Native VLAN configuration

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Native VLAN configuration

Not applicable

I have configured a  couple of layer-3 subinterfaces on a aggregate, they are tagged as VLAN 700 and VLAN 800, in my cisco switch I have configured a trunk port that permits VLAN 700 and VLAN 800 to pass traffic across it. When plugged in, everything comes up just fine and I'm able to ping both interfaces etc etc.

As soon as I add a  native vlan to the trunk port the switch shuts it's interfaces down and stops passing traffic (due to a native vlan mismatch obviously) how do I configure a native vlan other than vlan 1 on a layer-3 interface on the palo alto.

Using VLAN 1 is NOT an option.

7 REPLIES 7

L4 Transporter

Hi Bjaming,

If you add a native vlan other then VLAN1 on the switch, then you might want to configure the same vlan tag  as configured on the trunk port on the switch on the ae interface on the PA firewall as well to see if that keeps the interface on the switch side up.

Do please let us know if this works for you.

Thanks

In the example above I mentioned VLAN 800 and 700, on the firewall I configured 2 layer-3 tagged sub-interfaces, one was tagged .800 the other was tagged .700

On the switch when I set the native VLAN as 700 (for example) traffic was no longer forwarded from the switch because the firewall, even though it was tagging traffic for VLAN 700 and 800 did not have the correct native VLAN configured on it's interfaces.

In effect I already tried that, and even though there was a sub-interface configured with the correct VLAN tag the switch still shut down the interfaces.

Thank you for the suggestion.

Okay just to simplify things,

I've removed the second vlan

I have created a VLAN named 888 with an ip on the switch side of 10.8.8.2/24

the interface configs are as follows

int g1/1/1

switchport trunk encapsulation dot1q

switchport mode trunk

int vlan 888

ip address 10.8.8.2 255.255.255.0

on the firewall

ethernet 1/3

link-speed auto;

link-duplex auto;

link-state auto;

layer3 {

  mtu1500;

  interface-management-profile ping-allowed;

ipv6 {

   enabled no;

   }

}

units {

ethernet 1/3.888 {

   mtu 1500;

   interface-management-profile ping-allowed;

   tag 888;

   ip {

     10.8.8.1/24 { }

    }

   ipv6 {

     enabled no;

    }

}

}

Configured like that I am able to ping, no problems

When I apply

switchport trunk native vlan 888

to interface g1/1/1 I am no longer able to ping.

How do I configure native VLAN tagging on a 4020?

Do I need to open a support ticket in order to get a resolution?

To get a better understanding of how you are trying to deploy this please open a case. the native vlan should be untag and should not have any problems. we may want to see what errors are generated on the palo alto interface.

Hello,

I would expect things to stop working after the native vlan command had been issued as from then on, traffic would be tagged from PA>Cisco and untagged from Cisco>PA.

Have you tried configuring your PA with a L2 port untagged assigned to VLAN 888?

Regards,

Dave

Sorry I've been on vacation (blackhat/defcon) I'll try an untagged l2 interface and get back to you guys, thanks for the help!

Hi,

Did that work in the end?

Regards,

Dave

  • 6953 Views
  • 7 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!