>http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sft_6_1/configgd
>/vlans.htm
>
>http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/tech/c65sp_wp.htm
>
>Give a good idea of configuring and deploying PVLAN's
>

These pointers became my introduction to Private VLANs.  My first 
impression of the material was "huh?  What problem is this solving?"

My second impression is that the marketing people have come up with 
yet another proprietary name for a set of functions that all are 
well-defined, although admittedly it may be original to package them 
together.

The motivation for much of this seems to be generalizing "Ethernet" 
to non-LAN applications, such as using optical Fast or Gigabit 
Ethernet as an access technique.  Inside Nortel, I recently was 
accused of sending out the "sermon email" bewailing that the word 
"Ethernet" is being extended so that it's approximately as precise as 
"switch" or "hub," rather than a family of specific IEEE 802 
specifications and some vendor extensions.

As I read the Private VLAN spec, although I haven't extensively 
analyzed it, it appears to be a means of imposing a hub-and-spoke, 
NBMA subnet onto a switched Ethernet subnet.  In other words, 
switched Ethernet is normally a classical IP subnet that follows the 
local versus remote assumption:  if you are on the same subnet as 
another node, according to this assumption, you have layer 2 
connectivity to it.  WAN NBMA services such as frame and ATM partial 
meshes violate this assumption.

Private VLANs appear to be such a topology restriction, which I 
suppose may have applications when VLAN technology is simply being 
used for transmission. It's rather ironic that VLANs, as first 
defined in IEEE 802.10, were conceived as a security solution and 
included encryption.  The evolution to 802.1 took out the security 
features, but Private VLANs are introducing a different security 
mechanism.

If I went back to basics in the 802.10 model and applied it to 
private VLANs, considering one direction of transmission only just 
for simplicity, I might achieve a cryptographic equivalent that 
suggests that the promiscuous node had a set of decryption keys for 
traffic encrypted by isolated ports.  Isolated ports would each have 
a unique encryption key.  Another way to look at it is that there is, 
in IPsec terms, a set of security associations from the isolated 
ports to a common promiscuous port. Many-to-one topology, in contrast 
to the usual one-to-many we see in multicast.

On the other hand, the same topology could be achieved by having each 
isolated node use a /31 subnet, or some flavor of unnumbered subnet, 
and have the promiscuous node present some aggregated subnet to the 
larger routing system.

So I'm not sure precisely what problem this solves.  It seems to have 
an assumption that it is worthwhile to reduce the number of VLANs in 
the system, but I'm not completely sure why this is a problem. 
Limiting IDB consumption by subinterfaces perhaps?

_________________________________
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to