Inspecting The Private Vlan Configuration - Dell Force10 Z9000 Configuration Manual

Hide thumbs Also See for Force10 Z9000:
Table of Contents

Advertisement

The following configuration is based on the example diagram for the Z9500:
Te 1/1 and Te 1/23 are configured as promiscuous ports, assigned to the primary VLAN, VLAN 4000.
Te 1/25 is configured as a PVLAN trunk port, also assigned to the primary VLAN 4000.
Te 1/24 and Te 1/47 are configured as host ports and assigned to the isolated VLAN, VLAN 4003.
Te 4/1 and Te 23 are configured as host ports and assigned to the community VLAN, VLAN 4001.
Te 4/24 and Te 4/47 are configured as host ports and assigned to community VLAN 4002.
The result is that:
The ports in community VLAN 4001 can communicate directly with each other and with promiscuous ports.
The ports in community VLAN 4002 can communicate directly with each other and with promiscuous ports.
The ports in isolated VLAN 4003 can only communicate with the promiscuous ports in the primary VLAN 4000.
All the ports in the secondary VLANs (both community and isolated VLANs) can only communicate with ports in the other
secondary VLANs of that PVLAN over Layer 3, and only when the ip local-proxy-arp command is invoked in the primary
VLAN.
NOTE: Even after you disable ip-local-proxy-arp (no ip-local-proxy-arp) in a secondary VLAN, Layer 3
communication may happen between some secondary VLAN hosts, until the ARP timeout happens on those secondary
VLAN hosts.
In parallel, on S4810:
Te 1/3 is a promiscuous port and Te 1/25 is a PVLAN trunk port, assigned to the primary VLAN 4000.
Te 1/4-6 are host ports. Te 1/4 and Te 1/5 are assigned to the community VLAN 4001, while Te 1/6 is assigned to the isolated
VLAN 4003.
The result is that:
The S4810 ports would have the same intra-switch communication characteristics as described for the Z9500.
For transmission between switches, tagged packets originating from host PVLAN ports in one secondary VLAN and destined for
host PVLAN ports in the other switch travel through the promiscuous ports in the local VLAN 4000 and then through the trunk
ports (1/25 in each switch).

Inspecting the Private VLAN Configuration

The standard methods of inspecting configurations also apply in PVLANs.
To inspect your PVLAN configurations, use the following commands.
Display the specific interface configuration.
INTERFACE mode and INTERFACE VLAN mode
show config
Inspect the running-config, and, with the grep pipe option, display a specific part of the running-config.
show running-config | grep string
The following example shows the PVLAN parts of the running-config from the S50V switch in the topology diagram previously
shown.
Display the type and status of the configured PVLAN interfaces.
show interfaces private-vlan [interface interface]
This command is specific to the PVLAN feature.
For more information, refer to the Security chapter in the Dell Networking OS Command Line Reference Guide.
Display the configured PVLANs or interfaces that are part of a PVLAN.
show vlan private-vlan [community | interface | isolated | primary | primary_vlan |
interface interface]
Private VLANs (PVLAN)
565

Advertisement

Table of Contents
loading

Table of Contents