Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Troubleshooting Private VLANs

    Use the following information to troubleshoot a private VLAN configuration.

    Limitations of Private VLANs

    The following constraints apply to private VLAN configurations:

    • IGMP snooping is not supported with private VLANs.
    • Routed VLAN interfaces are not supported on private VLANs
    • Routing between secondary VLANs in the same primary VLAN is not supported.

    Forwarding with Private VLANs

    Problem

    • When isolated VLAN or community VLAN tagged traffic is received on a PVLAN trunk port, MAC addresses are learned from the primary VLAN. This means that output from the show ethernet-switching table command shows that MAC addresses are learned from the primary VLAN and replicated to secondary VLANs. This behavior has no effect on forwarding decisions.
    • If a packet with a secondary VLAN tag is received on a promiscuous port, it is accepted and forwarded.
    • If a packet is received on a PVLAN trunk port and meets both of the conditions listed below, it is dropped.
      • The packet has a community VLAN tag.
      • The packet is destined to a unicast MAC address or multicast group MAC address that was learned on an isolated VLAN.
    • If a packet is received on a PVLAN trunk port and meets both of the conditions listed below, it is dropped.
      • The packet has an isolated VLAN tag.
      • The packet is destined to a unicast MAC address or multicast group MAC address that was learned on a community VLAN.
    • If a packet with a primary VLAN tag is received by a secondary (isolated or community) VLAN port, the secondary port forwards the packet.
    • If you configure a community VLAN on one device and configure another community VLAN on a second device and both community VLANs use the same VLAN ID, traffic for one of the VLANs can be forwarded to the other VLAN. For example, assume the following configuration:
      • Community VLAN comm1 on switch 1 has VLAN ID 50 and is a member of primary VLAN pvlan100.
      • Community VLAN comm2 on switch 2 also has VLAN ID 50 and is a member of primary VLAN pvlan200.
      • Primary VLAN pvlan100 exists on both switches.

      If traffic for comm1 is sent from switch 1 to switch 2, it will be sent to the ports participating in comm2. (The traffic will also be forwarded to the ports in comm1, as you would expect.)

    Solution

    These are expected behaviors.

    Egress Firewall Filters with Private VLANs

    Problem

    If you apply a firewall filter in the output direction to a primary VLAN, the filter also applies to the secondary VLANs that are members of the primary VLAN when the traffic egresses with the primary VLAN tag or isolated VLAN tag, as listed below:

    • Traffic forwarded from a secondary VLAN trunk port to a promiscuous port (trunk or access)
    • Traffic forwarded from a secondary VLAN trunk port that carries an isolated VLAN to a PVLAN trunk port.
    • Traffic forwarded from a promiscuous port (trunk or access) to a secondary VLAN trunk port
    • Traffic forwarded from a PVLAN trunk port. to a secondary VLAN trunk port
    • Traffic forwarded from a community port to a promiscuous port (trunk or access)

    If you apply a firewall filter in the output direction to a primary VLAN, the filter does not apply to traffic that egresses with a community VLAN tag, as listed below:

    • Traffic forwarded from a community trunk port to a PVLAN trunk port
    • Traffic forwarded from a secondary VLAN trunk port that carries a community VLAN to a PVLAN trunk port
    • Traffic forwarded from a promiscuous port (trunk or access) to a community trunk port
    • Traffic forwarded from a PVLAN trunk port. to a community trunk port

    If you apply a firewall filter in the output direction to a community VLAN, the following behaviors apply:

    • The filter is applied to traffic forwarded from a promiscuous port (trunk or access) to a community trunk port (because the traffic egresses with the community VLAN tag).

    • The filter is applied to traffic forwarded from a community port to a PVLAN trunk port (because the traffic egresses with the community VLAN tag).
    • The filter is not applied to traffic forwarded from a community port to a promiscuous port (because the traffic egresses with the primary VLAN tag or untagged).

    Solution

    These are expected behaviors. They occur only if you apply a firewall filter to a private VLAN in the output direction and do not occur if you apply a firewall filter to a private VLAN in the input direction.

    Published: 2012-08-03