04-08-2025 07:53 AM
Hello team,
I have been searching for a document that indicates the information I need and I have not find it so I believe may find something from your knowledge as well.
I have an FTD that is managed by a FMC.
The FTD has a physical interface that has some VLANs subinterfaces underneath and it is connected to a switch with the the same vlans on its trunk.
Let's suppose that the subnet I am interested is 10.10.10.0/24 and it is vlan 2.
Right now whoever wants to find 10.10.10.0/24 goes to the ASA and it sees that the vlan is directly connected so it forwards the traffic.
The question I have is that, if I go on the trunk port of the switch and remove vlan 2, will the FTD understand this change and the vlan will go down from its side as well, so the traffic to 10.10.10.0/24 will be forwarded to the default route or it will continue to forward the traffic to the interface gig1/1.2?
Solved! Go to Solution.
04-09-2025 07:14 AM
Perhaps you can try and confirm this by creating a new sub-interface, give it an IP and allow the vlan on the trunk. Then prune it and observe the behavior
Thank you for rating helpful posts!
04-09-2025 09:22 AM
By default all sub-interfaces simply follow the state of the physical interface. So if you prune a vlan on the trunk at the switch, the sub-interface at the firewall will remain UP. All frames with or without tag arrive at the physical interface and based on the tag they will then be handled by the corresponding sub-interface as required. So how should the firewall notice that it will no longer receive tagged frames for that vlan?
Things do change if you start using tools like IP SLA or BFD to track the reachability of the neighbor.
Otherwise the firewall will continue to send traffic out of the sub-interface and the switch will drop it as the vlan is pruned.
You can also check whether your firewall allows you to seperately shutdown sub-interfaces, preferably with a newly created one.
HTH!
04-08-2025 07:35 PM
Removing the VLAN from the trunk will cause the VLAN to be "pruned" from that trunk. As a result, no traffic for that VLAN will be allowed to transit the trunk port. However, I am not sure I understand your question
"will the FTD understand this change and the vlan will go down from its side as well, so the traffic to 10.10.10.0/24 will be forwarded to the default route or it will continue to forward the traffic to the interface gig1/1.2?"
So I will have to answer your question with a question
I hope this helps!
Thank you for rating helpful posts!
04-09-2025 12:20 AM
Hello and thank you for your response.
What I am trying to do is move the gateway for this subnet and I do not want to wait for the FMC to deploy the deletion of the interface because it takes over 4 minutes.
The way I have it in my mind is that for a router if I had the same topology, if I removed the VLAN from the trunk of the switch the SVI would be in UP/DOWN state so most probably if traffic towards the subnet 10.10.10.0/24 reached the router it would most forward it to the default route since it will not recognize it as a directly connected subnet. Maybe I have it wrong for the router as well. But if my thinking is correct would the same happen for the FTD?
04-09-2025 05:50 AM
As an active CCIE (R&S) holder I am embarrassed to admit that I don't remember the behavior of an SVI when the VLAN is pruned from the trunk
Thank you for rating helpful posts!
04-09-2025 06:06 AM
I am sure that we face so many things during each day that it is difficult to keep all this info.
The odd thing is that I can not find any documentation from Cisco that indicates this behavior if this action occurs.
04-09-2025 07:14 AM
Perhaps you can try and confirm this by creating a new sub-interface, give it an IP and allow the vlan on the trunk. Then prune it and observe the behavior
Thank you for rating helpful posts!
04-09-2025 09:22 AM
By default all sub-interfaces simply follow the state of the physical interface. So if you prune a vlan on the trunk at the switch, the sub-interface at the firewall will remain UP. All frames with or without tag arrive at the physical interface and based on the tag they will then be handled by the corresponding sub-interface as required. So how should the firewall notice that it will no longer receive tagged frames for that vlan?
Things do change if you start using tools like IP SLA or BFD to track the reachability of the neighbor.
Otherwise the firewall will continue to send traffic out of the sub-interface and the switch will drop it as the vlan is pruned.
You can also check whether your firewall allows you to seperately shutdown sub-interfaces, preferably with a newly created one.
HTH!
04-10-2025 12:48 AM
Thank you both for your help and thoughts.
I am going to perform a lab in order to find out on a live environment and not just in theory.
Thank you!
04-10-2025 01:47 AM
Setting up a lab is indeed a great idea! You can learn much more from practicing than just reading books or discussions.
There is always some kind of logic behind the default behavior.
If you create a SVI on a switch and the corresponding vlan is bound to any active interface, the SVI goes up in order to be ready to receive traffic for that subnet. The switch does not know whether this subnet does exist anywhere else and whether it will ever receive any traffic but the switch needs to be prepared to handle it. Once you remove the vlan from any and all interfaces, the SVI will go down because now the switch knows for sure that it will never be able to receive any traffic for that subnet.
If you have an active interface on a router/firewall and create a sub-interface for that interface, then the sub-interface will automatically go up as it follows the state of the physical interface by default. Similar logic here. The router does not know whether it will ever receive traffic for that sub-interface but since the physical interface is up, the router must be prepared to handle it. Most platforms allow you to explicitly shutdown sub-interfaces which tells the router/firewall to remove that network and related routes from its routing table.
As mentioned before there are a couple of tools like IP SLA or BFD that allow you to track the reachability of neighbors. This enables a device to detect that the neighbor is no longer reachable, so that it can react even if the corresponding interface is still up.
Happy labbing!
04-10-2025 09:19 AM
I am glad this conversation helped! Also, thank you for updating us on the outcome of the lab tests!
Thank you for rating helpful posts!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide