× NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Orbi WiFi 7 RBE973
Reply

Private VLANs on the GC728X and GC752X Switches

akio63
Aspirant

Private VLANs on the GC728X and GC752X Switches

Hello Netgear Gurus,

 

I am trying to understand how the Private VLANs on the GC728X and GC752X switches operate.  I have a Terminal Server that only negotiates to 100 Mbps Full.  So we constantly see bandwidth utilization surpassing 80 to 90 percent.  I decided to do a packet capture by placing a sniffer between the Netgear switch and the Terminal Server.  Unfortunately, I am seeing traffic that is not destined for the Terminal Server on the wire.  

 

For instance, this packet:

10.116.80.100 =>> 10.43.79.197

MAC ADD                     IP ADD                  NAME           SRC/DST         Switch       Port        PVID           Participating VLANs
d0:67:26:d6:55:88        10.116.80.100       srv1               Source              R1SW1     g14            111             111,112,114,116,117,120,156,158,159,161,163,164,501,505,1111,2111
98:90:96:e0:8b:ab        10.43.79.197         sim7              Destination       R1SW2     g18             158             111,116,156,158,1111,2112

 

And this packet:

10.43.79.171 =>> 10.43.79.197

MAC ADD                     IP ADD                  NAME           SRC/DST         Switch       Port        PVID           Participating VLANs
00:a0:69:0b:cc:c4        10.43.79.171         Time Svr         Source             R1SW2      g35          111             111,158,161
98:90:96:e0:8b:ab       10.43.79.197          sim7               Destination      R1SW2       g18         158             111,116,156,158,1111,2112

 

I have the sniffer on port g15 on R1SW2 with the following configuration:

Switch       Port        PVID           Participating VLANs

R1SW2       g15         159             111,159

 

Now, I can understand that since each source is in PVID 111 it is allowed to talk to g18 on R1SW2 since g18 is participating in VLAN 111.  However, when the switch receives the packet and sees that the destination MAC address in its Address Table, shouldn't it be directing the packet to R1SW2 port g18?  Why is the traffic being seen on R1SW2 g15?

 

There is no mirroring going on.  The Admin Mode is False and the Destination Port is None.  

 

Thank you.

Message 1 of 10

Accepted Solutions
schumaku
Guru

Re: Private VLANs on the GC728X and GC752X Switches


@akio63 wrote: 

Okay you gave me two options.


Please keep in mind I'm just another community member, not a Netgear support or the like.

 

I would prefer to go to the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration config. Because this is what the documentation does request. At that point again, I would expect a different config pushed in place than a classic dot1q

 

This compares well to similar configurations on different switch models to support the asymmetrical VLAN configurations. And this is again a feature not supported on general dot1q configs. And this is in my understanding not a generic dot1q config  - so thus I was talking about that before

 

Afraid again, have no test horse available. The related answers could come from Netgear switch engineering (via support), some insight could come from comparing the configs generated by the two variants.

 

-Kurt

View solution in original post

Message 9 of 10

All Replies
akio63
Aspirant

Re: Private VLANs on the GC728X and GC752X Switches

UPDATE

I need to correct something.  This is not about Private VLANs (although I do need to discuss this but we will leave that for another discussion).  This is about VLANs in general.  

Message 2 of 10
schumaku
Guru

Re: Private VLANs on the GC728X and GC752X Switches

What does all these other participating VLAN lost on the VLAN 111 where you expect only the Terminal Server traffic for for the VLAN 111?

 

If you only want VLAN 111 (probably as an untagged access port), so configure the beast accordingly. And nothing else.

Message 3 of 10
akio63
Aspirant

Re: Private VLANs on the GC728X and GC752X Switches

My apologies for not replying sooner, I have been busy. 

@schumaku 

No, I do not want only VLAN 111 traffic to reach the Terminal Server.  I only want traffic from sim1 which is in VLAN 111 to reach the Terminal Server.  

I want this traffic to reach the Terminal Server

10.43.79.208=>> 10.43.79.180

MAC ADD                     IP ADD                  NAME           SRC/DST         Switch       Port        PVID           Participating VLANs

a4:bb:6d:5e:0e:35        10.43.79.208         sim1               Source             R1SW1      g1           111              111,114,116,159,161,501,1111

00:80:d4:05:8a:30        10.43.79.180          TS1               Destination      R1SW2      g15         159              111,159

 

Which it does.  However, this additional traffic below, that I don't want is also reaching the Terminal Server

10.43.79.171 =>> 10.43.79.197

MAC ADD                     IP ADD                  NAME           SRC/DST         Switch       Port        PVID           Participating VLANs
00:a0:69:0b:cc:c4        10.43.79.171         Time Svr         Source             R1SW2      g35          111             111,158,161
98:90:96:e0:8b:ab       10.43.79.197          sim7               Destination      R1SW2       g18         158             111,116,156,158,1111,2112

 

How can I prevent that traffic from reaching the Terminal Server?  Neither the source nor the destination is participating in VLAN 159 so it shouldn't reach the Terminal Server which has a PVID of 159.  Or do I not understand the significance of the PVID?  Do I need to create a new VLAN for sim1, say VLAN 800, put sim1 into VLAN 800 and remove VLAN 111 from the Terminal Server's Participating VLANs, as well as add VLAN 800 to it?  

 

I tried using MAC address filtering to filter out traffic other than VLAN 111, MAC address a4:bb:6d:5e:0e:35 from Switch R1SW2 Port g15 which is the Terminal Server port, however the switch would not let me do that because, I assume, outbound MAC address filtering is restricted to multicast traffic only.  

 

Thank you

 

Message 4 of 10
schumaku
Guru

Re: Private VLANs on the GC728X and GC752X Switches

Still curious why these devices (MAC address) are participating on that many VLANs. Are these many other VLANs routed combining many different subnets?

 


@akio63 wrote:

How can I prevent that traffic from reaching the Terminal Server? 


Afraid, I can't understand this VLAN design on googles...

 


@akio63 wrote:

Neither the source nor the destination is participating in VLAN 159 so it shouldn't reach the Terminal Server which has a PVID of 159.  Or do I not understand the significance of the PVID?  Do I need to create a new VLAN for sim1, say VLAN 800, put sim1 into VLAN 800 and remove VLAN 111 from the Terminal Server's Participating VLANs, as well as add VLAN 800 to it?  


So there must be other reasons why this VLAN does show up on the terminal server port.

 

The PVID does define the VLAN incoming untagged frames on a port are sent to. 

 


@akio63 wrote:

I tried using MAC address filtering to filter out traffic other than VLAN 111, MAC address a4:bb:6d:5e:0e:35 from Switch R1SW2 Port g15 which is the Terminal Server port, however the switch would not let me do that because, I assume, outbound MAC address filtering is restricted to multicast traffic only.  


As above - no idea on what magic you expect VLAN to be workable. In the typical use case, your define a VLAN xyz, configure for example two ports untagged for this VLAN xyz (and no other VLAN associations) and PVID xyz so all untagged frames on these two ports go to the VLAN xyz.

 

Are you trying to configure some asymmetric VLAN environment here?

 

In a clean VLAN environment, you have access ports configured to be in one VLAN xyz. The other simple config is a trunk connection, where you can carry more than one VLAN on a port, either all tagged, one untagged, and two or more untagged. Each VLAN does make up it's own network (and handle dedicated IP subnet each. Some special usages exist where you bring multiple networks to one port, e.g. a workstation untagged, and an IP phone tagged.  

Message 5 of 10
akio63
Aspirant

Re: Private VLANs on the GC728X and GC752X Switches

Okay if you want to know (and have an hour to spare), I can explain the need for all the extra VLANs.  

 

Let's take for example a simple port.  Switch R1SW2 port g15 is a Terminal Server so it's PVID is 159.  We want it to talk to a device on VLAN 111 so we added VLAN 111 to the Participating VLANs.  We don't want everything on VLAN 111 to talk to the Terminal Server so we created VLAN 159 for the Terminal Servers and added VLAN 159 as a Participating VLANs for those ports that we do want to have connectivity to the Terminal Servers.  

Switch       Port        PVID           Participating VLANs

R1SW2       g15         159             111,159

We have the following VLANs defined:

VLAN         Description                                      Purpose

111             General Switch Traffic for Rig 1         All devices on Rig 1 that require connectivity to each other

159             Terminal Servers                               Terminal Servers that provide telnet sessions to users

 

Now for a more advanced port.  Switch R1SW1 port g14 is srv1.  It needs to talk to a lot of devices.  So it is in PVID 111 and this gives it access to many other devices.  We also want it to talk to the Terminal Servers as srv1 is a gateway into the Rig.  Users ssh to srv1 then ssh to the Terminal Servers to reach various other devices in the Rig.  So we want srv1 to talk to the Terminal Servers.  We want the Terminal Servers to talk back to srv1. 

 

But we don't want the Terminal Servers to be able to talk to anyone else.  Some of those systems are simulation servers and backup simulation servers.  And seeing their own traffic coming from a different IP address would mess it up and we could have corrupted data.  So we added VLAN 159 to the Participating VLANs for Switch R1SW1 port g14 to allow srv1 to talk to the Terminal Servers.  Server srv1 needs connectivity to other devices in other VLANs so we added those VLANs to the Participating VLANs as well to Switch R1SW1 port g14.  

 

Switch       Port        PVID           Participating VLANs

R1SW1      g14          111             111,112,114,116,117,120,156,158,159,161,163,164,501,505,1111,2111

 

I still wonder if this could be performed better using Private VLANs.  

 

So this is the way it was explained to me.  Traffic from srv1 comes into R1SW1 on port g14 and becomes tagged with VLAN 111.  It has an IP address of 10.116.80.236/8.  That traffic destined for the Terminal Server at IP address 10.43.79.180/8 is sent locally.  The server srv1 should send an ARP request for 10.43.79.180.  The Terminal Server will reply with it's MAC address.  The switch R1SW1 will receive the packets from srv1 destined to the Terminal Server, check it's Address Table and see that the destination MAC address is on the port with the trunk between R1SW1 and R1SW2 and sends it out that port.  

 

Now R1SW2 has the packet.  The packet still has the VLAN tag 111.  R1SW2 checks it's Address Table and sees the destination MAC address is on port g15.  It also sees that VLAN 111 is allowed on port g15 so it sends it out that port to the Terminal Server.  

Is this not correct?

 

Also, you stated:


@schumaku wrote:

In the typical use case, your define a VLAN xyz, configure for example two ports untagged for this VLAN xyz (and no other VLAN associations) and PVID xyz so all untagged frames on these two ports go to the VLAN xyz.

So I believe that I do not understand the concepts of Tagged VLAN, Untagged VLAN and PVID.  

PVID defines what VLAN tag will be placed on all incoming packets that are not tagged on that port..

Tagged means all packets transmitted for this VLAN will be tagged.   For instance a trunk port.  

Untagged means all packets transmitted for this VLAN will be untagged. For instance an access port.  

 

Does the VLAN membership not dictate what VLAN traffic is allowed or dropped on an interface?  

 

Thank you.

Message 6 of 10
schumaku
Guru

Re: Private VLANs on the GC728X and GC752X Switches

All right ... to start with, pure curiosity: Are these VLANs configured the classic 802.1q way, or using the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration? Enough experienced on Cisco NX-OS L2 configs, but no Netgear CX7xx playground available.

Message 7 of 10
akio63
Aspirant

Re: Private VLANs on the GC728X and GC752X Switches

@schumaku 

Okay you gave me two options.  

Option 1

Classic 802.1q way

Option 2

Using the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration

 

Since I did not use the Security > Traffic Control method, I must have done it the Classic 802.1q way.  However the Classic 802.1q way for me is:

config t

int fa0/1

switchport access vlan 51

 

But in this case that is neither here nor there.  

So my answer is Classic 802.1q way.      Hmmm wait, Regis, can I get a Lifeline?  

Thanks

Message 8 of 10
schumaku
Guru

Re: Private VLANs on the GC728X and GC752X Switches


@akio63 wrote: 

Okay you gave me two options.


Please keep in mind I'm just another community member, not a Netgear support or the like.

 

I would prefer to go to the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration config. Because this is what the documentation does request. At that point again, I would expect a different config pushed in place than a classic dot1q

 

This compares well to similar configurations on different switch models to support the asymmetrical VLAN configurations. And this is again a feature not supported on general dot1q configs. And this is in my understanding not a generic dot1q config  - so thus I was talking about that before

 

Afraid again, have no test horse available. The related answers could come from Netgear switch engineering (via support), some insight could come from comparing the configs generated by the two variants.

 

-Kurt

Message 9 of 10
akio63
Aspirant

Re: Private VLANs on the GC728X and GC752X Switches

@schumaku 

Okay I accept that answer.  I will have to play around with the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration config.  I have enough extra switches that I have a development lab to play around with different configurations.  I will give it a try and see how it works out.  

 

One question.  Private VLANs are used for containing traffic within the community, from my understanding.  When traffic needs to go outside of the community, say to another Private VLAN it would need to exit the Community via the promiscuous port.  Then where does it go?  Would it be routed by a router or Layer 3 switch to the other Private VLAN?  

 

Thanks,

Robert

Message 10 of 10
Top Contributors
Discussion stats
  • 9 replies
  • 2066 views
  • 0 kudos
  • 2 in conversation
Announcements