Service Manual
The following conguration is based on the example diagram for the Z9500:
• Te 1/1 and Te 1/23 are congured as promiscuous ports, assigned to the primary VLAN, VLAN 4000.
• Te 1/25 is congured as a PVLAN trunk port, also assigned to the primary VLAN 4000.
• Te 1/24 and Te 1/47 are congured as host ports and assigned to the isolated VLAN, VLAN 4003.
• Te 4/1 and Te 23 are congured as host ports and assigned to the community VLAN, VLAN 4001.
• Te 4/24 and Te 4/47 are congured as host ports and assigned to community VLAN 4002.
The result is that:
• The ports in community VLAN 4001 can communicate directly with each other and with promiscuous ports.
• The ports in community VLAN 4002 can communicate directly with each other and with promiscuous ports.
• The ports in isolated VLAN 4003 can only communicate with the promiscuous ports in the primary VLAN 4000.
• All the ports in the secondary VLANs (both community and isolated VLANs) can only communicate with ports in the other
secondary VLANs of that PVLAN over Layer 3, and only when the ip local-proxy-arp command is invoked in the primary
VLAN.
NOTE: Even after you disable ip-local-proxy-arp (no ip-local-proxy-arp) in a secondary VLAN, Layer 3
communication may happen between some secondary VLAN hosts, until the ARP timeout happens on those secondary
VLAN hosts.
In parallel, on S4810:
• Te 1/3 is a promiscuous port and Te 1/25 is a PVLAN trunk port, assigned to the primary VLAN 4000.
• Te 1/4-6 are host ports. Te 1/4 and Te 1/5 are assigned to the community VLAN 4001, while Te 1/6 is assigned to the isolated
VLAN 4003.
The result is that:
• The S4810 ports would have the same intra-switch communication characteristics as described for the Z9500.
• For transmission between switches, tagged packets originating from host PVLAN ports in one secondary VLAN and destined for
host PVLAN ports in the other switch travel through the promiscuous ports in the local VLAN 4000 and then through the trunk
ports (1/25 in each switch).
Inspecting the Private VLAN Conguration
The standard methods of inspecting congurations also apply in PVLANs.
To inspect your PVLAN congurations, use the following commands.
• Display the specic interface conguration.
INTERFACE mode and INTERFACE VLAN mode
show config
• Inspect the running-cong, and, with the grep pipe option, display a specic part of the running-cong.
show running-config | grep string
The following example shows the PVLAN parts of the running-cong from the S50V switch in the topology diagram previously
shown.
• Display the type and status of the congured PVLAN interfaces.
show interfaces private-vlan [interface interface]
This command is specic to the PVLAN feature.
For more information, refer to the Security chapter in the Dell Networking OS Command Line Reference Guide.
• Display the congured PVLANs or interfaces that are part of a PVLAN.
show vlan private-vlan [community | interface | isolated | primary | primary_vlan |
interface interface]
Private VLANs (PVLAN)
573