Contents
39
Software Configuration GuideāRelease IOS XE 3.9.xE and IOS 15.2(5)Ex
Configuring Private VLANs 47-1
About Private VLANs 47-1
Purpose of a PVLAN 47-2
PVLAN Terminology 47-3
PVLANs across Multiple Switches 47-5
Standard Trunk Ports 47-5
Isolated PVLAN Trunk Ports 47-6
Promiscuous PVLAN Trunk Ports 47-7
PVLAN Modes Over Gigabit Etherchannel 47-8
Private-VLAN Interaction with Other Features 47-8
PVLANs and VLAN ACL/QoS 47-8
PVLANs and Unicast, Broadcast, and Multicast Traffic 47-9
PVLANs and SVIs 47-10
Per-Virtual Port Error-Disable on PVLANs 47-10
PVLAN Commands 47-10
Configuring PVLANs 47-11
Basic PVLAN Configuration Procedure 47-12
Default Private-VLAN Configuration 47-12
PVLAN Configuration Guidelines and Restrictions 47-12
Configuring a VLAN as a PVLAN 47-15
Associating a Secondary VLAN with a Primary VLAN 47-16
Configuring a Layer 2 Interface as a PVLAN Promiscuous Port 47-17
Configuring a Layer 2 Interface as a PVLAN Host Port 47-18
Configuring a Layer 2 Interface as an Isolated PVLAN Trunk Port 47-19
Configuring a Layer 2 Interface as a Promiscuous PVLAN Trunk Port 47-21
Permitting Routing of Secondary VLAN Ingress Traffic 47-23
Configuring PVLAN over EtherChannel 47-24
Configuring a Layer 2 EtherChannel 47-24
Configuring a Layer 2 Etherchannel as a PVLAN Promiscuous Port 47-24
Configuring a Layer 2 EtherChannel as a PVLAN Host Port 47-26
Configuring a Layer 2 EtherChannel as an Isolated PVLAN Trunk Port 47-27
Configuring a Layer 2 Etherchannel as a Promiscuous PVLAN Trunk Port 47-28
Configuring MACsec Encryption 48-1
Understanding Media Access Control Security
and MACsec Key Agreement
48-2
MKA Policies 48-3
Key Lifetime and Hitless Key Rollover 48-3
Encryption Algorithms for MKA Control Packets 48-4
Virtual Ports 48-4