When configuring a PVlan port as promiscuous can or does it still participate in normal Vlans. I have a 6509 that right now incorporates multiple vlans with a PIX firwall off of one of the ports that acts as the default gateway. I would like to incorporate PVlans but I belive I would have to make my G/W port a promiscuous port on the PVlan? Info that I have found has not really covered this. Any help/direction would really be appreciated.
In PVlan, the Primary Vlan looks like a normal vlan for other normal vlans on the switch. You can see this from the 'show vlan' command. For eg. vlan 100 is configured as the primary vlan in a Pvlan and 300 as the seconday vlan (isolated) for this Pvlan. Ports 3/1 and 3/2 are configured as isolated ports by assigning them to vlan 300 and port 3/14 is configured as promiscuous, you will see the folowing :
So, I think the primary and secondary vlans are visible only within the Pvlan, and the Pvlan looks like a normal vlan for other vlans. You can assign a port either to seconday, primary or normal vlan. They cannot belong to more than one of these vlans. Hence, the gateway connected to promiscuous port would like like it is connected to a normal vlan for other vlans, and would look like a primary vlan for the seconday vlans of that Pvlan. You can refer this document for more information :
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...