Sometimes it is necessary to have policy and separate your Vlan like below diagram. In this diagram, WWW and FTP server have communication together, so we put in community. On the other hand, SQL server shouldn’t be seen by FTP or WWW server, so, we put on isolated. In fact, there are three types of sub Vlan in Private Vlan:
-
Promiscuous: can be reached by sub Vlan
-
Isolated : can not be seen by other Vlans
-
Community: only can see community member
Imagine we want to make primary vlan for these sub Vlan. We make a Vlan “100” as a primary:
Then, make sub Vlan for www and FTP as 101 and SQL as 102
After that, we put www, FTP and SQL in primary Vlan:
Next, we assign interface to each Vlan
To use show command: