Creating a private/isolated vlan on Cisco switch

Hello
I have many Cisco switches 65xx, 37xx at my company with a lot of vlans already configured.  I need to create a new isolation vlan that will not be able to communicate with my other existing vlans.  We are setting up a NAC solution at my company and we want a vlan that we can send ports to if the computer or device is compromised and cannot talk or risk the existing network (other vlans).  What is the best method to make this happen?
I have created VLANs in the past but this is my first dealing with private/isolated vlans and would be grateful for any guidance on how I should implement this.

So are you saying I should just create a new L2 vlan and not configure the vlan interface (which is at L3) for this new vlan so I cannot communicate with any of my existing vlans therefore isolating the new vlan?
Yes, without an SVI clients in that vlan cannot communicate with anything outside that vlan.
The only thing that wasn't clear was whether these clients should still be able to access the internet even though they couldn't talk to any other internal vlans. If they did need the internet, or any other remote network, then you would need an SVI but it sounds as though you don't want any external communication for these clients ?
Jon

Similar Messages

  • How to search/Scan Vlan of cisco switch ports

    Can any one tell me how i can scan/search vlans of cisco switch port through any monitoring tool (orion/solarwinds).
    Consider this scenario as i have no access to switch and i want to know below things:
    1-Vlans created on switch?
    2-which switch port belongs to which vlan id?
    Thanks

    Hi,
    You can do it only with hub in between and also please note that when sniffing with Wireshark on Windows the OS would remove VLAN tag so you may need to use Linux machine.
    Regards,
    Aleksandra

  • Configuring VLANs on Cisco switches - help on basics please!

    Hi people.
    I'm buying Cisco switches to my home lab to practice VLAN and have some doubts, would someone kindly help me?
    I'm thinking of buying two 300 series switches for the servers (VMware boxes), configure two separate VLANs for VMs and two other VLANs for desktop computers, in order to simulate a small office with a datacenter and two floors (one VLAN for each floor).
    I presume that the connection between each floor switch and the 300 series core switch will be via trunk mode on both, not access port mode, is that correct?
    Another question: for the desktop switches, the ports that are going to connect to the desktops (which runs windows with non-vlan tagging aware nic), will be configured with the correct VLAN, and the operating system will just communicate normally as if there was no VLAN tag on the frames?
    Since I need inter-vlan routing only on the core switch (the 300 series), for the desktops switches I can purchase some 200 series, right?
    And the last question: presuming that I configure a third VLAN and add a third floor switch, but this time a 100 series switch that is not VLAN capable, so connecting this switch to the 300 switch, will it work, or not?
    Thank you!

    Hi! Thanks for the rapid answers!
    I have a couple more based on the same questions:
    I presume that the connection between each floor switch and the 300 series core switch will be via trunk mode on both, not access port mode, is that correct? - Yes, trunk links are required to carry multiple vlans.
    So, I could also use multiple links with LAG/LACP carrying all vlans between switches?
    And the last question: presuming that I configure a third VLAN and add a third floor switch, but this time a 100 series switch that is not VLAN capable, so connecting this switch to the 300 switch, will it work, or not? - Yes, bit make sure that link between these two switches should be an access link, i.e must carry only third vlan.
    So, If I understand correctly, if having one vlan per floor in an office building, for economical reasons you could deploy simple non-managed and non-vlan capable switches, and in the data center, a core switch with the vlans configured for each floor?
    And viewing from a technical perspective, what would be the advantages of deploying in each floor a vlan capable switch configured with the correct vlan?
    And which method mentioned above is more common deployed for endpoint floor switches?
    Thanks!

  • Native VLAN on Cisco Switches

    I have a question regarding the default native  vlan, I have a cisco based environment and I set vlan XXX on a native on  trunk links, I also running Multiple Spanning Tree on my switches &  create instances for vlan segregation.
    My question is here could I put vlan 1 (default) in any of instance or not?
    Thanks & Regards,

    With MST, it is not running per VLAN spanning tree, it sends all BPDUs via instance 0 which is called the CIST. These frames are sent untagged via the native VLAN. Normally this is VLAN 1 but if you change it to another VLAN then the BPDUs are sent untagged on that native VLAN.
    Regarding if to use instance 0 or not, it is often recommended to create as many instances as you need to create the desired topology (usually two) and put your VLANs in those instances. It's a good pratice to map all your VLANs straight away because changing the instance to VLAN mapping makes the MST region become multi region until they all have the same instance to VLAN mapping.
    I would keep all VLANs out of instance 0 but it's definitely possible to have VLANs mapped in instance 0 as well.
    Daniel Dib
    CCIE #37149
    Please rate helpful posts.

  • How to set up VLANs for Cisco SG500 - 28 switch

    Hi,
    First of all, this is my first post in here, I hope someone can help me, and please be patient since I am very little experienced.
    OK, so let me explain you the scenarion that I am facing and hopefully someone will be able to help me.
    We have a Cisco SG500 - 28 port gigabit switch in our workplace.
    Our goal, is to create 3 VLANs and seperate the networks between different departements.
    VLAN1 (which is the default VLAN in the switch) - will be used for IT department and the management.
    VLAN100 - will be used for business .
    VLAN200 - will be used for guests who need to connect to the internet through WiFi.
    I have created VLAN100 and VLAN200, and VLAN1 is there by default.
    I want to use port 13 for VLAN200 and to connect the Wifi access-point there.
    The uplink is in port 25.
    I would be glad if you could explain me the stuff first in a abstract more general level, and then we can look at the specific scenario that we have.
    The Cisco SG500 - 28 gets internet from a Sophos UTM 9 router.
    I will need to take care of inter-VLAN routing as well, and subnet, and DHCP
    Thanks in advance,
    Kindest regards,
    D

    Hello Desmond,
    You have two different options:
    Option 1:
    Configure Sg500 switch as a Layer 2 switch and let the Sophos firewall do all the Layer 3 routing along with internet access. If you choose this option, then, you need to configure your uplink port as a trunk port and allow all 3 vlans to pass through. Also, you need to make sure that the Sophos device supports VLANs and trunking (or at least sub interfaces and create sub interfaces for each vlan). Also, all LAN devices will have the respective sub-interface/VLAN interface IP on the Sophos as their default gateway.
    Option 2:
    Configure SG500 switch as a Layer 3 device and configure intervlan routing to manage internal network traffic locally and send just the internet traffic to Sophos device.
    You need to create Layer 3 interfaces for VLAN1, VLAN100, and VLAN200 on SG500 and then make those Layer 3 interfaces default gateway for respective VLAN.
    You can configure the uplink port as an access port in one of the VLANs.
    Make sure that the Sophos device has an IP on the same subnet as the VLAN you chose for the uplink port.
    You also need to enter static routes on the Sophos device for the remaining two subnets on the SG500 (next hop address pointing to the IP address of the VLAN that the uplink port belongs to).
    Also, on the SG500, you need to configure a default route, next hop address pointing to the Sophos interface IP address.
    Hope this helps.
    Nagaraja

  • Creating multiple vlans across multiple switches

    Hi All,
    How should I create multiple vlans across multiple switches?
    For instance, I have two (primary/redudant) layer 3 (core) switches and four layer 2 access switches (Cisco 2960) for the hosts, and given these are the vlans/subnets to be created. Should I do it in the core switches only and it would just propagate through the access via VTP?  Just trying to practice and learn.. Any help will be greatly appreciated:)
    VLAN 100: [DHCP-workstations]
    172.26.4.0/24
    172.26.5.0/24
    VLAN 200: [Servers]
    172.16.1.0/24
    172.16.2.0/24
    VLAN 300: [Printers]
    192.168.129.0/24
    192.168.130.0/24
    VLAN 800: [Management for switches/routers]
    10.160.1.0/24

    Hi
    You will have the SVI on the core. Set a VTP domain, make one of the cores as VTP server and rest of the switches as VTP clients. Once you do this, you won't have to login into each switch and create a vlan locally. The vlans will be automatically advertised from the VTP server to all the VTP clients.
    Thanks
    Ankur
    "Please rate the post if found useful"

  • HP 3800 switch port-security one mac in two VLAN for Cisco IP Phone

    Hellow all!
    I'm want use port-security for ports on my HP 3800. But PC connected
    to network via PC port on Cisco ip phone. For phone used 10 voice VLAN,
    for data - 1 VLAN (native). Cisco phone add self mac-address in these
    two VLAN. On Cisco Switch 2960 i resolve this for 4 command:
    switchport port-security maximum 3
    switchport port-security mac-address pc_mac
    switchport port-security mac-address ip_phone_mac
    switchport port-security mac-address ip_phone_mac vlan voice
    How i can add one mac in two VLAN's on HP 3800 Switch?
    Sorry for my English, please ^_^
    This topic first appeared in the Spiceworks Community

    Hi Kuarzo, please reference the following;
    https://supportforums.cisco.com/document/116426/how-configure-dynamic-mac-port-security-sx300
    https://supportforums.cisco.com/document/116256/how-configure-static-mac-port-security-sx300

  • Passing Voice VLAN through a non-Cisco switch

    Hi All,
    Will a non-Cisco switch (no 802.1q support) that is putted beetween Cisco IP Telephone and Cisco Catalyst switch (which is configured with auxilary Voice Vlan) pass voice vlan frames and CDP?

    Any switch should pass on either ISL(which is cisco properitary and hence not supported on non-Cisco) or IEEE 802.1Q frames or else it cannot support voice vlan support . And non-Cisco switches do not support CDP as it is once again Cisco proprietary protocol.

  • 3com and cisco switches (802.1q)vlan integration problem - broadcast storm?

    Hi forum,
    we are using 3com switches, the 3com switches implement open vlans, which mean if an ieee 802.1q packet is received at a port and the port is not a member of that vlan, the switch does not perform vlan filtering. if the address is previously learned, it will be forwarded correctly, but if it is not, it will be flooded to all ports within that VLAN.
    my questions:
    1) if another cisco switch connected with the 3com switch are placed in the same vlan, and the 3com switch received a 802.1q packet from a rogue device, it will be flooded to all the ports(including the cisco ports) within that VLANs, will it cause a broadcast storm?
    2) how do i configure the cisco switch to filter off unknown tagged packet on a port? by using vlan prunning?
    3) how do i blocked the broadcast from the 3com switches? using broadcast suppression?
    4) is there a way on the design side to effectly counter this problem?
    Kind regards,
    paul

    It sounds like setup of your 3com switch is not quite up to your requirements. If a port is declared as tagged, it's ok to receive tagged frames for VLAN's that were not previously known on this port. However if your policy requires that only specific VLAN's are permitted on given tagged port, then you need to add some extra command on your 3com switch. Check with documentation and possibly with your 3com support partner.
    As for cisco routers, tagged ports in Cisco-speach are trunks (this might be confusing for you as 3com calls trunks what in Cisco world is known as either Etherchannel or port aggregation). By default a trunk (tagged) port allows any VLAN. If your policy requires so, you can explicitly specify which VLAN's are allowed on given trunk (tagged) port. If a frame arrives with a tag that is not on the allowed list, the frame will be discarded. So you don't need any fancy broadcast supression to block traffic from disallowed vlans coming from your 3com switch to cisco.
    P.S.: Make sure that you don't mistake 'member of VLAN' with 'native VLAN'. Some parts of your message suggest that you do.

  • How to get info over snmp on cisco switch whether native vlan on a port is tagged or not?

    Hi!
    I want to know which oid(s) should I query to know whether native vlan on trunk port on cisco switch is tagged or not?
    I am querying the oid .1.3.6.1.4.1.9.9.46.1.6.3.0 (vlanTrunkPortsDot1qTag) on cisco 3560 (E Series) and I am getting global value. Also, this OID is showing as deprecated. So I query .1.3.6.1.4.1.9.9.246.1.6 (cltcDot1qAllTagged) and its subtree, but no value is returned.
    Switch Version is
    Cisco IOS Software, C3560E Software (C3560E-UNIVERSALK9-M), Version 12.2(50)SE2

    Keep in mind that DHCP is a broadcast packet to start. So the AP can only listen in the subnet that it has an IP address for.
    Now, for any other subnet you can use the AP for DHCP but you have to have an IP helper address on your L3 pointing back to the AP.
    That being said, I wouldn't use the DHCP server on the AP as it is limited. You'd be better off using a Microsoft server or some other device that is designed for DHCP.
    HTH,
    Steve

  • VLAN's Cisco SF 300-24

    I need create vlans in Cisco SF 300-24 Switch.
    Ports 1 to 6 are available for other ports (from 7 to 24).
    For examples:
    port 7 is available for ports from 1 to 6 but is not available for ports from 8 to 24,
    port 8 is available for ports from 1 to 6 but is not available for ports from 9 to 24 and 7,
    port 9 is available for ports from 1 to 6 but is not available for ports from 10 to 24 and 7 and 8,
    .....(to port 24)
    How I can do it?
    When I add ports from 1 to 6 to VLAN 12, the ports was automatically removed with VLAN 11(in attachment).

    Hi Dominik,
    Here are the rules for VLANs ..
    When you set the switch port  interface to  access mode, a switch port can be only a member of one untagged VLAN
    When you set the switch port  interface to trunk mode, a switch  port can be a member of only one untagged VLAN but also a  member of many Tagged VLANs.
    But what you seem to be trying to achieve is use ports 1-7 as  unprotected or open  ports  for  ports 8-24 within the switch.
    Really seems like something called  Priveate Vlan Edge PVE, whereby protected ports will only forward packets to unprotected ports and not other protected ports. .
    Here is the definition found in the help text from within the switch.
    Protected Port—Select to make this a protected port. (A protected port is also referred as a Private VLAN Edge (PVE).) The features of a protected port are as follows:
    Protected Ports provide Layer 2 isolation between interfaces (Ethernet ports and Link Aggregation Groups (LAGs)) that share the same Broadcast domain (VLAN).
    Packets received from protected ports can be forwarded only to unprotected egress ports. Protected port filtering rules are also applied to packets that are forwarded by software, such as snooping applications.
    Port protection is not subject to VLAN membership. Devices connected to protected ports are not allowed to communicate with each other, even if they are members of the same VLAN.
    Both ports and LAGs can be defined as protected or unprotected. Protected LAGs are described in the Configuring Link Aggregation section.
    So my steps were
    So I am wondering if you really need to configure alot of vlans.
    make ports 8-24 protected port
    Save the configuration
    Clicked to tick the option to protect switch port 8.
    That's what we end up with , port 8 is now protected.
    Now lets copy the settings from port 8 to ports 9-24, see the circled area below.
    now will in the ports you also wish to protect.
    Now ports 8-24 are protected ports.
    Hosts on these ports will only be able to communicate with hosts on ports 1-7 or  switch port 24 onwards, in the case of my switch.
    Make sure you save your configuration.
    I hope this is what you want.
    regards dave

  • Mixing public and private networks on the same switch

    Hello Everyone,
    I know this may get some security engineers in frenzy but wanted to know if there is a safe way to mix public and private networks on the same switch. 
    We have many remote offices that we want to add public wifi and a couple of other services that would be completely outside of our internal network.  Each office has a 3750 with plenty of open ports.  How can I safely create a vlan for public access on these switches which currently have our internal network on.  I have read that people are doing this to save on the cost of purchasing a dedicated switch.  Some people are using access lists and one person mentioned creating a private vlan for the public network.  I looked up private vlan and it seemed bit confusing.
    Is this recommended?  If not what would be the safest way to do this?
    Thanks Everyone

    Disclaimer
    The  Author of this posting offers the information contained within this  posting without consideration and with the reader's understanding that  there's no implied or expressed suitability or fitness for any purpose.  Information provided is for informational purposes only and should not  be construed as rendering professional advice of any kind. Usage of this  posting's information is solely at reader's own risk.
    Liability Disclaimer
    In  no event shall Author be liable for any damages whatsoever (including,  without limitation, damages for loss of use, data or profit) arising out  of the use or inability to use the posting's information even if Author  has been advised of the possibility of such damage.
    Posting
    How "safe" is relative.  If your running just one VLAN on a switch, that's would be the safest (basically the same as mixing traffic on the same wire - separation is done else where).
    If you multiple VLANs on a switch, then you need to determine how likely someone might figure out a way to breach the VLAN barriers.  (This isn't so easy on newer switches.)  If the VLAN isolation is breeched, then you need to examine what does that imply from a security perspective (for example can someone now inject or receive other VLAN traffic).
    For most purposes, I don't see mixing public and private VLANs, alone, on the same switch as much of a risk.  More of a concern is what can be reached on either VLAN and how well it's protected.

  • Add Cisco Switch into a configuration

    I have a Dell 6248 switch with three VLANS defined (1,2,10).
    I need to expand VLAN 10 (need more ports) on the Dell Switch.
    I have downloaded the Cisco CNA.
    In the attached screen of the CNA, am I on the correct display to create a new VLAN 10 ?
    What is the best way to connect the Dell Switch to the Cisco?  
    thanks

    Yes, so far 21-24 are in VLAN 10, but I will need to set a few more .
    This is bit more complicated.
    What I am looking at an old test and dev virtual infrastructure configuration that was set up with a 1GB Linksys Switch and a Dell 6248 Switch.
    The reason given for the Linksys in the config is it was the only 1GB switch available at the time when the SAN had to be installed and there were no more available ports on the 6248. Running Dell Dpack reports show latency issues when migrating from an EqualLogic Volume to a MD3200 volume and from the MD3200 to Md3200 volumes (on the order of 30-45 minutes for a 20GB VM). Migrating from EqualLogic volumes to EqualLogic volumes is in seconds.
    I think the Linksys is the issue as does our Dell reps. We are looking at replacing the Linksys with a Cisco or another L2/L3.
    SAN traffic is isolated to VLAN 10 on the Dell Switch. I want to set up a VLAN 10 on the Cisco switch and then want to connect the Md3200 to the Cisco which will be connected to VLAN 10 on the Dell Switch for access to an EqualLogic SAN.  I am not sure what will be involved.
    Is it as simple as what you are saying,, I config the VLAN10 on the Cisco switch and connect a port from the Cisco to VLAN 10 on the Dell Switch.. .
    I have a diagram attached,,,it needs some updates but it is close to the config.

  • Can not add a vlan on cisco 876

    Hello.
    I' trying to add a vlan on vlan database of a cisco 876, but it says to me:
    Router#vlan database
    Router(vlan)#vlan 2
    Vlan can not be added. Maximum number of 1 vlan(s) in the database.
    why I can't add a new vlan?
    I have the c870-advsecurityk9-mz.124-4.T7 image.
    thanks

    The VLAN database is relevant to switches, not to routers.
    I presume your router is connected to a switch that can handle VLANs. That is where you need to create your layer-2 VLANs. If you want your router to connect to a VLAN, say VLAN 2, then you have to do it something like this:
    interface f0.2
    encapsulation dot1q 2
    ip address 192.168.2.1 255.255.255.0
    Repeat that for however many VLANs you want to route.
    Kevin Dorrell
    Luxembourg

  • Etherchannel trunk with two cisco switch

    Hi, my company using only one Cisco 3750 switch with VLAN1,2,3,4,5. 
    Now my company bought another cisco switch and we would like to etherchannel trunk between both and create new VLAN in new switch.  We look over from partner, some of them suggested we use LACP, and some of them suggest we use PAgP.  We are so confuse which will be better in our environment.
    Previous: Router <> 3750 switch A (VLAN 1,2,3,4,5)
    Now we bought another Cisco Switch B:  Router <>3750 switch A <> switch B (add more VLAN 6,7,8,9,10)
    Which of below command is the best choice to suit our company ? suppose we use 2 port of gigabitethernet 1/0/1 and 1/0/2 trunk?  All VLAN 1-10 need to communicate with each other.
    interface GigabitEthernet1/0/1
     channel-group 1 mode active  <<< (use "active" or "desirable" is the best choice)
     switchport mode trunk
    interface GigabitEthernet1/0/2
     channel-group 1 mode active
     switchport mode trunk
    interface Port-channel 1
     switchport trunk encapsulation dot1q << (do we need put this? as we think this is by default after trunk?)
     switchport mode trunk
     switchport nonegotiate <<< (do we need "nonegotiate" if both switch setup same configure?)

    Hello
    My understanding is pagp and lacp basically perform the same features - however as PAGP is cisco propriety LACP is IEEE standard which can be used between different route/switch vendor platforms.
    As for disabling DTP ( switchport nonegotiate) - i would agree to do this suggestion, As so not to  have trunks being dynamically created.
    Lastly i would manually prune unused vlans across trunk interfaces, to save on cpu and memory usage because of the stp instances that coild be used ( however such a small vlan database  like yours would not be an issue)
    So to summarise:
    Cisco to Cisco ehterchannels =PAGP
    Cisco to other vendors = LACP
    L2 etherchannel
    ================
    1) default physical interfaces (if possible)
    2) configure port-channel in physical interfaces
    -- port-channel will be created automatically
    3)create trunking encapsulation or access port mode directly in port-channel interface
    4)enable physical interfaces "no shut"
    conf t
    default int ran fa0/1 -3 ( if applicable)
    int ran fa0/1 -3
    shut ( if applicable)
    channel-group 1 mode xxx
    int port-channel 1
    switchport trunk encap dot1q
    switchport- mode trunk
    switchport nonegotiate
    switchport trunk allowed vlan 1-10
    res
    Paul

Maybe you are looking for

  • Javascript in acrobat form field not working on IOS

    Can anyone help me with this script. I have found online. It works on MAC but not on iOS? its for an acrobat form field, to make cursor at end of text box jump to next. 'if ( event.fieldFull || event.willCommit ) this.getField("Text1").setFocus();' I

  • X201: Picture quality when hooked up to a monitor

    Is the picture quality equivalent to a desktop being hooked up to a monitor? Machine Type: M90z AIO ; Product: 3091CTO (Custom), CPU: i5-650, Video Card: Intel(R) HD Graphics, Memory: 4.00 GB, Network Card: Intel(R) WiFi Link 1000 BGN, OS: Windows 7

  • Output to line printer (132 x 66)

    I need to print statement to a Line Printer (such as Epson LQ-1600K) on preprinted form. Should I use character mode? I've tried to setup a character mode report as described in Daily BI Views (except output chr(14) to printer) The layout of printout

  • Default required message customisation

    Dear Friends, Is it possible to change the default required message "You must enter value" to customised one in the entity level itself. At the same time, Component hyperlink also should get display. version iam working is 11.1.1.3.0 Kindly tell me t

  • Connect and resource role

    I have created a user and granted connect,resource to that user. Then how the unlimited tablespace quota is applied automatically over that user? whereas when I am applying all the privileges under the connect,resource separately the user is not gett