Kings
This is a required configuration, trunk native vlan just sets the
native vlan it does not allow the vlan across the trunk link. For this
to happen with vlan pruning enabled, the vlan has to be allowed on the
trunk.
Stu
Sent from my iPhone
On 13 Apr 2010, at 17:59, Kingsley Charles
<[email protected]> wrote:
Hi Brandon
If I remove vlan 12 and configure as following, the ping to
192.1.12.10 fails.
switch trunk allowed vlan123
I am wondering, is vlan 12 in the allowed vlan list a must?
With regards
Kings
On Tue, Apr 13, 2010 at 10:21 PM, Brandon Carroll <[email protected]
> wrote:
Here's a sample:
Interface E0/0 ------------------------>>> This traffic is NOT
tagged by the ASA since its on the main interface its assumed that
its native.
nameif outside
sec 0
ip add 192.1.12.10 255.255.255.0
no shut
Interface e0/0.1 ------------------------>>> This traffic is
Tagged.
vlan 123
nameif DMZ
security-level 50
ip add 10.2.2.200 255.255.255.0
On the switch:
Interface f0/1 (or whatever interface it connected to on the switch)
swi tr en dot1q
swi mode tr
swi trunk native vlan 12 ----------->> Subnet 192.1.12.0/24 is on
this vlan
swi tru allowed vlan 12,123 ------------>>> This just allows tagged
vlan traffic on the trunk, it does not force traffic for these vlans
to be tagged.
Regards,
Brandon Carroll - CCIE #23837
Senior Technical Instructor - IPexpert
Mailto: [email protected]
Telephone: +1.810.326.1444
Live Assistance, Please visit: www.ipexpert.com/chat
eFax: +1.810.454.0130
IPexpert is a premier provider of Self-Study Workbooks, Video on
Demand, Audio Tools, Online Hardware Rental and Classroom Training
for the Cisco CCIE (R&S, Voice, Security & Service Provider)
certification(s) with training locations throughout the United
States, Europe, South Asia and Australia. Be sure to visit our
online communities at www.ipexpert.com/communities and our public
website at www.ipexpert.com
On Apr 13, 2010, at 9:35 AM, Kingsley Charles wrote:
H Brandon
I am not getting your point. Please find my understanding:
Point 1
With IOS router, by default the physical interface will handle all
the untagged frames and put them in vlan 1.
or
You can configure a default vlan for physical interface using
"encapsulation dot1Q 2 native"
But with ASA, there is no option to specify a native vlan.
I am wondering, will support ASA receive untagged frames.
Point 2
If is true that ASA supports untagged frame, I am not getting why
we need to add the native vlan in the allowed list. For what
purpose are we adding a native vlan in allowed list?
With regards
Kings
On Tue, Apr 13, 2010 at 9:24 PM, Brandon Carroll <[email protected]
> wrote:
Vlan 12 in the allowed list does not make it tagged if its the
native vlan. You would need it in the allowed list if the switch
was tagging all vlans including the native.
Regards,
Brandon Carroll - CCIE #23837
Senior Technical Instructor - IPexpert
Mailto: [email protected]
Telephone: +1.810.326.1444
Live Assistance, Please visit: www.ipexpert.com/chat
eFax: +1.810.454.0130
IPexpert is a premier provider of Self-Study Workbooks, Video on
Demand, Audio Tools, Online Hardware Rental and Classroom Training
for the Cisco CCIE (R&S, Voice, Security & Service Provider)
certification(s) with training locations throughout the United
States, Europe, South Asia and Australia. Be sure to visit our
online communities at www.ipexpert.com/communities and our public
website at www.ipexpert.com
On Apr 13, 2010, at 3:18 AM, Kingsley Charles wrote:
That is what we need, right?
The traffic to the phsyical interface should not be tagged. The
physical interface can't understand tagged traffic. Only the sub-
interface can understand tagged traffic with the "vlan" keyword.
vlan 12 in the allowed vlan list, makes it tagged.
With regards
Kings
On Tue, Apr 13, 2010 at 2:54 PM, 'Segun Daini
<[email protected]> wrote:
To allow the trunk to pass vlan 12 traffic. specifying it a the
native vlan is just telling the switch to not TAG vlan 12 traffic.
Regards
From: Kingsley Charles <[email protected]>
To: [email protected]
Sent: Tue, April 13, 2010 9:56:31 AM
Subject: [OSL | CCIE_Security] Native vlan mapped to physical
interface
Hi all
Vol 2 > Lab 15 > Section 1.0
ASA1's e0/0 is connected to cat 3 f0/10.
vlan 12's subnet address is 192.1.12.0.
e0/0's IP address is 192.1.12.10.
"switchport trunk native vlan 12" alone is suffice to route
traffic from "192.1.12.0" to ASA1's e0/0.
Why are we adding vlan 12 in the trunk allowed list?
ASA 1 config
interface Ethernet0/0
nameif outside
security-level 0
ip address 192.1.12.10 255.255.255.0 standby 192.1.12.60
!
interface Ethernet0/0.55
vlan 55
nameif DMZ55
security-level 55
ip address 192.168.5.10 255.255.255.0 standby 192.168.5.60
Cat3 config
interface FastEthernet0/10
description ASA1 F0/0
switchport trunk encapsulation dot1q
switchport trunk native vlan 12
switchport trunk allowed vlan 12,55
switchport mode trunk
With regards
Kings
_______________________________________________
For more information regarding industry leading CCIE Lab training,
please visit www.ipexpert.com
_______________________________________________
For more information regarding industry leading CCIE Lab training,
please visit www.ipexpert.com
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com