Solved

PVLAN on Cisco 3750

Posted on 2015-02-09
2
370 Views
Last Modified: 2015-02-10
Hi
I want to have my trunks in private-vlan promiscuous mode so that my secondary vlan will be mapped to primary vlan for tagging when going over trunk.

My problem is I don’t have the option to set the command sw mode private-vlan promiscuous on my port-channel only available on the physical interface.

Please advise why is not available on port -channel only when I’m in interface mode of port which is member of port channel.
See attached file.
Cisco-3750.jpg
0
Comment
Question by:ciscosupp
2 Comments
 
LVL 10

Expert Comment

by:Rafael
ID: 40599572
can you provide a clean show running config ?
0
 
LVL 12

Accepted Solution

by:
Fidelius earned 500 total points
ID: 40600432
You can't create an etherchannel with a private-vlan host-association. Cisco doesn't support that scenario.
From configuration guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configuration/guide/scg3750/swpvlan.html#wp1057603
Do not configure private-VLAN ports on interfaces configured for these other features:
–dynamic-access port VLAN membership
–Dynamic Trunking Protocol (DTP)
–Port Aggregation Protocol (PAgP)
–Link Aggregation Control Protocol (LACP)
–Multicast VLAN Registration (MVR)
–voice VLAN
–Web Cache Communication Protocol (WCCP)
Regards!
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Valid LIN protocol Protected ID values 1 37
Can't ping New Linux Servers 40 65
VPS for routing recomendations 3 49
Lightweight Networking 9 35
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question