<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VLAN - Routing/ACL Query in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721702#M24723</link>
    <description>Cool, thank you very much.&lt;BR /&gt;&lt;BR /&gt;Is "outbound" traffic from VLAN100 "stateful" i.e. if I create an ACL for inbound traffic to VLAN100, if devices on VLAN100 initiate outbound connections (DNS/NTP/SMTP) to other VLANs will the responses be accepted so long as routes are in place?</description>
    <pubDate>Sat, 04 Dec 2010 20:21:07 GMT</pubDate>
    <dc:creator>Paul Hutchings</dc:creator>
    <dc:date>2010-12-04T20:21:07Z</dc:date>
    <item>
      <title>VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721698#M24719</link>
      <description>Still learning here so please bear with me on what might seem a simple question.&lt;BR /&gt;&lt;BR /&gt;Let's say I have a pair 2910al's linked with 10gbps fiber, and on each I have the following:&lt;BR /&gt;&lt;BR /&gt;VLAN1 - 192.168.1.0/24 (connected to production LAN)&lt;BR /&gt;VLAN100 - 192.168.100.0/24&lt;BR /&gt;VLAN200 - 192.168.200.0/24&lt;BR /&gt;VLAN300 - 192.168.300.0/24&lt;BR /&gt;&lt;BR /&gt;The 10gbps fiber would tag VLAN's 1,100,200,300.&lt;BR /&gt;&lt;BR /&gt;I want to be able to route from VLAN100 TO my production LAN.&lt;BR /&gt;&lt;BR /&gt;I also want to be able to route FROM my production VLAN to VLAN100 from specific IP addresses to any IP and port on VLAN100.&lt;BR /&gt;&lt;BR /&gt;Can I do this easily, and if so how please?&lt;BR /&gt;&lt;BR /&gt;I'm finding myself drowning a little in hundreds of pages of manuals.&lt;BR /&gt;&lt;BR /&gt;Thanks ever so much.</description>
      <pubDate>Sat, 04 Dec 2010 16:16:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721698#M24719</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-04T16:16:08Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721699#M24720</link>
      <description>2 things:&lt;BR /&gt;1) turn on routing, but doing so allows any vlans with IP addresses assigned and the clients on those vlans using that switch vlan IP addr as their gateway, will be able to get to each other.&lt;BR /&gt;2) so, you'll want to implement some ACLs to control traffic flow.&lt;BR /&gt;&lt;BR /&gt;example ACL to your note:&lt;BR /&gt;&lt;BR /&gt;1) create ASE's:&lt;BR /&gt;&lt;BR /&gt;ip access-list 100 permit 192.168.1.x 0.0.0.0 192.168.100.0 0.0.0.255&lt;BR /&gt;ip access-list 100 deny 192.168.200.0 0.0.0.255 192.168.100.0 0.0.0.255&lt;BR /&gt;ip access-list 100 deny 192.168.300.0 0.0.0.255 192.168.100.0 0.0.0.255&lt;BR /&gt;ip access-list 100 permit any any (optional, there is implicit deny at end of ACEs)&lt;BR /&gt;&lt;BR /&gt;2) apply ACL to vlan100:&lt;BR /&gt;&lt;BR /&gt;switch(vlan-100)# ip access-group 100 in&lt;BR /&gt;&lt;BR /&gt;this example ACL may not fully provide all access or deny specific access as you need, it is simply an example.&lt;BR /&gt;&lt;BR /&gt;get this doc if you don't have it already (2910 ACL portion):&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://cdn.procurve.com/training/Manuals/2910-ASG-Feb09-9-ACLs.pdf" target="_blank"&gt;http://cdn.procurve.com/training/Manuals/2910-ASG-Feb09-9-ACLs.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Get this CLI ref guide, it shows how to configure HP ProVision, HP Comware5 and Cisco switches for lots of different functions, in a side-by-side comparison, so if you know one CLI, you see how to do it in a different CLI: &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h10144.www1.hp.com/docs/training/HP-Networking-and-Cisco-CLI-Reference-Guide_June_10_WW_Eng_ltr.pdf" target="_blank"&gt;http://h10144.www1.hp.com/docs/training/HP-Networking-and-Cisco-CLI-Reference-Guide_June_10_WW_Eng_ltr.pdf&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;you may not need the other CLI info, but it has alot of good basic, plain speak of how to do "stuff".&lt;BR /&gt;&lt;BR /&gt;hth...Jeff</description>
      <pubDate>Sat, 04 Dec 2010 17:42:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721699#M24720</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-04T17:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721700#M24721</link>
      <description>Thanks, had been reading &lt;A href="http://cdn.procurve.com/training/Manuals/2910-ASG-Feb09-9-ACLs.pdf" target="_blank"&gt;http://cdn.procurve.com/training/Manuals/2910-ASG-Feb09-9-ACLs.pdf&lt;/A&gt; but it's a lot to digest, I think I'm a little clearer.&lt;BR /&gt;&lt;BR /&gt;So let's say on my main LANs core switch I have a route for 192.168.100.0/24 that has 192.168.1.1 as its next hop, the traffic comes into the 2910 on a port in VLAN1 that's connected to my main LAN.&lt;BR /&gt;&lt;BR /&gt;I have "ip routing" enabled.&lt;BR /&gt;&lt;BR /&gt;I create an ACE (did you mean ACE or ASE as I can't see any reference to that?) of:&lt;BR /&gt;&lt;BR /&gt;ip access-list 100 (or iSCSI or whatever name I choose) permit 192.168.1.x 0.0.0.0 192.168.100.0 0.0.0.255&lt;BR /&gt;ip access-list 100 permit 192.168.1.y 0.0.0.0 192.168.100.0 0.0.0.255&lt;BR /&gt;ip access-list 100 permit 192.168.1.z 0.0.0.0 192.168.100.0 0.0.0.255&lt;BR /&gt;&lt;BR /&gt;With x,y,z being the machines on my main LAN that I want to have access, an implicit deny blocks everything else.&lt;BR /&gt;&lt;BR /&gt;Then:&lt;BR /&gt;&lt;BR /&gt;vlan 100&lt;BR /&gt;ip access-group 100 in&lt;BR /&gt;&lt;BR /&gt;And this will only allow 192.168.1.x/y/z to route through to 192.168.100.0?&lt;BR /&gt;&lt;BR /&gt;Thanks.</description>
      <pubDate>Sat, 04 Dec 2010 18:11:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721700#M24721</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-04T18:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721701#M24722</link>
      <description>Paul asked: &lt;BR /&gt;&lt;BR /&gt;"(did you mean ACE or ASE as I can't see any reference to that?)"&lt;BR /&gt;&lt;BR /&gt;yes, my bad...ACE - Access Control Entry&lt;BR /&gt;&lt;BR /&gt;"And this will only allow 192.168.1.x/y/z to route through to 192.168.100.0?"&lt;BR /&gt;&lt;BR /&gt;yes, for vlan 100&lt;BR /&gt;&lt;BR /&gt;hth...Jeff</description>
      <pubDate>Sat, 04 Dec 2010 20:10:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721701#M24722</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-04T20:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721702#M24723</link>
      <description>Cool, thank you very much.&lt;BR /&gt;&lt;BR /&gt;Is "outbound" traffic from VLAN100 "stateful" i.e. if I create an ACL for inbound traffic to VLAN100, if devices on VLAN100 initiate outbound connections (DNS/NTP/SMTP) to other VLANs will the responses be accepted so long as routes are in place?</description>
      <pubDate>Sat, 04 Dec 2010 20:21:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721702#M24723</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-04T20:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721703#M24724</link>
      <description>Paul asked:&lt;BR /&gt;"Is "outbound" traffic from VLAN100 "stateful" i.e. if I create an ACL for inbound traffic to VLAN100, if devices on VLAN100 initiate outbound connections (DNS/NTP/SMTP) to other VLANs will the responses be accepted so long as routes are in place?"&lt;BR /&gt;&lt;BR /&gt;Yes :-)</description>
      <pubDate>Sat, 04 Dec 2010 20:27:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721703#M24724</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-04T20:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721704#M24725</link>
      <description>Excellent.&lt;BR /&gt;&lt;BR /&gt;I've been doing some reading on routing/redundancy (tied to my earlier stacking/management question).&lt;BR /&gt;&lt;BR /&gt;Let's say I have two 2910's connected by a 10gbps fiber that tags VLAN's 1, 100, 200, 300.&lt;BR /&gt;&lt;BR /&gt;VLAN1 on Switch A is assigned 192.168.1.1 and VLAN2 on Switch B is assigned 192.168.1.2.&lt;BR /&gt;&lt;BR /&gt;If VLAN1 of each switch is connected to my main LAN, I basically have two routes into VLAN1, 100, 200, 300.&lt;BR /&gt;&lt;BR /&gt;AFAIK there's no way on my main LAN switch (5406zl) to configure 2 routes is there?&lt;BR /&gt;&lt;BR /&gt;Ideally I want the route to use 192.168.1.1 and fall back to 192.168.1.2 if Switch A is down.&lt;BR /&gt;&lt;BR /&gt;I suspect I'm asking too much :-)&lt;BR /&gt;&lt;BR /&gt;(The context here is a basic vSphere "stretch cluster" with an iSCSI SAN on VLAN100 that ideally should be manageable from the main LAN).</description>
      <pubDate>Sat, 04 Dec 2010 20:42:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721704#M24725</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-04T20:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721705#M24726</link>
      <description>Ah bugger, just thought about it and it won't work as the devices on VLAN100 (or whichever VLAN) will only have a single default gateway which may not return traffic to the interface it came in on.</description>
      <pubDate>Sat, 04 Dec 2010 20:50:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721705#M24726</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-04T20:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721706#M24727</link>
      <description>Paul said:&lt;BR /&gt;"Ah bugger, just thought about it and it won't work as the devices on VLAN100 (or whichever VLAN) will only have a single default gateway which may not return traffic to the interface it came in on."&lt;BR /&gt;&lt;BR /&gt;Yep, that's why you would want VRRP. But we've been through that too :-)&lt;BR /&gt;&lt;BR /&gt;What ARE we doing, working through this in a Sat ;-) ;-)</description>
      <pubDate>Sat, 04 Dec 2010 21:18:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721706#M24727</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-04T21:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721707#M24728</link>
      <description>Thanks Jeff, much clearer now (Saturday or Sunday!).&lt;BR /&gt;&lt;BR /&gt;One final thing is about loops/STP.&lt;BR /&gt;&lt;BR /&gt;I've attached a very rough diagram of the proposed config.&lt;BR /&gt;&lt;BR /&gt;The intention is simply that the LAN "cloud" and below is our existing LAN (a flat network no VLANs) and above the cloud is the new kit.&lt;BR /&gt;&lt;BR /&gt;You'll see that by having the two 2910's connected to the existing LAN I'll have an L2 network loop that I'm assuming stp/rstp on the Procurve's will sort out?&lt;BR /&gt;&lt;BR /&gt;We already run RSTP on our core Procurve's on our main LAN though I'm by no means an expert on it.&lt;BR /&gt;&lt;BR /&gt;I'm not planning on tagging VLAN 1 between the switches and I know it's considered bad practise to use VLAN 1 however our main LAN is just "dumb and flat" right now.&lt;BR /&gt;&lt;BR /&gt;Really I only need the two 2910's connected to the primary LAN so I can manage the switches themselves and iSCSI kit on VLAN 100 - still debating whether it wouldn't be simpler just to stick a firewall in front of one of the switches and use that as a gateway in/out.</description>
      <pubDate>Sun, 05 Dec 2010 20:18:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721707#M24728</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-05T20:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721708#M24729</link>
      <description>Paul said:&lt;BR /&gt;"You'll see that by having the two 2910's connected to the existing LAN I'll have an L2 network loop that I'm assuming stp/rstp on the Procurve's will sort out?&lt;BR /&gt;&lt;BR /&gt;We already run RSTP on our core Procurve's on our main LAN though I'm by no means an expert on it."&lt;BR /&gt;&lt;BR /&gt;RSTP is the default level of STP that the 2910's should come up to...depends on version of code, they may have upgraded to MSTP, but if you don't configure MSTP, then it operates as simple RSTP.&lt;BR /&gt;&lt;BR /&gt;HOWEVER, spanning tree is NOT generally enabled by default, you must do a 'span' to enable it on each switch.&lt;BR /&gt;&lt;BR /&gt;The other primary thing to do is define which switch is the root and which is the backup root. (Jeff's best practice)&lt;BR /&gt;&lt;BR /&gt;Decide which switch you want to be the Layer2 root (generally the router or close to it) and do a 'span pri 0', and then decide which switch should be the backup root and do 'span pri 1'.&lt;BR /&gt;&lt;BR /&gt;The default priority setting in ProVision is 8 (actually 8*4k, so its 32768, which is the standard).&lt;BR /&gt;&lt;BR /&gt;Refer to the CLI guide ch 18.&lt;BR /&gt;&lt;BR /&gt;Can't remember if I mentioned the CLI Ref Guide, get it, makes things a bit easier if you just want to config things.&lt;BR /&gt;&lt;BR /&gt;Get this CLI ref guide, it shows how to configure HP ProVision, HP Comware5 and Cisco switches for lots of different functions, in a side-by-side comparison, so if you know one CLI, you see how to do it in a different CLI:&lt;BR /&gt;&lt;A href="http://h10144.www1.hp.com/docs/training/HP-Networking-and-Cisco-CLI-Reference-Guide_June_10_WW_Eng_ltr.pdf" target="_blank"&gt;http://h10144.www1.hp.com/docs/training/HP-Networking-and-Cisco-CLI-Reference-Guide_June_10_WW_Eng_ltr.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;hth...Jeff&lt;BR /&gt;</description>
      <pubDate>Sun, 05 Dec 2010 20:30:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721708#M24729</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-05T20:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721709#M24730</link>
      <description>Thanks Jeff, that CLI guide is useful but not so much for the side by side as I'm not a Cisco person either - more a GUI person with CLI when I have to :-)&lt;BR /&gt;&lt;BR /&gt;I know we're running RSTP/STP on the two core 5406zl's that we have as well as on some other old Baystack's and assorted switches - right now our root bridge appears to be an old Baystack that I think is only root by virtue of having the lowest MAC, it certainly isn't by design and my intention is that when I have a window I want to make the gateway 5406 the root bridge, and the second 5406 the backup.&lt;BR /&gt;&lt;BR /&gt;The LAN isn't supposed to be my responsibility but I seem to keep noticing these things and it gets a little awkward trying to cajole those who should be doing it, into doing it so I seem to end up learning little by little and doing it myself.</description>
      <pubDate>Sun, 05 Dec 2010 20:44:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721709#M24730</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-05T20:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721710#M24731</link>
      <description>Happy to help...&lt;BR /&gt;&lt;BR /&gt;I kinda figured the CLI Guide may not be the big help, it is sometimes a bit easier to do stuff without having to slog through the big manuals :-)&lt;BR /&gt;&lt;BR /&gt;A note, the 5400 by default comes up to MSTP when spanning tree is enabled. Of course it can be "rev'd" back to RSTP, and it's ok to do (I suspect that's probably what was done to be fully compatible with those Baystacks.)&lt;BR /&gt;&lt;BR /&gt;Cheers...Jeff</description>
      <pubDate>Sun, 05 Dec 2010 21:33:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721710#M24731</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-05T21:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721711#M24732</link>
      <description>Ha I was just reading about MSTP as I was finding myself thinking "What if there's a route between switches that is more efficient BUT the VLAN in question isn't tagged on those ports?" - but I think you've headed me off at the pass with pointing out RSTP defaults to MSTP.&lt;BR /&gt;&lt;BR /&gt;I think "Plan A" is to walk before I run and just get the VLAN's setup and test they work within the switches, then link them and tag the link, and then make sure the VLAN's work over the link, and then uplink each switch to the main LAN and check I still have a network :-)&lt;BR /&gt;&lt;BR /&gt;I'm hoping that as with most things it's all in the planning, and if I've got that right the implementation should be much more pleasant.</description>
      <pubDate>Sun, 05 Dec 2010 21:39:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721711#M24732</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-05T21:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721712#M24733</link>
      <description>Paul said:&lt;BR /&gt;"I'm hoping that as with most things it's all in the planning, and if I've got that right the implementation should be much more pleasant."&lt;BR /&gt;&lt;BR /&gt;Aw come on now, plan ahead, isn't that like reading the manuals before turning it on - hahahahahaha!&lt;BR /&gt;&lt;BR /&gt;I have been accused for years of ready-fire-aim...&lt;BR /&gt;&lt;BR /&gt;Regardless, don't tell folks how easy this all is or everyone will want to do it, and then the "guru status" gets lost.&lt;BR /&gt;&lt;BR /&gt;I hope it goes well for you, sounds like you are VERY close to it!!!!&lt;BR /&gt;&lt;BR /&gt;Bangers and Mash on me mate!</description>
      <pubDate>Sun, 05 Dec 2010 22:44:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721712#M24733</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-05T22:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721713#M24734</link>
      <description>Jeff, up and running albeit early days/testing/staging phase.&lt;BR /&gt;&lt;BR /&gt;The switch management is on VLAN1 (not ideal but as I said we don't use VLAN's on the main LAN right now).&lt;BR /&gt;&lt;BR /&gt;One thing I noticed is that VLAN1 "DEFAULT_VLAN" seems to be the default untagged VLAN on all ports.&lt;BR /&gt;&lt;BR /&gt;On the ports that I *only* want to use in tagged mode, is there any disadvantage to simply using the "forbid" option to stop them being members of VLAN1 for untagged?&lt;BR /&gt;&lt;BR /&gt;It seems daft putting them in a bogus VLAN for untagged traffic?</description>
      <pubDate>Mon, 06 Dec 2010 17:58:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721713#M24734</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-06T17:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721714#M24735</link>
      <description>Paul said:&lt;BR /&gt;"It seems daft putting them in a bogus VLAN for untagged traffic?"&lt;BR /&gt;&lt;BR /&gt;My best practice is to NEVER use VLAN1 for ANYTHING.&lt;BR /&gt;&lt;BR /&gt;Next to that, then I create a "no-use" VLAN and put all ports untagged into there, then move them to using VLANs when I need them.&lt;BR /&gt;&lt;BR /&gt;Either way, I believe it is the better way to control the use of ports.&lt;BR /&gt;&lt;BR /&gt;Cheers...Jeff</description>
      <pubDate>Mon, 06 Dec 2010 20:07:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721714#M24735</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-06T20:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721715#M24736</link>
      <description>Makes sense, as I eluded to earlier, at some point I want to get our main LAN onto VLAN's, for now there's an element of fire fighting I guess.&lt;BR /&gt;&lt;BR /&gt;A "no-use" VLAN sounds sensible tbh - the main thing is I don't want the default VLAN spanning those two switches via the 10gbps trunk.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Paul</description>
      <pubDate>Mon, 06 Dec 2010 20:37:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721715#M24736</guid>
      <dc:creator>Paul Hutchings</dc:creator>
      <dc:date>2010-12-06T20:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN - Routing/ACL Query</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721716#M24737</link>
      <description>btw, you can also reassign which VLAN is the "default-vlan"...you may want to create the "no-use-vlan" and assign it to be the "default-vlan" ????&lt;BR /&gt;&lt;BR /&gt;btw2, as long as you don't assign the 10G ports tagged or untagged into VLAN1 on both sides, VLAN1 is isolated across that link.&lt;BR /&gt;&lt;BR /&gt;btw3, a port has to have a home, whether it is untagged into a VLAN or tagged into a VLAN, it just has to have a home.&lt;BR /&gt;&lt;BR /&gt;hth...Jeff</description>
      <pubDate>Mon, 06 Dec 2010 21:02:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vlan-routing-acl-query/m-p/4721716#M24737</guid>
      <dc:creator>Jeff Carrell</dc:creator>
      <dc:date>2010-12-06T21:02:07Z</dc:date>
    </item>
  </channel>
</rss>

