Juniper Networks EX2500 manual Private VLANs, Private Vlan Ports

Page 43

Chapter 2: VLANs

Private VLANs

Private VLANs provide Layer 2 isolation between the ports within the same broadcast domain. Private VLANs can control traffic within a VLAN domain, and provide port-based security for host servers.

Use private VLANs to partition a VLAN domain into sub-domains. Each sub-domain is comprised of one primary VLAN and one or more secondary VLANs, as follows:

„Primary VLAN—Carries unidirectional traffic downstream from promiscuous ports. Each private VLAN configuration has only one primary VLAN. All ports in the private VLAN are members of the primary VLAN.

„Secondary VLAN—Secondary VLANs are internal to a private VLAN domain, and are defined as follows:

„Isolated VLAN—Carries unidirectional traffic upstream from the host servers toward ports in the primary VLAN and the gateway. Each private VLAN configuration can contain only one isolated VLAN.

„Community VLAN—Carries upstream traffic from ports in the community VLAN to other ports in the same community, and to ports in the primary VLAN and the gateway. Each private VLAN configuration can contain multiple community VLANs.

After you define the primary VLAN and one or more secondary VLANs, you map the secondary VLAN(s) to the primary VLAN.

Private VLAN Ports

Private VLAN ports are defined as follows:

„Promiscuous—A promiscuous port is a port that belongs to the primary VLAN. The promiscuous port can communicate with all the interfaces, including ports in the secondary VLANs (isolated VLAN and community VLANs). Each promiscuous port can belong to only one private VLAN.

„Isolated—An isolated port is a host port that belongs to an isolated VLAN. Each isolated port has complete Layer 2 separation from other ports within the same private VLAN (including other isolated ports), except for the promiscuous ports.

„Traffic sent to an isolated port is blocked by the private VLAN, except the traffic from promiscuous ports.

„Traffic received from an isolated port is forwarded only to promiscuous ports.

„Community—A community port is a host port that belongs to a community VLAN. Community ports can communicate with other ports in the same community VLAN, and with promiscuous ports. These interfaces are isolated at Layer 2 from all other interfaces in other communities and from isolated ports within the private VLAN.

Private VLANs „ 29

Image 43
Contents North Mathilda Avenue Sunnyvale, CA Configuration GuideIi „ Table of Contents Chapter VLANs Rmon Overview Rmon Group 1-Statistics Rmon Group 2-History Chapter Ports and TrunkingAppendixes Port Mirroring Overview Configuring Port MirroringIndexes Port-Based Vlan Assignment Default Vlan SettingsPage List of Tables EX2500 Ethernet Switch Configuration Guide „ List of Tables Supported Platforms About This GuideObjectives AudienceIcon Meaning Description Documentation ConventionsDocumentation Feedback List of Technical PublicationsRequesting Technical Support Opening a Case with Jtac Self-Help Online Tools and ResourcesEX2500 Ethernet Switch Applications Page Configuring the Management Interface Accessing the SwitchConfigure the default gateway. Enable the gateway Dynamic Host Configuration ProtocolUsing the EX2500 Web Device Manager Using TelnetConfiguring EX2500 Web Device Manager Access via Https Configuring EX2500 Web Device Manager Access via HttpSNMPv1, SNMPv2 Using SnmpUser Configuration Default ConfigurationSNMPv3 Configure an entry in the notify table Configuring Snmp Trap HostsSNMPv1 Trap Host Configuration SNMPv2 Trap Host ConfigurationSNMPv3 Trap Host Configuration Securing Access to the SwitchConfigure the Radius secret Radius Authentication and AuthorizationHow Radius Authentication Works Configuring Radius on the SwitchRadius Authentication Features in the EX2500 Switch Radius Attributes for EX2500 User Privileges Switch User AccountsHow TACACS+ Authentication Works TACACS+ AuthenticationTACACS+ Authentication Features in the EX2500 Switch „ starttime „ stoptime „ elapsedtime „ disccause Configuring TACACS+ Authentication on the Switch Command Authorization and LoggingConfigure the TACACS+ secret and second secret SSH Encryption of Management Messages Configuring SSH Features on the SwitchGenerating RSA Host and Server Keys for SSH Access Secure ShellSSH Integration with Radius and TACACS+ Authentication End User Access ControlUser Access Control Considerations for Configuring End User AccountsLogging In to an End User Account Listing Current UsersVlan Overview VLANsPvid Numbers „ Port configurationVLANs and Port Vlan ID Numbers Vlan NumbersVlan Tagging Illustrates the default Vlan settings on the switchDefault Vlan Settings Port-Based Vlan Assignment Vlan Topologies and Design Considerations Vlan Configuration RulesMultiple VLANs example in is described in Table Multiple VLANs Configuration ExampleEnable tagging on uplink ports that support multiple VLANs Private Vlan Ports Private VLANsVerify the configuration Private Vlan Configuration GuidelinesPrivate Vlan Configuration Example Configure a secondary Vlan and map it to the primary VlanSpanning Tree Overview Spanning Tree ProtocolDetermining the Path for Forwarding BPDUs Bridge Protocol Data Units BPDUsBridge Priority Port Path Cost Spanning Tree Group Configuration GuidelinesChanging the Spanning Tree Mode Port PriorityRules for Vlan Tagged Ports Creating a VlanAdding and Removing Ports from STGs Port State Changes Rapid Spanning Tree ProtocolEdge Port Rstp Configuration GuidelinesRstp Configuration Example Port Type and Link TypeWhy Do We Need Multiple Spanning Trees? Default Spanning Tree ConfigurationPer Vlan Rapid Spanning Tree Configuring Pvrst Pvrst Configuration GuidelinesCommon Internal Spanning Tree Mstp Configuration GuidelinesMultiple Spanning Tree Protocol Mstp RegionImplementing Multiple Spanning Tree Groups Multiple Spanning Tree Groups Configuration ExampleVlan Fast Uplink ConvergenceConfiguring Fast Uplink Convergence Configuration GuidelinesTrunking Overview Ports and TrunkingStatistical Load Distribution Before Configuring Static Trunks Built-In Fault ToleranceTrunk Group Configuration Rules Port Trunk Group Configuration Example Port Trunking Configuration ExampleFollow these steps on the EX2500 switch Define a trunk group „ Destination IP DIP Configurable Trunk Hash AlgorithmLink Aggregation Control Protocol „ Destination MAC Dmac48 „ Link Aggregation Control Protocol Set the Lacp mode Lacp Configuration GuidelinesConfiguring Lacp Optionally Reducing Lacp TimeoutEx2500config-if# lacp timeout short ex2500config-if# exit QoS Overview Quality of ServiceCOS Using ACL FiltersTo delete an IP Standard ACL MAC Extended ACLsIP Standard ACLs To delete a MAC Extended ACLTo delete an IP Extended ACL IP Extended ACLsTCP/UDP Understanding ACL PriorityACL Example 1-Blocking Traffic to a Host ACL Configuration ExamplesAssigning ACLs to a Port Viewing ACL StatisticsAdd the ACL to a port ACL Example 3-Blocking Http TrafficAssign the ACLs to a port ACL Example 4-Blocking All Except Certain PacketsConfiguring Storm Control Using Storm Control FiltersBroadcast Storms Differentiated Services Concepts Using Dscp Values to Provide QoSAssured Forwarding Drop Precedence Class Per Hop BehaviorQoS Levels Use the following command to perform Dscp mappingDscp Mapping Shows the priority bits in a VLAN-tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling Rmon Overview Remote MonitoringRmon Group 1-Statistics Configure the Rmon statistics on a portRmon Group 2-History Configuring Rmon HistoryConfigure the Rmon History parameters for a port This configuration enables Rmon History collection on portConfigure the Rmon Alarm parameters to track Icmp messages Rmon Group 3-AlarmsAlarm MIB Objects Configuring Rmon AlarmsRmon Group 9-Events Ex2500config# rmon event 110 type log-onlyPage Igmp Snooping IgmpFastLeave IGMPv3 Snooping Igmp Snooping Configuration ExampleEx2500# show ip igmp groups Static Multicast RouterHigh Availability Overview High Availability Through Uplink Failure DetectionFailure Detection Pair Spanning Tree Protocol with UFD UFD Configuration GuidelinesMonitoring UFD UFD Configuration ExamplePage Appendixes EX2500 Ethernet Switch Configuration Guide 80 „ Appendixes Port Mirroring Overview „ Port Mirroring Overview on „ Configuring Port Mirroring onConfiguring Port Mirroring „ Index on IndexesEX2500 Ethernet Switch Configuration Guide 84 „ Indexes Numerics IndexInternet Group Management Protocol. See Igmp Management interface, configuringMulti-links between switches, port trunking Physical. See switch portsSegmentation. See IP subnets Segments. See IP subnets Quality of Service. See QoSQoS SecurityExample showing multiple VLANs Virtual Local Area Networks. See VLANs