Home | Articles | About | Contact | Forum |
Thursday, November 21, 2024



Lunarpages.com Web Hosting

Mailing List

E-mail:
By Joining the mailing list you will be notified of site updates.


Show Your Support For
This Site By Donating:











Audience: Self Learners - System Admins
Last Updated: 3/17/2010 8:33:20 AM
Original Creation Date: 12/31/03 11:35 PM
**All times are EST**





Basic VLAN Configuration

By Erik Rodriguez

This article describes the concept of the VLAN. VLANs are commonly used to speed up networks and reduce congestion. You may also want to see a video demonstration of VLAN configuration using Cisco switches.

Overview

Virtual LAN; a logical, not physical, group of devices, defined by software. VLANs allow network administrators to resegment their networks without physically rearranging the devices or network connections¹. A VLAN (Virtual LAN) is a network composed of logical broadcast domains. Configuration VLANs allows network traffic to be seperated logically. Network devices on VLAN1 will not be able to communicate (ping) devices on VLAN2. It is possible to have devices on VLAN1 of a switch communication with VLAN1 on another switch through a method called VLAN trunking. See the image below:



This diagram gives you the basic idea of VLAN membership. You can see how the floors of the building are seperate and that each department is represted by a different color. The switches lie below and the trunk link is represented by the lightning bolt. Trunk links may also be referred to as .1q or "dot one Q." This refers to the IEEE standard of 802.1q which defines the method of vlan trunking.

Types of Membership

There are several different types of memberships associated with VLANs:
  • Static VLANs
  • Dynamic VLANs
Static VLANs are specified by switch port. For example, a 12 port fast ethernet switch is split for the creation of 2 VLANs. The first 6 ports are associated with VLAN1 and the last 6 ports are associated with VLAN2. If a machine is moved from port 3 to port 11, it will effectively change VLANs.

Dynamic VLANs are specified by MAC address. Assuming the same scenario, a system administrator will enter MAC addresses for all machines connecting to the switch. These addresses will be stored in a memory chip inside the switch that forms a database of local MAC addresses. Each MAC address can then be associated with a certain VLAN. This way, if a machine is moved, it will retain the original VLAN membership reguardless of it's port number.

VLAN Tagging

Moving VLAN data over multiple switches uses a method called VLAN tagging. The act of VLAN tagging simply adds extra information in the packet header of ethernet frames so routers know how to pass along the data. See the following for information on creating VLAN membership and trunking on HP Provcurve Switches.

VLAN Enabled Switches

Not all switches support VLANs. Most "managed" switches including Dell, Netgear, HP, and others all support vlans. Remember that because VLAN tagging is a universal standard, different brands of switches can accomplish the same thing. Data centers are large enivronments should standardize on a specific platform. Cisco has created proprietary protocols to manage VLANs called VLAN Trunking Protocol or VTP which enables Cisco switches to advertise VLAN routes to other VTP enabled switches. This also allows a system administrator to manage all VLANs from a central point and order all switches to update the VLAN information along the entire network. Most orgainizations using VLANs have figured out it is worth shelling out the extra cash to go with Cisco equipment and get the extra features and functionality.





Contact Us

If you found this information useful, click the +1 button



Your E-mail:


Subject:


Type verification image:
verification image, type it in the box

Message:


NOTE: this form DOES NOT e-mail this article, it sends feedback to the author.



¹  link to original source is now depreciated.



TCP vs. UDP
Juniper SRX anti-spam filtering config
Windows Server 2008 Clustering Configuration
Windows 2008 R2 Network Load Balancing (NLB)
Extreme Networks: Downloading new software image
Juniper SRX save config to USB drive
Juniper SRX logout sessions
Extreme Networks Syslog Configuration
Command line drive mapping
Neoscale vs. Decru
Data Security vs. Data Protection
Juniper SRX Cluster Configuration
HOWTO - Create VLAN on Extreme Switch
Using a Non-local Colocation Facility
Linux Server Administration
IT Chop Shops
Flow Viewers: SFLOW, NetFLOW, and JFLOW
Exchange 2007 Back Pressure
IPtables open port for specific IP
Politics in IT Departments
HOWTO - Block Dropbox
Cisco IOS Cheat Sheet
Subnet Cheat Sheet
Design a DMZ Network
How DNS works
Firewall Configuration
Juniper SSG Firewalls
Server Management
Configuring VLANs
Runlevels in Linux
Server Clustering
SONET Networks
The Red Hat Network
Server Colocation
Complicated Linux Servers
Dark Fiber
Data Center Network Design
Firewall Types
Colocation Bandwidth






Copyright © 2002-2016 Skullbox.Net All Rights Reserved.
A division of Orlando Tech Works, LLC
By using this site you agree to its Terms and Conditions.
Contact Erik Rodriguez