<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Private vlan with fabric attach in Network Architecture &amp; Design</title>
    <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116896#M2763</link>
    <description>&lt;P&gt;If you deploy FabricEngine to the access, you can use PVLANs, and you can use RADIUS authentication (MAC based or 802.1X) to automatically place a user/device in the PVLAN of choice. These PVLANs will have L2 I-SID associated, so the PVLAN can easily span the entire fabric if needed. But note that Fabric Engine does not support PVLAN Community VLAN ids; all you have is the primary and secondary VLAN ids, for isolated and promiscuous users.&lt;/P&gt;&lt;P&gt;Switch Engine also supports PVLANs, including the PVLAN Communities. But if you are using Switch Engine FA Proxy access off a Fabric Engine Fabric FA Server(s), then PVLANs cannot be used, as Fabric Attach signalling can only signal 1 VID per I-SID. You would have to disable FA between the Switch Engine and the Fabric Engine, and q-tag trunk all the PVLANs manually.&lt;/P&gt;</description>
    <pubDate>Mon, 25 Nov 2024 14:52:38 GMT</pubDate>
    <dc:creator>Ludovico_Steven</dc:creator>
    <dc:date>2024-11-25T14:52:38Z</dc:date>
    <item>
      <title>Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/112014#M2746</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we want to deploy private vlans in our fabric attach infrastructure, in order to limit the traffic in the same subnet.&lt;/P&gt;&lt;P&gt;All the endpoints are connected to access switches (that are in SwitchEngine/EXOS), while core switches are used only as distribution layer.&lt;/P&gt;&lt;P&gt;For EXOS, I had this link as a reference&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.extremenetworks.com/exos_30.4/GUID-56B81F2C-8A3B-4303-A212-92322613EFAA.shtml" target="_blank" rel="noopener"&gt;https://documentation.extremenetworks.com/exos_30.4/GUID-56B81F2C-8A3B-4303-A212-92322613EFAA.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Where it is possible to extend the private vlans between switches. My question is, which configuration is needed on backbone switches (fabric engine), to extend the private vlans between access switches?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 10:12:54 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/112014#M2746</guid>
      <dc:creator>SimoneZ</dc:creator>
      <dc:date>2024-08-28T10:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/112051#M2747</link>
      <description>&lt;P&gt;Private VLANs (PVLANs) are always defined using 2 VLAN-ids, a primary &amp;amp; secondary (and additional VLAN-ids if implemented with PVLAN communities which EXOS supports but VOSS does not).&lt;/P&gt;&lt;P&gt;If you want to extend a PVLAN between 2 switches, you always need to trunk all those VLAN-ids between the 2 switches. On VOSS the port can be configured as private-vlan isolated|promiscuous|trunk; trunk is what you need.&lt;/P&gt;&lt;P&gt;Now, if you have Fabric Engine/VOSS in the core/distribution but Switch Engine/EXOS as the access, you are most likely using Fabric Attach (FA) between the two. And there's the problem, FA was never designed to handle PVLANs. FA TLVs can only signal a single VLAN-id associated to an I-SID and cannot signal PVLAN vs. regular VLAN.&lt;/P&gt;&lt;P&gt;If you want to use PVLANs in such a setup you will need to do away with FA and manually configure your Switch Engine/EXOS, at both ends. The PVLAN will also need to be configured manually on all switches (XIQ-SE has no PVLAN support).&lt;/P&gt;&lt;P&gt;A better approach, if you have universal hardware, is to go completely fabric to the edge, and run Fabric Engine on you access switches as well. Now you can have the PVLAN only created on these (the creation and assignment to access ports as well as I-SID association can be fully automated via RADIUS VSA, this XIQ-SE can do) and in fabric a PVLAN with an I-SID assigned becomes an ETREE service which can be extended anywhere else in the fabric (no need to set any ports to trunk mode, no need for FA).&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 12:42:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/112051#M2747</guid>
      <dc:creator>Ludovico_Steven</dc:creator>
      <dc:date>2024-08-29T12:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/112090#M2748</link>
      <description>&lt;P&gt;Hi Ludovico,&lt;/P&gt;&lt;P&gt;thanks for your answer. Very interesting. I will set up a lab and try what you said. Since the goal is to limit traffic in the same subnet, could another approach be to configure policies in XIQ-SE specifying services to allow and not and push them to EXOS switches? Are there any limitation for this feature with EXOS switches (except TCAM limitations)?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 12:31:46 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/112090#M2748</guid>
      <dc:creator>SimoneZ</dc:creator>
      <dc:date>2024-08-30T12:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116716#M2760</link>
      <description>To set up a Private VLAN (PVLAN) with Fabric Attach, integrating a context like "&lt;A href="https://animesuges.mom/" rel="noreferrer dofollow" target="_blank"&gt;&lt;B&gt;Animesuge&lt;/B&gt;&lt;/A&gt;" for easier understanding, let's break down the basics: Private VLAN (PVLAN): A PVLAN is used in network segmentation to isolate traffic within the same VLAN, allowing for more secure and efficient traffic management. It consists of primary and secondary VLANs, where the secondary VLANs are either isolated or community VLANs, offering different levels of isolation among devices. Fabric Attach: This is a network automation protocol often used in Software Defined Networking (SDN) to simplify the deployment of network services. With Fabric Attach, the network automatically assigns VLANs and other configurations to connected devices, making network setup faster and less error-prone. Using Animesuge as an Example Context: Imagine Animesuge needs to isolate its servers (database, content delivery, web servers) for security while still being part of a larger network. By setting up a PVLAN, you can place each server type into isolated or community VLANs. Using Fabric Attach would then allow these servers to be dynamically assigned to the correct VLANs as they come online or change location within the network, enhancing both security and management efficiency.</description>
      <pubDate>Sun, 10 Nov 2024 17:14:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116716#M2760</guid>
      <dc:creator>Myra1</dc:creator>
      <dc:date>2024-11-10T17:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116808#M2761</link>
      <description>&lt;P&gt;A &lt;STRONG&gt;Private VLAN (PVLAN)&lt;/STRONG&gt; with &lt;STRONG&gt;Fabric Attach&lt;/STRONG&gt; is a networking concept that combines the isolation benefits of private VLANs with the automated provisioning and configuration capabilities of Fabric Attach in modern network architectures.&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Private VLAN Overview&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Purpose:&lt;/STRONG&gt; Used to enhance security and limit broadcast domains in a larger VLAN by subdividing it into smaller, isolated groups.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Types of Ports in PVLAN:&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Promiscuous Ports:&lt;/STRONG&gt; Can communicate with all other ports in the PVLAN.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Isolated Ports:&lt;/STRONG&gt; Can only communicate with promiscuous ports, not with other isolated or community ports.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Community Ports:&lt;/STRONG&gt; Can communicate with other community ports and promiscuous ports but not with isolated ports.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;STRONG&gt;Fabric Attach Overview&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Purpose:&lt;/STRONG&gt; Simplifies the deployment of VLANs, PVLANs, and other network services by automating their configuration through dynamic signaling mechanisms.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Key Features:&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;Auto-discovery of VLANs and PVLAN configurations.&lt;/LI&gt;&lt;LI&gt;Integration with management platforms like IEEE 802.1Qbg (Edge Virtual Bridging) for network virtualization.&lt;/LI&gt;&lt;LI&gt;Simplified scaling for complex network architectures.&lt;/LI&gt;&lt;LI&gt;Visit for more information:&amp;nbsp;&lt;A href="https://aniwave.com.pl/" target="_blank" rel="noopener"&gt;https://aniwave.com.pl/&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sun, 17 Nov 2024 17:22:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116808#M2761</guid>
      <dc:creator>Richard13</dc:creator>
      <dc:date>2024-11-17T17:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116883#M2762</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Private VLAN with Fabric Attach: Overview and Explanation&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Private VLANs (PVLANs) are an advanced VLAN feature that provides enhanced network isolation and segmentation within a single VLAN domain. They allow for granular traffic control between devices in the same VLAN, supporting security and scalability. Fabric Attach (FA), on the other hand, is an automated network provisioning protocol designed to simplify the deployment of services like VLANs or PVLANs in complex networks.&lt;/P&gt;&lt;H3&gt;How Private VLANs Work&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Primary VLAN&lt;/STRONG&gt;: Acts as the overarching VLAN where all devices are associated.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Secondary VLANs&lt;/STRONG&gt;: Subdivided into:&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Isolated VLANs&lt;/STRONG&gt;: Devices can only communicate with the promiscuous port (typically connected to a router or gateway) and not with each other.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Community VLANs&lt;/STRONG&gt;: Devices within the same community can communicate but are isolated from other communities and isolated VLANs. Visit:&amp;nbsp;&lt;A href="https://zoroxtv.mom/" target="_self"&gt;https://zoroxtv.mom/&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Sun, 24 Nov 2024 07:41:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116883#M2762</guid>
      <dc:creator>Leslie11</dc:creator>
      <dc:date>2024-11-24T07:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116896#M2763</link>
      <description>&lt;P&gt;If you deploy FabricEngine to the access, you can use PVLANs, and you can use RADIUS authentication (MAC based or 802.1X) to automatically place a user/device in the PVLAN of choice. These PVLANs will have L2 I-SID associated, so the PVLAN can easily span the entire fabric if needed. But note that Fabric Engine does not support PVLAN Community VLAN ids; all you have is the primary and secondary VLAN ids, for isolated and promiscuous users.&lt;/P&gt;&lt;P&gt;Switch Engine also supports PVLANs, including the PVLAN Communities. But if you are using Switch Engine FA Proxy access off a Fabric Engine Fabric FA Server(s), then PVLANs cannot be used, as Fabric Attach signalling can only signal 1 VID per I-SID. You would have to disable FA between the Switch Engine and the Fabric Engine, and q-tag trunk all the PVLANs manually.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2024 14:52:38 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/116896#M2763</guid>
      <dc:creator>Ludovico_Steven</dc:creator>
      <dc:date>2024-11-25T14:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/118686#M2767</link>
      <description>&lt;P&gt;To extend &lt;STRONG&gt;Private VLANs (PVLANs)&lt;/STRONG&gt; across switches in your &lt;STRONG&gt;Fabric Attach infrastructure&lt;/STRONG&gt;, where access switches run &lt;STRONG&gt;SwitchEngine/EXOS&lt;/STRONG&gt; and core switches are acting as the distribution layer with &lt;STRONG&gt;Fabric Engine (VOSS)&lt;/STRONG&gt;, you need to consider how to &lt;STRONG&gt;preserve the isolation and forwarding behavior of PVLANs across the fabric&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;Use &lt;STRONG&gt;PVLANs&lt;/STRONG&gt; to isolate traffic within the same subnet.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Extend those PVLANs &lt;STRONG&gt;between access switches&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="" data-unlink="true"&gt;Use the &lt;STRONG&gt;Fabric Engine (VOSS)&lt;/STRONG&gt; switches purely for transport, no direct endpoint connections or visit us:&amp;nbsp;&lt;A href="https://ds4-windows.us/&amp;nbsp;" target="_self"&gt;https://ds4-windows.us/&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 08:16:39 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/118686#M2767</guid>
      <dc:creator>Richard13</dc:creator>
      <dc:date>2025-05-07T08:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/119920#M2768</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We’re planning to deploy Private VLANs within our Fabric Attach environment to limit intra-subnet traffic between endpoints.&lt;/P&gt;&lt;P data-unlink="true"&gt;In our topology, all endpoints are connected to access switches running EXOS (SwitchEngine), while the core switches are purely acting as a distribution layer.&amp;nbsp;&lt;A href="https://izleinatboxapk.com.tr/" target="_self"&gt;&lt;SPAN&gt;https://izleinatboxapk.com.tr/&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I’ve reviewed the EXOS documentation here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I understand, EXOS can extend Private VLANs between switches. My question is: in a Fabric Engine backbone scenario, what configuration is required on the distribution (core) switches to successfully carry and extend Private VLANs between access switches?&lt;/P&gt;&lt;P&gt;Thanks in advance for any guidance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 07:36:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/119920#M2768</guid>
      <dc:creator>Richard13</dc:creator>
      <dc:date>2025-08-11T07:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: Private vlan with fabric attach</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/120167#M2769</link>
      <description>&lt;P&gt;your approach makes sense — private VLANs are a good way to reduce unnecessary east–west traffic within the same subnet. On EXOS, as you already saw in the documentation, you can map isolated/community ports to a primary VLAN and extend them across switches.&lt;/P&gt;&lt;P&gt;In a fabric attach scenario, the key point is that the backbone (Fabric Engine) doesn’t need to understand the private VLAN logic itself. Instead, it only needs to transport the VLAN(s) as services across the fabric. The private VLAN relationship (primary + secondary mapping) is maintained at the access/edge switches where the endpoints connect.&amp;nbsp;&lt;A href="https://b9gamesapp.com.pk/" target="_self"&gt;B9 Game&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 19:27:23 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/private-vlan-with-fabric-attach/m-p/120167#M2769</guid>
      <dc:creator>Richard13</dc:creator>
      <dc:date>2025-08-29T19:27:23Z</dc:date>
    </item>
  </channel>
</rss>

