Start a Conversation

Unsolved

M

1 Rookie

 • 

1 Message

22

July 17th, 2025 16:13

S4810P FTOS 9.14 - PVLAN not routing to internet

Hello,

Hardware: 2x S4810P with FTOS 9.14

I currently have the following setup:

ROUTER to MAIN SW on (fortygige 0/56) to BUILDING 2 SW on (fortygige 0/60 on both sides). Server is on tengigabitethernet 0/9 on BUILDING 2 SW.

(See image at bottom for network layout)

Router is connecting to the MAIN SW over BGP. Primary IPs/GW are hosted on the VLANs on MAIN SW. I have replaced the public IP's with internal IPS just for masking purposes.

Router is connected to port 0/56 on MAIN SW and switches are configured as follows:

MAIN SW:

interface Vlan 304
 description "SERVER 1"
 ip address 192.168.15.1/29
 tagged fortyGigE 0/60
 no shutdown

interface fortyGigE 0/60
 description "TO BUILDING 2 SW"
 no ip address
 switchport
 switchport mode private-vlan trunk
 no shutdown


BUILDING 2 SW:


interface Vlan 304
 description "SERVER 1 PUBVLAN"
 private-vlan mode primary
 private-vlan mapping secondary-vlan 498
 ip address 192.168.15.2/29
 tagged fortyGigE 0/60
 ip local-proxy-arp
 no shutdown

interface Vlan 498
 description "SERVER 1 PVLAN"
 private-vlan mode isolated
 no ip address
 untagged TenGigabitEthernet 0/9
 no shutdown

interface TenGigabitEthernet 0/9
 description "TO SERVER 1"
 no ip address
 switchport
 switchport mode private-vlan host
 no shutdown

interface fortyGigE 0/60
 description "TO MAIN SW"
 no ip address
 switchport
 switchport mode private-vlan trunk
 no shutdown


MAIN SW can ping 192.168.15.2
BUILDING 2 SW can ping 192.168.15.1

Server 1 can ping 192.168.15.2 but not 192.168.15.1
Server 1 cannot ping the router or internet.

If I remove TenGigabitEthernet 0/9 from the pvlan and add it untagged to the vlan 304 on BUILDING SW 2, SERVER 1 can then ping the MAIN SW, Router and internet. It only breaks when changed to private-vlan host, and added as isolated to the pvlan 498.

I am not sure what I am missing to allow Server 1 to fully communicate and or route to MAIN SW and the router when in the pvlan.

Any hep is appreciated.

Thanks.

Moderator

 • 

9.4K Posts

July 17th, 2025 20:31

Mrycp,

 

Based on your configuration and the behavior you're observing, the issue lies in how Private VLANs (PVLANs) function and how routing is handled between isolated and primary VLANs. 

 

Where the part you are having issues with is that your server is in an isolated VLAN (498). Also, the gateway (192.168.15.1) is on the MAIN SW, but the BUILDING 2 SW does not have a promiscuous port configured to forward traffic from VLAN 498 to VLAN 304. You can read about this on page 721 here

 

So what I recommend is that you configure a promiscuous port on the BUILDING 2 SW that maps VLAN 498 (isolated) to VLAN 304 (primary), allowing the server to reach the gateway. You should be able to do so with the following commands

 

interface TenGigabitEthernet 0/1
 description "Promiscuous uplink to MAIN SW"
 switchport
 switchport mode private-vlan promiscuous
 private-vlan mapping 304 add 498
 no shutdown

 

Let me know if this helps.

 

 

 

 

 

 

 

1 Rookie

 • 

3 Posts

July 18th, 2025 17:33

Hello,

I was able to get it to work by just adding the private vlan 498 also to the MAIN SW:

MAIN SW:

interface Vlan 498
 description "SERVER 1 PVLAN"
 private-vlan mode isolated
 no ip address
 no shutdown

At this point all IPv4 traffic started routing properly and I was able to access the internet.

One issue that now happens is all IPv6 to the Server 1 stops working. IPv4 continues to work.

Any idea why segmenting into a private VAN would break IPv6 but not IPv4?

As for your mentioning of the promiscuous port, the trunk port appears to be working:

interface fortyGigE 0/60
 description "TO BUILDING 2 SW"
 no ip address
 switchport
 switchport mode private-vlan trunk
 no shutdown

Do we also need a second link to the main switch which is also promiscuous? Wouldn't this create a loop or break the normal vlans?

Thanks

(edited)

Moderator

 • 

9.4K Posts

July 18th, 2025 19:05

Mvipe,

 

IPv6 behaves differently from IPv4 in PVLAN environments due to its reliance on multicast and neighbor discovery protocols, as seen below.

 

 

So the isolated PVLANs block Layer 2 multicast between hosts and the gateway unless explicitly allowed, and the  IPv6 Neighbor Discovery Protocol (NDP) and Router Advertisements (RA) rely on multicast. So in your current setup, RA/NDP packets from the MAIN SW gateway are likely not reaching the server in VLAN 498.

 

What I recommend you try is to either enable IPv6 proxy ND on the BUILDING 2 SW interface for VLAN 304m which would be 

 

interface vlan 304
 ipv6 nd proxy

 

or

 

Manually configure the IPv6 address and default gateway on the server, such as 

 

IPv6 Address: 2001:db8::100/64
Gateway: 2001:db8::1

 

This bypasses the need for RA but is less flexible and not scalable.

 

 

or

 

As we previously discussed, a promiscuous port on the BUILDING 2 SW that maps VLAN 498 to VLAN 304 would allow both IPv4 and IPv6 to function correctly, including multicast-based discovery. This does not require a second physical link. You can configure the existing trunk port or another logical interface (e.g., a subinterface or LAG) as promiscuous without creating a loop, as long as STP and PVLAN rules are respected.

 

 

 

1 Rookie

 • 

7 Posts

July 24th, 2025 11:54

On Dell S4810P with FTOS 9.14, if your Private VLAN (PVLAN) isn't routing to the internet, ensure the primary VLAN has a Layer 3 interface with proper gateway and NAT configured. PVLANs don't route by default—use ACLs or route-maps to allow upstream traffic from isolated ports to the internet.

No Events found!

Top