cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
788
Views
0
Helpful
2
Replies

IP unnumbered and Cat6500

iurii_andr
Level 1
Level 1

Hello everyone! I have a task "as is" to have one ip network spanning multiple 6500 interfaces(every interface will be connected to single department with dummy switch on remote side). In addition i need to have ip source guard or equivalen feature to restrict static ip address assignements by users. The problem is i have a quite old Sup2/MSFC2/PFC2 gear installed on 6500. My first idea was to use native mode with s222-adventerprisek9_wan-mz.122-18.SXF17, but there is no ip source guard feature there(optionally i thought to use MAC ACL+ IP ACL, which are dynamically filled with entries from management statoin as eligible users come online). Second option is was to use hybrid mode with  cat6000-sup2cvk9.8-6-4.bin and c6msfc2-adventerprisek9_wan-mz.122-18.SXF6, which supports  ip source guard, but does not support ip unnumbered for VLAN SVI.

So the question is there any option which allow single ip network to span multiple L3/SVI interfaces in hybrid mode, or any option like ip source guard in native mode.

1 Accepted Solution

Accepted Solutions

Giuseppe Larosa
Hall of Fame
Hall of Fame

Hello Iurii,

if there is a dumb switch on the remote site there is little you can do to protect the users from themselves.

Features like ip source guard are effective if configured near the end user.

Put each remote site in a separate ip subnet, it is the best choice also for limiting unnecessary broadcast traffic.

Edit:

You could try to play with IRB putting all SVI vlan interfaces in the same bridge-group.

I think I used if for a joining vlans in a sup2/MSFC2 with native IOS:

Also you can explore the use of Port ACL if supported you could be able to apply different ACLs to ports leading to different remote sites.

Hope to help

Giuseppe

View solution in original post

2 Replies 2

Giuseppe Larosa
Hall of Fame
Hall of Fame

Hello Iurii,

if there is a dumb switch on the remote site there is little you can do to protect the users from themselves.

Features like ip source guard are effective if configured near the end user.

Put each remote site in a separate ip subnet, it is the best choice also for limiting unnecessary broadcast traffic.

Edit:

You could try to play with IRB putting all SVI vlan interfaces in the same bridge-group.

I think I used if for a joining vlans in a sup2/MSFC2 with native IOS:

Also you can explore the use of Port ACL if supported you could be able to apply different ACLs to ports leading to different remote sites.

Hope to help

Giuseppe

Thank you Giuseppe for clue, but thats what i found in release notes for 12.1E (http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.1E/native/release/notes/OL_2310.html#wp218139)

"Integrated routing and bridging (IRB) and concurrent routing and bridging (CRB) have deliberately been disabled on the Catalyst 6500 series switches and Cisco 7600 Series Routers. You should use routable Layer 2 VLANs and VLAN interfaces for normal bridging and interVLAN routing. Bridge groups are supported only to bridge nonrouted protocols."

In addition to that i can say that i cannot separate clients seated on different 6500 interfaces to different subnets(customer caprice) - although almost all addresses are assigned by DHCP, there will be too much of ip subnets and they scared about it, plus "wise" clients who set addresses statically. So the solution must be seamless to customer and presume current design iseas. Maybe there is another option how to substitute either ip unnumbered in hybrid mode or ip source guard in native mode(i believe that for last thing i can use Port ACL to filter MACs and IP ACL attached to VLAN SVI to filter IPs). Thank you.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card