- Community Home
- >
- Servers and Operating Systems
- >
- HPE BladeSystem
- >
- BladeSystem - General
- >
- Cisco Private VLAN support with Virtual Connect
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-07-2012 11:40 AM
05-07-2012 11:40 AM
Cisco Private VLAN support with Virtual Connect
John had a customer question:
*************
I’m working with a customer that is attempting to utilize Cisco Private VLANs with Virtual Connect / Blades.
We are running into issues where if we put the “access vlan” on a node, we can “ping it / get to it / etc” – however, if we attempt to move it to one of the community VLANs, then traffic flow stops.
On the Virtual Connect:
We have 3 VLANs configured
500
510
525
These are all in a SUS - and the SUS has a pair of 10GB links going to the upstream switch.
The upstream switch appears to be configured properly – they are in a LACP channel group, and the VLAN section is showing that 500, 510, and 525 are being passed.
(They are configured as private VLAN).
On the Cisco side, 500 is the parent and 510 and 525 are the community vlans.
The problem at this site is that if I put blade on vlan 500, I can ping it / move traffic / etc. If I put the blade on vlan 510, traffic flow stops.
***************
Reply from Robert:
******************
Virtual Connect does not specifically support Cisco proprietary “Private Vlans”. I believe it can work if the Cisco environment if properly configured. The link provided is a Cisco link for configuring Private Vlans. Because VC does not support “Private Vlans” (like many other switches, even some Cisco switches), you may want to recommend that they implement ‘Isolated PVLAN Trunk’ ports for those that connect to VC. They may still need to implement VC private networks if they require separating hosts inside the VC enclosure from other hosts within the enclosure that belong to the same Vlan. The ‘Isolated PVLAN Trunk Ports’ section begins on Page 38-6 in the below.
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/50sg/configuration/guide/pvlans.pdf
****************
Any other comments or suggestions?
- Tags:
- VLAN