<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Has anyone had success using Cisco Systems' Private VLANs and Palo Alto firewalls? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30641#M22429</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Hi Girvin,&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Is just another Vlan from our point of view. the link you provide mentions:&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; Such a mechanism allows end devices to share the same IP subnet while&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; being Layer 2 isolated, which in turn allows network designers to&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; employ larger subnets and so reduce the address management overhead.&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Connecting the firewall on (2)&amp;nbsp; L3 interfaces, assuming&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;that the private promiscuous port does not accept trunking. the firewall could &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;route between those 2 subnet and performing your security operations.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;If the other device &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;supports trunking of primary vlan over the trunk port, then our device just need to have that interface as l2 with &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333330154419px; line-height: 1.5em;"&gt;appropriate&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; vlan tag and route on L3 Assigned to Vlans.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;In other words, the isolated and/or community vlans are just mapping of the primary Vlan &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;and on the uplink port to the Firewall will be set to &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;promiscuous mode, with the primary VLAN mapped to the secondary VLAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Thank you&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Victor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Mar 2015 18:16:42 GMT</pubDate>
    <dc:creator>vcappuccio</dc:creator>
    <dc:date>2015-03-10T18:16:42Z</dc:date>
    <item>
      <title>Has anyone had success using Cisco Systems' Private VLANs and Palo Alto firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30640#M22428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have considered the benefits of &lt;SPAN class="h1" style="font-family: monospace; font-weight: bold;"&gt;Cisco Systems' Private VLANs (&lt;A href="https://tools.ietf.org/html/rfc5517" title="https://tools.ietf.org/html/rfc5517"&gt;RFC 5517 - Cisco Systems)&lt;/A&gt;&lt;/SPAN&gt;and taken a stab at implemented a test. the idea is that 192.168.2.100 and 192.168.2.101 are in separate private vlans, but may need to talk to each other and we would like the PA firewall to govern that communication&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Mar 2015 14:58:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30640#M22428</guid>
      <dc:creator>girvin</dc:creator>
      <dc:date>2015-03-10T14:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone had success using Cisco Systems' Private VLANs and Palo Alto firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30641#M22429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Hi Girvin,&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Is just another Vlan from our point of view. the link you provide mentions:&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; Such a mechanism allows end devices to share the same IP subnet while&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; being Layer 2 isolated, which in turn allows network designers to&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; employ larger subnets and so reduce the address management overhead.&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Connecting the firewall on (2)&amp;nbsp; L3 interfaces, assuming&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;that the private promiscuous port does not accept trunking. the firewall could &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;route between those 2 subnet and performing your security operations.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;If the other device &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;supports trunking of primary vlan over the trunk port, then our device just need to have that interface as l2 with &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333330154419px; line-height: 1.5em;"&gt;appropriate&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; vlan tag and route on L3 Assigned to Vlans.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;In other words, the isolated and/or community vlans are just mapping of the primary Vlan &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;and on the uplink port to the Firewall will be set to &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;promiscuous mode, with the primary VLAN mapped to the secondary VLAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Thank you&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;Victor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Mar 2015 18:16:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30641#M22429</guid>
      <dc:creator>vcappuccio</dc:creator>
      <dc:date>2015-03-10T18:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone had success using Cisco Systems' Private VLANs and Palo Alto firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30642#M22430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been successful in deploying this type of setup and communicating between secondary vlans that were associated with different primaries.&amp;nbsp; What girvin is talking about is something I was trying to accomplish as well and was unsuccessful.&amp;nbsp; I wanted to have 2 secondary vlans associated to the same primary and regulate communication between the two.&amp;nbsp; The issue seems to be something to how the Palo Alto responds to proxy arp or lack thereof.&amp;nbsp; My setup was like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Nexus:&lt;/P&gt;&lt;P&gt;interface e1/1&lt;/P&gt;&lt;P&gt;promiscuous trunk with correct mappings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN:&lt;/P&gt;&lt;P&gt;int e1/1 (tried with aggregate ethernet as well) &amp;gt; layer 2 &amp;gt; associate to a vlan I called vlan-bridge&lt;/P&gt;&lt;P&gt;int e1/1.100 &amp;gt; layer 2 &amp;gt; Tag 100 &amp;gt; vlan vlan.100 --&amp;gt; vlan.100 was then assigned an IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that I think about it, the physical and subinterfaces were in the same security zone.&amp;nbsp; I ran out of time and had to go a different route.&amp;nbsp; I wonder if having them in different security zones would be the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone out there has some insight, please share.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Apr 2015 20:18:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/has-anyone-had-success-using-cisco-systems-private-vlans-and/m-p/30642#M22430</guid>
      <dc:creator>android4255</dc:creator>
      <dc:date>2015-04-13T20:18:57Z</dc:date>
    </item>
  </channel>
</rss>

