[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Using the vlan allowed commands with vtp

Posted on 2013-01-30
1
Medium Priority
?
382 Views
Last Modified: 2013-01-30
I have a large vtp domain with different branches all off of one core. Say I want to keep a vlan 5 completely off of one of these branches, I.E. no spanning tree instance for that vlan, no vlan, etc on the branch switches.

Will the vlan allowed commands let me do this, or will it just prevent traffic from that vlan 5 from communicating with traffic from the vlan 5 over on the branch switches, which was still created by vtp.
0
Comment
Question by:ThePorthos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 25

Accepted Solution

by:
Ken Boone earned 2000 total points
ID: 38835856
The vlan allowed command simply blocks vlans other than what is allowed and the native vlan to flow over the trunk.  It does not affect the VTP protocol.  So it would block vlan 5 traffic from flowing over the trunk, which means that switch will still have vlan 5 but it will be isolated.
0

Featured Post

Looking for a new Web Host?

Lunarpages' assortment of hosting products and solutions ensure a perfect fit for anyone looking to get their vision or products to market. Our award winning customer support and 30-day money back guarantee show the pride we take in being the industry's premier MSP.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question