© Copyright IBM Corp. 2011
Chapter 8. VLANs
105
Private VLANs
Private VLANs provide Layer 2 isolation between the ports within the same
broadcast domain. Private VLANs can control traffic within a VLAN domain, and
provide port-based security for host servers.
Use Private VLANs to partition a VLAN domain into sub-domains. Each sub-domain
is comprised of one primary VLAN and one or more secondary VLANs, as follows:
•
Primary VLAN—carries unidirectional traffic downstream from promiscuous
ports. Each Private VLAN configuration has only one primary VLAN. All ports in
the Private VLAN are members of the primary VLAN.
•
Secondary VLAN—Secondary VLANs are internal to a private VLAN domain,
and are defined as follows:
– Isolated VLAN—carries unidirectional traffic upstream from the host servers
toward ports in the primary VLAN and the gateway. Each Private VLAN
configuration can contain only one isolated VLAN.
– Community VLAN—carries upstream traffic from ports in the community
VLAN to other ports in the same community, and to ports in the primary
VLAN and the gateway. Each Private VLAN configuration can contain
multiple community VLANs.
After you define the primary VLAN and one or more secondary VLANs, you map the
secondary VLAN(s) to the primary VLAN.
Private VLAN Ports
Private VLAN ports are defined as follows:
•
Promiscuous—A promiscuous port is a port that belongs to the primary VLAN.
The promiscuous port can communicate with all the interfaces, including ports
in the secondary VLANs (Isolated VLAN and Community VLANs). Each promis-
cuous port can belong to only one Private VLAN.
•
Isolated—An isolated port is a host port that belongs to an isolated VLAN. Each
isolated port has complete layer 2 separation from other ports within the same
private VLAN (including other isolated ports), except for the promiscuous ports.
– Traffic sent to an isolated port is blocked by the Private VLAN, except the
traffic from promiscuous ports.
– Traffic received from an isolated port is forwarded only to promiscuous ports.
•
Community—A community port is a host port that belongs to a community
VLAN. Community ports can communicate with other ports in the same commu-
nity VLAN, and with promiscuous ports. These interfaces are isolated at layer 2
from all other interfaces in other communities and from isolated ports within the
Private VLAN.
Configuration Guidelines
The following guidelines apply when configuring Private VLANs:
•
The default VLAN 1 cannot be a Private VLAN.
•
IGMP Snooping must be disabled on isolated VLANs.
•
Each secondary port’s (isolated port and community ports) PVID must match its
corresponding secondary VLAN ID.
•
Ports within a secondary VLAN cannot be members of other VLANs.
•
All VLANs that comprise the Private VLAN must belong to the same Spanning
Tree Group.
Содержание RackSwitch G8000
Страница 1: ...RackSwitch G8000 Application Guide...
Страница 2: ......
Страница 3: ...RackSwitch G8000 Application Guide...
Страница 16: ...16 RackSwitch G8000 Application Guide...
Страница 22: ...20 RackSwitch G8000 Application Guide...
Страница 23: ...Copyright IBM Corp 2011 21 Part 1 Getting Started...
Страница 24: ...22 RackSwitch G8000 Application Guide...
Страница 54: ...52 RackSwitch G8000 Application Guide...
Страница 55: ...Copyright IBM Corp 2011 53 Part 2 Securing the Switch...
Страница 56: ...54 RackSwitch G8000 Application Guide...
Страница 92: ...90 RackSwitch G8000 Application Guide...
Страница 94: ...92 RackSwitch G8000 Application Guide...
Страница 144: ...142 RackSwitch G8000 Application Guide...
Страница 145: ...Copyright IBM Corp 2011 143 Part 4 Advanced Switch ing Features...
Страница 146: ...144 RackSwitch G8000 Application Guide...
Страница 148: ...146 RackSwitch G8000 Application Guide...
Страница 182: ...180 RackSwitch G8000 Application Guide...
Страница 184: ...182 RackSwitch G8000 Application Guide...
Страница 212: ...210 RackSwitch G8000 Application Guide...
Страница 258: ...256 RackSwitch G8000 Application Guide...
Страница 286: ...284 RackSwitch G8000 Application Guide...
Страница 294: ...292 RackSwitch G8000 Application Guide...
Страница 298: ...296 RackSwitch G8000 Application Guide...
Страница 310: ...308 RackSwitch G8000 Application Guide...
Страница 311: ...Copyright IBM Corp 2011 309 Part 7 Network Management...
Страница 312: ...310 RackSwitch G8000 Application Guide...
Страница 320: ...318 RackSwitch G8000 Application Guide...
Страница 332: ...330 RackSwitch G8000 Application Guide...
Страница 334: ...332 RackSwitch G8000 Application Guide...
Страница 345: ...Copyright IBM Corp 2011 343 Part 9 Appendices...
Страница 346: ...344 RackSwitch G8000 Application Guide...
Страница 357: ...Copyright IBM Corp 2011 Appendix C Notices 355 Taiwan Class A compliance statement...
Страница 358: ...356 RackSwitch G8000 Application Guide...