Solved

Using the vlan allowed commands with vtp

Posted on 2013-01-30
1
378 Views
Last Modified: 2013-01-30
I have a large vtp domain with different branches all off of one core. Say I want to keep a vlan 5 completely off of one of these branches, I.E. no spanning tree instance for that vlan, no vlan, etc on the branch switches.

Will the vlan allowed commands let me do this, or will it just prevent traffic from that vlan 5 from communicating with traffic from the vlan 5 over on the branch switches, which was still created by vtp.
0
Comment
Question by:ThePorthos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 25

Accepted Solution

by:
Ken Boone earned 500 total points
ID: 38835856
The vlan allowed command simply blocks vlans other than what is allowed and the native vlan to flow over the trunk.  It does not affect the VTP protocol.  So it would block vlan 5 traffic from flowing over the trunk, which means that switch will still have vlan 5 but it will be isolated.
0

Featured Post

Raise the IQ of Your IT Alerts

From IT major incidents to manufacturing line slowdowns, every business process generates insights that need to reach the people required to take action. You need a platform that integrates with your business tools to create fully enabled DevOps toolchains.

You need xMatters.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Make the most of your online learning experience.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question