- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
Private VLANs on the GC728X and GC752X Switches
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Netgear Gurus,
I am trying to understand how the Private VLANs on the GC728X and GC752X switches operate. I have a Terminal Server that only negotiates to 100 Mbps Full. So we constantly see bandwidth utilization surpassing 80 to 90 percent. I decided to do a packet capture by placing a sniffer between the Netgear switch and the Terminal Server. Unfortunately, I am seeing traffic that is not destined for the Terminal Server on the wire.
For instance, this packet:
10.116.80.100 =>> 10.43.79.197
MAC ADD IP ADD NAME SRC/DST Switch Port PVID Participating VLANs
d0:67:26:d6:55:88 10.116.80.100 srv1 Source R1SW1 g14 111 111,112,114,116,117,120,156,158,159,161,163,164,501,505,1111,2111
98:90:96:e0:8b:ab 10.43.79.197 sim7 Destination R1SW2 g18 158 111,116,156,158,1111,2112
And this packet:
10.43.79.171 =>> 10.43.79.197
MAC ADD IP ADD NAME SRC/DST Switch Port PVID Participating VLANs
00:a0:69:0b:cc:c4 10.43.79.171 Time Svr Source R1SW2 g35 111 111,158,161
98:90:96:e0:8b:ab 10.43.79.197 sim7 Destination R1SW2 g18 158 111,116,156,158,1111,2112
I have the sniffer on port g15 on R1SW2 with the following configuration:
Switch Port PVID Participating VLANs
R1SW2 g15 159 111,159
Now, I can understand that since each source is in PVID 111 it is allowed to talk to g18 on R1SW2 since g18 is participating in VLAN 111. However, when the switch receives the packet and sees that the destination MAC address in its Address Table, shouldn't it be directing the packet to R1SW2 port g18? Why is the traffic being seen on R1SW2 g15?
There is no mirroring going on. The Admin Mode is False and the Destination Port is None.
Thank you.
Solved! Go to Solution.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@akio63 wrote:Okay you gave me two options.
Please keep in mind I'm just another community member, not a Netgear support or the like.
I would prefer to go to the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration config. Because this is what the documentation does request. At that point again, I would expect a different config pushed in place than a classic dot1q
This compares well to similar configurations on different switch models to support the asymmetrical VLAN configurations. And this is again a feature not supported on general dot1q configs. And this is in my understanding not a generic dot1q config - so thus I was talking about that before
Afraid again, have no test horse available. The related answers could come from Netgear switch engineering (via support), some insight could come from comparing the configs generated by the two variants.
-Kurt
All Replies
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
UPDATE
I need to correct something. This is not about Private VLANs (although I do need to discuss this but we will leave that for another discussion). This is about VLANs in general.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
What does all these other participating VLAN lost on the VLAN 111 where you expect only the Terminal Server traffic for for the VLAN 111?
If you only want VLAN 111 (probably as an untagged access port), so configure the beast accordingly. And nothing else.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
My apologies for not replying sooner, I have been busy.
No, I do not want only VLAN 111 traffic to reach the Terminal Server. I only want traffic from sim1 which is in VLAN 111 to reach the Terminal Server.
I want this traffic to reach the Terminal Server
10.43.79.208=>> 10.43.79.180
MAC ADD IP ADD NAME SRC/DST Switch Port PVID Participating VLANs
a4:bb:6d:5e:0e:35 10.43.79.208 sim1 Source R1SW1 g1 111 111,114,116,159,161,501,1111
00:80:d4:05:8a:30 10.43.79.180 TS1 Destination R1SW2 g15 159 111,159
Which it does. However, this additional traffic below, that I don't want is also reaching the Terminal Server
10.43.79.171 =>> 10.43.79.197
MAC ADD IP ADD NAME SRC/DST Switch Port PVID Participating VLANs
00:a0:69:0b:cc:c4 10.43.79.171 Time Svr Source R1SW2 g35 111 111,158,161
98:90:96:e0:8b:ab 10.43.79.197 sim7 Destination R1SW2 g18 158 111,116,156,158,1111,2112
How can I prevent that traffic from reaching the Terminal Server? Neither the source nor the destination is participating in VLAN 159 so it shouldn't reach the Terminal Server which has a PVID of 159. Or do I not understand the significance of the PVID? Do I need to create a new VLAN for sim1, say VLAN 800, put sim1 into VLAN 800 and remove VLAN 111 from the Terminal Server's Participating VLANs, as well as add VLAN 800 to it?
I tried using MAC address filtering to filter out traffic other than VLAN 111, MAC address a4:bb:6d:5e:0e:35 from Switch R1SW2 Port g15 which is the Terminal Server port, however the switch would not let me do that because, I assume, outbound MAC address filtering is restricted to multicast traffic only.
Thank you
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
Still curious why these devices (MAC address) are participating on that many VLANs. Are these many other VLANs routed combining many different subnets?
@akio63 wrote:
How can I prevent that traffic from reaching the Terminal Server?
Afraid, I can't understand this VLAN design on googles...
@akio63 wrote:
Neither the source nor the destination is participating in VLAN 159 so it shouldn't reach the Terminal Server which has a PVID of 159. Or do I not understand the significance of the PVID? Do I need to create a new VLAN for sim1, say VLAN 800, put sim1 into VLAN 800 and remove VLAN 111 from the Terminal Server's Participating VLANs, as well as add VLAN 800 to it?
So there must be other reasons why this VLAN does show up on the terminal server port.
The PVID does define the VLAN incoming untagged frames on a port are sent to.
@akio63 wrote:
I tried using MAC address filtering to filter out traffic other than VLAN 111, MAC address a4:bb:6d:5e:0e:35 from Switch R1SW2 Port g15 which is the Terminal Server port, however the switch would not let me do that because, I assume, outbound MAC address filtering is restricted to multicast traffic only.
As above - no idea on what magic you expect VLAN to be workable. In the typical use case, your define a VLAN xyz, configure for example two ports untagged for this VLAN xyz (and no other VLAN associations) and PVID xyz so all untagged frames on these two ports go to the VLAN xyz.
Are you trying to configure some asymmetric VLAN environment here?
In a clean VLAN environment, you have access ports configured to be in one VLAN xyz. The other simple config is a trunk connection, where you can carry more than one VLAN on a port, either all tagged, one untagged, and two or more untagged. Each VLAN does make up it's own network (and handle dedicated IP subnet each. Some special usages exist where you bring multiple networks to one port, e.g. a workstation untagged, and an IP phone tagged.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
Okay if you want to know (and have an hour to spare), I can explain the need for all the extra VLANs.
Let's take for example a simple port. Switch R1SW2 port g15 is a Terminal Server so it's PVID is 159. We want it to talk to a device on VLAN 111 so we added VLAN 111 to the Participating VLANs. We don't want everything on VLAN 111 to talk to the Terminal Server so we created VLAN 159 for the Terminal Servers and added VLAN 159 as a Participating VLANs for those ports that we do want to have connectivity to the Terminal Servers.
Switch Port PVID Participating VLANs
R1SW2 g15 159 111,159
We have the following VLANs defined:
VLAN Description Purpose
111 General Switch Traffic for Rig 1 All devices on Rig 1 that require connectivity to each other
159 Terminal Servers Terminal Servers that provide telnet sessions to users
Now for a more advanced port. Switch R1SW1 port g14 is srv1. It needs to talk to a lot of devices. So it is in PVID 111 and this gives it access to many other devices. We also want it to talk to the Terminal Servers as srv1 is a gateway into the Rig. Users ssh to srv1 then ssh to the Terminal Servers to reach various other devices in the Rig. So we want srv1 to talk to the Terminal Servers. We want the Terminal Servers to talk back to srv1.
But we don't want the Terminal Servers to be able to talk to anyone else. Some of those systems are simulation servers and backup simulation servers. And seeing their own traffic coming from a different IP address would mess it up and we could have corrupted data. So we added VLAN 159 to the Participating VLANs for Switch R1SW1 port g14 to allow srv1 to talk to the Terminal Servers. Server srv1 needs connectivity to other devices in other VLANs so we added those VLANs to the Participating VLANs as well to Switch R1SW1 port g14.
Switch Port PVID Participating VLANs
R1SW1 g14 111 111,112,114,116,117,120,156,158,159,161,163,164,501,505,1111,2111
I still wonder if this could be performed better using Private VLANs.
So this is the way it was explained to me. Traffic from srv1 comes into R1SW1 on port g14 and becomes tagged with VLAN 111. It has an IP address of 10.116.80.236/8. That traffic destined for the Terminal Server at IP address 10.43.79.180/8 is sent locally. The server srv1 should send an ARP request for 10.43.79.180. The Terminal Server will reply with it's MAC address. The switch R1SW1 will receive the packets from srv1 destined to the Terminal Server, check it's Address Table and see that the destination MAC address is on the port with the trunk between R1SW1 and R1SW2 and sends it out that port.
Now R1SW2 has the packet. The packet still has the VLAN tag 111. R1SW2 checks it's Address Table and sees the destination MAC address is on port g15. It also sees that VLAN 111 is allowed on port g15 so it sends it out that port to the Terminal Server.
Is this not correct?
Also, you stated:
@schumaku wrote:In the typical use case, your define a VLAN xyz, configure for example two ports untagged for this VLAN xyz (and no other VLAN associations) and PVID xyz so all untagged frames on these two ports go to the VLAN xyz.
So I believe that I do not understand the concepts of Tagged VLAN, Untagged VLAN and PVID.
PVID defines what VLAN tag will be placed on all incoming packets that are not tagged on that port..
Tagged means all packets transmitted for this VLAN will be tagged. For instance a trunk port.
Untagged means all packets transmitted for this VLAN will be untagged. For instance an access port.
Does the VLAN membership not dictate what VLAN traffic is allowed or dropped on an interface?
Thank you.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
All right ... to start with, pure curiosity: Are these VLANs configured the classic 802.1q way, or using the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration? Enough experienced on Cisco NX-OS L2 configs, but no Netgear CX7xx playground available.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
Okay you gave me two options.
Option 1
Classic 802.1q way
Option 2
Using the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration
Since I did not use the Security > Traffic Control method, I must have done it the Classic 802.1q way. However the Classic 802.1q way for me is:
config t
int fa0/1
switchport access vlan 51
But in this case that is neither here nor there.
So my answer is Classic 802.1q way. Hmmm wait, Regis, can I get a Lifeline?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@akio63 wrote:Okay you gave me two options.
Please keep in mind I'm just another community member, not a Netgear support or the like.
I would prefer to go to the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration config. Because this is what the documentation does request. At that point again, I would expect a different config pushed in place than a classic dot1q
This compares well to similar configurations on different switch models to support the asymmetrical VLAN configurations. And this is again a feature not supported on general dot1q configs. And this is in my understanding not a generic dot1q config - so thus I was talking about that before
Afraid again, have no test horse available. The related answers could come from Netgear switch engineering (via support), some insight could come from comparing the configs generated by the two variants.
-Kurt
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Private VLANs on the GC728X and GC752X Switches
Okay I accept that answer. I will have to play around with the Security > Traffic Control > Private VLAN > Private Vlan Port Mode Configuration config. I have enough extra switches that I have a development lab to play around with different configurations. I will give it a try and see how it works out.
One question. Private VLANs are used for containing traffic within the community, from my understanding. When traffic needs to go outside of the community, say to another Private VLAN it would need to exit the Community via the promiscuous port. Then where does it go? Would it be routed by a router or Layer 3 switch to the other Private VLAN?
Thanks,
Robert