Michael,
I've never used this feature but the way I see it both the private vlans and the network vlan operate at layer 2.
You don't need to use /29 subnets to isolate different customers. The private vlans will do that for you.
The private vlans don't have an IP address, and the network vlan CAN have one, but does not need to have one configured. All the servers in the different pvlans would share the 192.168.1.0/24 subnet and use the router IP address as their default gateway.
Suppose you have one customer (customer1) with 3 servers, another customer (customer2) with 2 servers, and 10 customers (other), each one with a single server. An you want all the servers to be able to reach the router (their default gateway) while not being able to see the servers of other customers (but still be able to reach other servers from the same customer if they have more than one...).
I'm attaching a quick and dirty sketch of what I'd do.
I'd create one vlan for customer 1 with 3 ports, one vlan for customer2 with 2 ports and a vlan for the other customers with 10 (or more) ports.
I would then add these three vlans to a private vlan, the first two as non-isolated so the servers connected to each one of them can see each other (within the vlan), and the third one as isolated so the servers connected to it can't see each other.
I would then create a network vlan to allow all these customer vlans in the private vlan to reach the router (or any other shared services...)
All of the servers would have addresses in the 192.168.1.0/24 subnet, and all would have ip 192.168.1.1 as their default gateway (assuming that is the ip address of the router...)
The config for each switch would be something like this (just creating it on the fly, may have forgotten something...)
SW1:
#
# always remove ports from vlan default (best practice)
#
configure default delete ports all
#
# create network vlan and assign ports
#
create vlan nv1 tag 100
configure nv1 add ports 1
configure nv1 add ports 2 t
# --------------------------------------------------------------
SW2:
#
# always remove ports from vlan default (best practice)
#
configure default delete ports all
#
# create network vlan and assign ports
#
create vlan nv1 tag 100
configure nv1 add ports 1 t
#
# create customer vlans and assign ports
#
create vlan cust1 tag 201
create vlan cust2 tag 202
create vlan other tag 203
configure cust1 add ports 2-4
configure cust2 add ports 10-11
configure other add ports 15-24
#
# create private vlan and assign network vlan and subscriber vlans
#
create private-vlan pv1
configure private-vlan pv1 add network nv1
configure private-vlan pv1 add subscriber cust1 non-isolated
configure private-vlan pv1 add subscriber cust2 non-isolated
configure private-vlan pv1 add subscriber other
#
# create network vlan and assign ports
#
configure nv1 add ports 1 private-vlan translated
# --------------------------------------------------------------
As you can see, there's not a single ip address in all the config for either switch. It's all a pure layer 2 thing.
What about provisioning?
- If you add a customer with a single server, you just add another port to vlan other.
- If you add another server for a customer that already has a separate vlan, you just add aport to that vlan.
- If a customer that had a single server wants to add another, create a separate vlan for them, add two ports to connect the servers, and add the vlan as susbscriber, non-isolated to the private vlan.
Will this work? I hope so. I haven't tested it. give it a try and let me know the result.
Daniel