11-24-2022 12:11 AM
Hi All
I got C9500 in stackwise virtual (2 switches in stack). Am looking to configure sub-interface (for eg, twe1/0/1.340 on VRF A) in one of the physical port that connects to ISP and SVI (for eg, vlan891 on VRF A) for other internal VLAN and configure as trunk in another port. Is this possible to have SVI and sub-interface on same switch?
11-24-2022 03:23 AM
Sorry it was typo. Yes it will be
encapsulation dot1q 340
11-24-2022 02:50 AM - edited 11-24-2022 02:51 AM
One more note :- the inter-VLAN can broke if not all VLAN in same VRF.
11-24-2022 03:29 AM
Yes, the VLAN's will be on same VRF as below.
The config looks like below:
!
interface twe1/0/1.340
description Link to ISP
encapsulation dot1q 340
vrf forwarding TEST
ip add 192.168.10.1 255.255.255.0
!
Interface vlan340
desc Link to Firewall
vrf forwarding TEST
ip add 192.168.255.1 255.255.255.0
!
interface twe1/0/2
Desc link to L2 switch
switchport mode trunk
switchport trunk allowed vlan 340
!
11-24-2022 03:41 AM - edited 11-24-2022 03:42 AM
Hello @Psmurali89 ,
I agree with @Deepak Kumar the routed L3 subinterface cannot stay on the same VLAN-number as the SVI you need to use a different value in the encapsulation dot1q <value>.
Hope to help
Giuseppe
11-24-2022 03:52 AM
Sorry its my typo.. am using those VLANs just an example so typed it wrong. Corrected as below.
The config looks like below:
!
interface twe1/0/1.340
description Link to ISP
encapsulation dot1q 340
vrf forwarding TEST
ip add 192.168.10.1 255.255.255.0
!
Interface vlan841
desc Link to Firewall
vrf forwarding TEST
ip add 192.168.255.1 255.255.255.0
!
interface twe1/0/2
Desc link to L2 switch
switchport mode trunk
switchport trunk allowed vlan 841
!
11-24-2022 03:58 AM - edited 11-24-2022 04:22 AM
You requirement can done by VRF for both SVI and ISP subinterface but in order to be sure I will run lab tonight and share with you the point that I dont link about VRF (with traffic capture)
but until that time I will share with you point
we use VRF to totally separate the traffic.
this in L3 is easy especial in PE MPLS Core.
but here we talk about enterprise campus and config VRF for SVI have this limit :-
1- traffic from VLAN 340 to other VLAN in switch is drop
since the VLAN 340 VRF have no idea about other VLAN
2- ISP will use only to forward traffic of VLAN 340 other VLAN can not use ISP to forward traffic
what is best, for my view using PBR with SET VRF is better, this way we keep SVI VLAN in global and if we want to use ISP we set the VRF under PBR.
I will update you after finish lab
11-24-2022 04:37 AM
Hi, All the VLAN's has default route to the relevant firewall context and the firewall does the routing/policy between VRF's.
The only reason am looking to do sub-interface the port that connects to ISP is because the system MTU in the switch is 9000 (in middle of migration so cant change MTU to 1500 at this time due to dependency on other legacy switches) but the ISP MTU has to be set to 1500. If i configure as SVI then in every VLAN (nearly 50 VLAN that connects to ISP) i have to manually set the MTU to 1500.. If i configure as sub-interface then I can set the main port MTU to 1500 so all other sub-interfaces will be automatically on same MTU.
11-24-2022 05:38 AM
Note: You can configure the MTU size for all interfaces on a device at the same time using the global command "system mtu". Starting with Cisco IOS XE 17.1.1, Catalyst 9000 switches support Per-Port MTU. Per-Port MTU supports port level and port channel level MTU configuration. With Per-Port MTU you can set different MTU values for different interfaces as well as different port channel interfaces.
so start from IOS XE 17.1.1 per-port MTU is support.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide