Sometimes network and business requirements in organizations demand Layer 2 traffic isolation between devices connected to the same physical switch while being part of the same Layer 3 segment or VLAN. A solution is to provide one VLAN per device (per customer in service providers). However, this leads to IP address wasting and does not provide any optimization.
In addition, the spanning tree operation can become very difficult and resource intensive while potentially using long access control lists, resulting in increased management complexity. This is where a private VLAN comes in handy to separate a regular VLAN domain into two or more subdomains.
In this article, we will provide the following:
Here are some of our other switch-related articles:
It is not that rare for network engineers to get requests to restrict Layer 2 traffic communication between two or more devices that belong to the same VLAN. In a situation like that, two different approaches can be used.
One of the benefits of using PVLANs is having simplified traffic management on the switch while conserving IP address space by not implementing additional VLANs simultaneously.
This is achieved using an existing common IP subnet subdivided into several private VLANs. Also, based on the configured PVLAN port types on the switch interfaces to which hosts are connected, some communications will be allowed, while others denied.
_________________
We make it easy for you to find the right switches for your network. Click below for hardware options or reach out to us and share the project you are currently working on.
_________________
To better understand the concept of PVLANs, you need to get familiar with the different PVLAN port types that can be used. A corresponding action applies to traffic communications based on the configured port type on the interface. A port in a PVLAN can be configured in one of the supported types:
The concept of PVLANs allows two types of VLANs to be implemented, primary and secondary VLANs. In a single PVLAN implementation, only one primary VLAN is divided into one or more secondary VLANs.
Each of those secondary VLANs can be an isolated or a community VLAN. In a PVLAN domain, you can configure only one isolated VLAN and multiple community VLANs. As shown in the past image, VLAN 50 is defined as the primary VLAN, VLANs 101 and 102 as community VLANs, while VLAN 201 is an isolated VLAN.
The VLANs in PVLAN implementation can be deployed in three different types:
802.1Q trunking can extend the primary, community, and isolated VLANs across multiple devices if they all support PVLANs.
If you find this content useful, subscribe to our mailing list and comment your feedback below. Need information or configuration instructions for a specific OEM switch? Let us know!
For the PVLAN configuration, we will use the same topology from the past image. The goal is for both the Sales (VLAN 101) and HR (VLAN 102) departments in the company to communicate only internally and to the internet, but not to each other or the FTP and TFTP servers in VLAN 201.
Furthermore, the servers should not be allowed to communicate with each other because of security reasons or to the Sales and HR departments, but only to the internet and IT department (upload and download traffic from IT) that is reachable over the promiscuous port connecting to the router.
Set the switch into VTP transparent mode, a requirement for implementing PVLANs.
Configure VLANs 101, 102, and 201 and identify them as community and isolated VLANs, respectively. View the commands below.
After you define the VLANs, you need to configure the interfaces into the appropriate PVLAN port types. For defining a port as promiscuous, you use the "promiscuous" keyword, while both the community and isolated ports are defined by using the same keyword, "host." Based on the secondary VLAN association, the ports will become either community or isolated.
Finally, the promiscuous port should be mapped to all secondary VLANs because traffic will flow from and to those VLANs. View the commands below.
Once the requirements are known, PVLAN implementation can easily be deployed on a switch. The best part is that besides the logical boundaries and traffic permissions in place, all devices connected to the switch ports continue to belong to the same IP subnet in the end, without adding new VLANs or IP readdressing. Moreover, PVLAN enables greater scalability due to a higher number of Layer 2 isolation networks than regular VLANs.
If scalability is a priority, ensure your network can handle future upgrades by utilizing EXTEND | SmartHands. Gain access to engineers around the globe to access your infrastructure locally without ever leaving your desk. They take on a range of responsibilities to extend your IT team, without the added overhead of hiring a full-time engineer.