[c-nsp] 6500 12.2SX* Port-Channel Private VLAN support
Collins, Richard (SNL US)
richard.1.collins.ext at nsn.com
Wed Oct 24 11:25:30 EDT 2007
I tried testing this with a 2 trunk etherchannel between two switches.
Host1 and Host2 connected to SW1 (3560)
Host3 connected to SW2 (3560)
I used the secondary VLAN 400 as community for all these hosts.
I found I could create a vlan filter list on SW2 which blocked Host1 <>
Host3
but allowed Host2 <> Host3. Without the filter both Host1 and Host2
could
communicate with Host3. Host3 ip address 10.10.40.100
Switch1 and SWitch2#sh run
!
version 12.2
vtp mode transparent
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
vlan 44
private-vlan primary
private-vlan association 400
!
!
vlan 400
private-vlan community
!
interface Port-channel1
switchport trunk encapsulation dot1q
switchport mode dynamic desirable
!
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode dynamic desirable
channel-group 1 mode desirable
!
interface GigabitEthernet0/2
switchport trunk encapsulation dot1q
switchport mode dynamic desirable
channel-group 1 mode desirable
!
!
interface GigabitEthernet0/23 (Host1 SW1)
switchport private-vlan host-association 44 400
switchport mode private-vlan host
!
interface GigabitEthernet0/24 (Host2 SW1 or Host3 SW2)
switchport private-vlan host-association 44 400
switchport mode private-vlan host
!
end
Switch2#ip access-list extended VACL
permit ip host 10.10.40.100 any
permit ip any host 10.10.40.100
vlan access-map VACL 10
action forward
match ip address VACL
vlan filter VACL vlan-list 400
-Rich
>
>Having a hard time figuring out if this is supported:
>
>6500 12.2SX*, secondary VLANs mapped to primary VLAN, on top of a
port-channel.
>
>The docs make it look like private VLANs and port-channels are
>mutually exclusive, but I can't see why that would be the case.
>
>What I want to achieve is a group of VLANs on a port-channel, all
>sharing the same IP network. Private VLANs look like the way to do
>this. I can then apply ACLs on the secondary VLANs at the downstream
>access switch.
>
>If I could apply regular ACLs to a secondary VLAN this could be much
simpler.
>
>Tim:>
More information about the cisco-nsp
mailing list