04-29-2021 10:36 PM - edited 04-29-2021 10:38 PM
i'm not sure if above diagram can works. 3 Switches is Cisco C9200L
Our network is 192.168.1.0/24. Both workstations and Server cannot change IP address. All server connected to one switch, and a single uplink to Cisco C9200.
I'm aware that PVLAN allow same subnet but different VLAN, so there is 2 broadcast domain.
Q1: The promiscuous trunk port can join the MLAG LACP as above diagram ?
Q2: I want to allow certain IP from VLAN10 able to access server farm. Which mode should I use for PVLAN, communication or isolate?
Q3: Firewall need to support PVLAN and promiscuous trunk port ?
Solved! Go to Solution.
04-30-2021 01:36 AM
Hello
FYI an isolated vlan/port won’t be able to communicate with any other isolated port /vlan only the promiscuous port/primary vlan can do this,
By default pvlan community vlans/ports can communicate with other hosts in the same community vlan, however if you wish community vlans to be able to reach another community vlan then they both need to be mapped to the pvlan primary vlan routed interface.
However, as you want to allow certain hosts from within VLAN10 able to access server farm in the same vlan.then this can be accomplished this by using a vlan access-list without needing to implementing pvlans.
How to deny two hosts from comminating with each other within the same vlan
Example –
access-list 100 permit host 192.168.1.x host 192.168..y
access-list 100 permit host 192.168.1.y host 192.168..x
vlan acess-map vlan10
match ip address 100
action drop
vlan access-map vlan10 99
vlan filter vlan10 vlan-list 10
04-30-2021 01:36 AM
Hello
FYI an isolated vlan/port won’t be able to communicate with any other isolated port /vlan only the promiscuous port/primary vlan can do this,
By default pvlan community vlans/ports can communicate with other hosts in the same community vlan, however if you wish community vlans to be able to reach another community vlan then they both need to be mapped to the pvlan primary vlan routed interface.
However, as you want to allow certain hosts from within VLAN10 able to access server farm in the same vlan.then this can be accomplished this by using a vlan access-list without needing to implementing pvlans.
How to deny two hosts from comminating with each other within the same vlan
Example –
access-list 100 permit host 192.168.1.x host 192.168..y
access-list 100 permit host 192.168.1.y host 192.168..x
vlan acess-map vlan10
match ip address 100
action drop
vlan access-map vlan10 99
vlan filter vlan10 vlan-list 10
04-30-2021 07:38 PM
Thank you Paul
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide