physically located on the same LAN segment.
Any switch port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and
flooded only to end stations in that VLAN. Each VLAN is considered as a logical network, and packets
destined for stations that do not belong to the VLAN must be forwarded through a bridge or a router.
All ports, including the management port, are assigned to the default VLAN (VLAN1) when the device first
comes up. A VLAN interface, or switched virtual interface (SVI), is a Layer 3 interface that is created to
provide communication between VLANs.
Inter-Switch Link (ISL) trunking is not supported on the NX-OS software for the Cisco Nexus 3000 Series.
Note

Private VLANs

Private VLANs provide traffic separation and security at the Layer 2 level.
A private VLAN is one or more pairs of a primary VLAN and a secondary VLAN, all with the same primary
VLAN. The two types of secondary VLANs are isolated and community VLANs. Hosts on isolated VLANs
communicate only with hosts in the primary VLAN. Hosts in a community VLAN can communicate only
among themselves and with hosts in the primary VLAN but not with hosts in isolated VLANs or in other
community VLANs.
VLANs, page 1
Private VLANs, page 1
Spanning Tree , page 2
Cisco Nexus 3000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)U1(1)
1
C H A P T E R
1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents