0% found this document useful (0 votes)
66 views31 pages

Vlan 1

The document discusses virtual LANs (VLANs) including: - VLANs divide a single broadcast domain into multiple smaller broadcast domains. - Frame tagging protocols like 802.1Q are used to identify VLAN traffic between switches. - Devices use trunk ports configured for 802.1Q tagging to route traffic between VLANs on different switches. - Protocols like VTP and private VLANs provide additional VLAN configuration and security features.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views31 pages

Vlan 1

The document discusses virtual LANs (VLANs) including: - VLANs divide a single broadcast domain into multiple smaller broadcast domains. - Frame tagging protocols like 802.1Q are used to identify VLAN traffic between switches. - Devices use trunk ports configured for 802.1Q tagging to route traffic between VLANs on different switches. - Protocols like VTP and private VLANs provide additional VLAN configuration and security features.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Virtual LANs

Agenda

 LAN vs VLAN
 Frame Tagging Protocols.
 Inter-Vlan Routing
 DTP
 VTP
 Private-VLAN
 802.1Q-inQ
3
Single Broadcast Domain
4
Multiple Broadcast Domain | VLANs

 Each VLAN is a separate broadcast domain


 VLANs divide single broadcast into multiple
smaller broadcast domains
 All ports belong to VLAN 1 by default until
you change it
LAN | One Broadcast Domain
LANs | Two Broadcast Domains
LANs | L3 Connected Networks
Virtual LAN | Multiple Isolated Networks

 Multiple Broadcast domains


Virtual vs. Physical LANs| Pros & Cons

 Physically isolated LANS


 Switches type can be unmanaged (cheaper) if no other features are required
 Fixed places (immobility)
 Virtual LANs
 Switches should support VLAN (Expensive)
 Dynamic Locations (a device can move to any location and get connected to
the same VLAN very easily)
 Security risks
VLAN | Switch MAC Table

 Switch assign each one of its ports to only one VLAN membership.
 Switches forward broadcasts to all ports member of that VLAN it received the broadcast from
except the source port.
 Switches maintain the isolation between VLANs.
MAC Address Table
VLAN Source MAC Type Ports
Address
10 0000.BD72.4870 Dynamic 0
15 0001.905E.50CD Dynamic 1
15 0002.63BC.7D67 Dynamic 2
10 0003.3D3A.FFE6 Static 3
Ports-VLAN Membership

 Static
 Dynamic
 Example: Can be achieved using VLAN Membership Policy Server (VMPS)
Question

 What if VLANs is configured across multiple switches?! How other switches


isolate VLANs traffics?

 Solution: Tagging frames to identify VLAN traffics


VLAN Tagging Protocols

 Tagging is required between switches.


 Tagging Protocols
 Cisco Inter-Switch Link (ISL): a proprietary tagging protocol (supported only by
some cisco devices)
 IEEE 802.1Q: a standard tagging protocol.
VLAN | 802.1Q
VLAN | 802.1Q

TCI (Tag Control Info)

TPI (Tag Protocol Identifier)


0x8100=802.1q

CFI (Canonical Format Identifier)


0 for Ethernet switches
VLAN | Port Types

 Devices are either


 Understand 802.1q (e.g. managed switches, routers, servers, etc.)
 Don’t understand 802.1q

 As a result, from VLAN perspective, Switch ports are either


 Trunk (VLAN Tagging)
 Access (No tagging) 15 10 101

Trunk
DTP (Dynamic Trunk Protocol)

 DTP is a Cisco proprietary protocol for dynamically negotiating trunking


and encapsulation protocol (802.1q or ISL) on a link between two devices.
 Trunk modes
 Trunk
 Dynamic Desirable
 Auto
 To stop generating DTP frames
 switchport nonegotiate
VLAN Configuration | Cisco

 *VLAN DB creation
 Switch(config)#vlan 10
 Switch(config-vlan)#name IT_VLAN

 Access ports
 Switch(config)#interface f0/3
 Switch(config-if)#switchport mode access
 Switch(config-if)#switchport access vlan 10
 Trunk Ports
 Switch(config)#interface f0/3
 Switch(config-if)#switchport mode trunk
Native VLAN

 Default VLAN
 By default all switch ports are membered of the default VLAN (VLAN 1 for many vendors).
 As a result, all devices can communicate with each other
 Native VLAN
 Is a VLAN whose traffic traverse on the 802.1q trunk untagged(Configured per Trunk).

10 101

Trunk
Auxiliary/Voice VLAN

 IP phone requires an Ethernet port


 It is impractical to have one switch port per each computer and IP phone.
 Solution:
 Use one port for both using special featured VLAN
called voice or auxiliary VLAN.
 Voice traffic is tagged but data traffic isn’t
 Configuration (Cisco Switch):
 Switch(config)# interface ethernet0/0
 Switch(config-if)# switchport mode access
 Switch(config-if)# switchport access vlan 22
 Switch(config-if)# switchport voice vlan 33
VLAN | Performance Improvements

 VLANs are scattered among switches and multiple VLANs could be


inactive or in configured in multiple switches
 Switches will receive broadcasts for all VLANs from trunk ports even if the
VLAN isn’t configured in the switch.
 You can stop VLAN traffics from traversing through trunk ports by
configuration
 Cisco command:
 Switch(config-if)#switchport trunk allowed vlan 10,15,103-105
VLAN | InterVlan Routing

 Routing traffics between VLANs can be done using either one of the following
 A Router with a connection to every VLAN via port access mode
 Router on stick: one trunk connection between switch and the router
 Multilayer switch: create logical interface for each VLAN
Managing VLAN DB on Switches

 VTP (VLAN Trunking Protocol)


 is a Cisco proprietary protocol
 enables you to create the VLAN only on a single switch, then propagate
information about the VLAN to every other switch on the network and cause
other switches to create it.
 Versions: 1, 2, 3
 Modes: Server, Client, Transparent
VTP

 Domain: All switches that should share same VLAN database should belong to same VTP domain.
 Password: used to participate in the domain
Modes:
 Server: in this mode, you can create, modify, and delete VLANs. You can specify other
configuration parameters as well, such as VTP version and VTP pruning, for the entire VTP domain.
 Client: Sends/forwards VTP advertisements and Synchronizes VLAN configuration information with
other switches
 Transparent: Sends/forwards VTP advertisements but does not Synchronizes VLAN configuration
information with other switches
VTP | Process and Revision Numbers

 VTP update process begins when a VLAN configuration is added, deleted,


or updated from a VTP server switch.

Server advertises the entire Clients accept updates


VLAN if its revision number is
increments old VLAN configuration
configuratio newer than old revision
VTP revision database along with the
n changes number
number by 1 new revision number.
VTP | Cautions

 Be careful, adding a new switch to a network can overwrite VTP vlan


configurations.
 Ensure the switch is not connected
 Configure the VTP Domain, Mode, and Password.
 Clear the VTP Revision Number and add a switch to an existing VTP Domain.
 Use show commands to verify VTP configuration, and revision number.
 Connect the switches after configuring trunk ports correctly.
VTP Pruning | Performance Improvement

 VTP pruning forwards traffic over a trunk link only if the switch on the receiving end of the trunk link
has ports in the source VLAN.
 If VTP pruning is enabled, switches automatically communicate to each other which VLANs they
have locally assigned or are in the transit path for
 It reduces the volume of flooded traffic.
Private-VLAN

 Private-VLAN (port isolation), is a technique in computer networking where a


VLAN contains switch ports that are restricted such that they can only
communicate with a given uplink.
 Private-VLAN uses one subnet only.
 Type of ports
 Isolated: communicate with none other
than the gateway (promiscuous port).
 Community: communicate with each port
within the same community vlan and
the gateway
 Promiscuous (connected to a gateway):
can communicate with any other port in
the private VLAN.
Private-VLAN

 Each Private-VLAN topology has one primary VLAN.


 Primary VLANs has multiple secondary VLANs (Sub-VLANs)
 Secondary VLANs are either
 Isolated: communicate with none other
than the gateway (promiscuous port).
 Community: communicate with each port
within the same community vlan and
the gateway
Private-VLAN

RouteXP_Switch_1(config) #vlan 100


RouteXP_Switch_1 (config-vlan) #private-vlan primary
RouteXP_Switch_1 (config-vlan) #vlan 101
RouteXP_Switch_1 (config-vlan) #private-vlan isolated
RouteXP_Switch_1 (config-vlan) #vlan 102
RouteXP_Switch_1 (config-vlan) #private-vlan community
RouteXP_Switch_1 (config-vlan) #vlan 103
RouteXP_Switch_1 (config-vlan) #private-vlan community
RouteXP_Switch_1 (config-vlan) #vlan 100
RouteXP_Switch_1 (config-vlan) #private-vlan association 101-103
VLAN | 802.1Q-in-Q

 802.1Q-in-Q allows a Service Provider to


preserve 802.1Q VLAN tags across a WAN
service. Doing so allows a VLAN to span
multiple geographically dispersed sites.

You might also like