<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">VLAN Networks</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/networking/vlan-networks.feed</id>
	<updated>2026-04-11T12:40:27+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/networking/vlan-networks.feed?type=atom"/>
	<entry>
		<title>VLAN Security - Making the Most of VLANs</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-security.html"/>
		<published>2011-06-08T08:22:12+10:00</published>
		<updated>2011-06-08T08:22:12+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-security.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-security-intro.webp&quot; alt=&quot;Securing VLAN Networks&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-security-intro.webp&quot; alt=&quot;Securing VLAN Networks&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Securing VLAN Networks&quot; /&gt;It's easy to see why &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-concept.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Networks&quot;&gt;virtual LANs&lt;/a&gt; have become extremely popular on networks of all sizes. In practical terms, multiple VLANs are pretty much the same as having multiple separate physical networks within a single organization — without the headache of managing multiple cable plants and switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because &lt;strong&gt;VLANs segment a network&lt;/strong&gt;, creating &lt;strong&gt;multiple broadcast domains&lt;/strong&gt;, they effectively allow traffic from the &lt;strong&gt;broadcast domains&lt;/strong&gt; to remain isolated while increasing the network's &lt;strong&gt;bandwidth&lt;/strong&gt;, &lt;strong&gt;availability&lt;/strong&gt; and &lt;strong&gt;security&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most managed switches are VLAN-capable, but this doesn't mean that they all perform the job equally well. The market has been flooded by thousands of switches that seem to do the job, but special consideration must be taken before making a purchase.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A switch in a VLAN-enabled network needs to do a lot more than just switch packets between its ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Core backbone switches&lt;/strong&gt; undertake the hefty task of managing the network's VLANs to ensure everything runs smoothly. The tasks of these switches include &lt;strong&gt;prioritizing network packets&lt;/strong&gt; based on their &lt;strong&gt;source&lt;/strong&gt; and &lt;strong&gt;destination&lt;/strong&gt; (essentially Quality of Service), ensuring all edge switches are aware of the VLANs configured in the network, continuously monitoring for possible network loops on every VLAN, switching packets between VLANs as required and ensuring network security according to their configuration .&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Edge switches&lt;/strong&gt;, also known as &lt;strong&gt;access switches&lt;/strong&gt;, are dedicated to the end devices: &lt;strong&gt;user workstations&lt;/strong&gt;, network peripherals and sometimes servers (most IT administrators rightly prefer to connect servers directly to the core- backbone switches). The &lt;strong&gt;edge switches&lt;/strong&gt; must be compatible with the VLAN features that the &lt;strong&gt;core backbone switches&lt;/strong&gt; support, otherwise unavoidable problems will arise because of incompatibilities among the switch devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is one reason many organizations standardize when it comes to network equipment from companies that include Cisco Systems, HP and Juniper Networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When deploying VLANs, here are &lt;strong&gt;five key considerations&lt;/strong&gt; to address:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;1. Links on VLAN Switches&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VLAN switches have two main types of links: &lt;strong&gt;access links&lt;/strong&gt; and &lt;strong&gt;trunk links&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;Access Links&quot;&gt;&lt;strong&gt;Access Links&lt;/strong&gt;&lt;/a&gt; are the most common type of links on any VLAN capable switch. All network hosts connect to the switch's Access Links to gain access to the local network. These links are the ordinary ports found on every switch, but configured to access a particular VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;Trunk Links&quot;&gt;&lt;strong&gt;Trunk Links&lt;/strong&gt;&lt;/a&gt; are the links that connect two VLAN capable switches together. While an Access Link is configured to access a specific VLAN, a Trunk Link is almost always configured to carry data from all available VLANs.&lt;/p&gt;
&lt;h2&gt;2. Native VLAN, ISL and 802.1q&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;When a port on a switch is configured as an &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;VLAN access link&quot;&gt;access link&lt;/a&gt;, it has access to one specific VLAN. Any network device connecting to it will become part of that VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Ethernet frames entering or exiting the port are standard &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II type frames&quot;&gt;Ethernet II type frames&lt;/a&gt;, which are understood by the network device connected to the port. Because these frames belong only to one network, they are said to be “untagged” — meaning that they do not contain any information as to which VLAN they are assigned.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Trunk links on the other hand are a bit more complicated. Because they carry frames from all VLANs, it's necessary to somehow identify the frames as they traverse switches. This is called &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html&quot; target=&quot;_blank&quot; title=&quot;VLAN tagging&quot;&gt;VLAN tagging&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Two methods known for this job are &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;ISL Protocol&quot;&gt;&lt;strong&gt;ISL&lt;/strong&gt;&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;Inter-Switch Link&quot;&gt;Inter-Switch Link&lt;/a&gt;, a proprietary Cisco protocol) and &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;IEEE 802.1q&quot;&gt;IEEE 802.1q&lt;/a&gt;. Of the two, &lt;strong&gt;802.1q&lt;/strong&gt; is the &lt;strong&gt;most popular&lt;/strong&gt; &lt;strong&gt;VLAN tagging method&lt;/strong&gt; and is compatible among all vendors supporting VLAN trunking.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What might come as a surprise is that a &lt;strong&gt;trunk link&lt;/strong&gt; can also be configured to act as an access link when a device (computer or switch) that does not support VLAN trunking connects to it. This means that if you have a trunk link on a switch and connect a computer, the port will automatically provide access to a specific VLAN. The VLAN in this case is known as the&amp;nbsp;&lt;strong&gt;native VLAN&lt;/strong&gt;, a common term that refers to the VLAN a &lt;strong&gt;trunk port&lt;/strong&gt; is configured for when acting as an &lt;strong&gt;access link&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;3.Virtual Trunk Protocol and VTP Pruning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;VTP Protocol&quot;&gt;VTP&lt;/a&gt; is Cisco proprietary protocol that ensures all VLAN information held by the &lt;strong&gt;VTP Server&lt;/strong&gt;, usually the core switch, is propagated to all network switches within the &lt;strong&gt;VTP domain&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During initial network configuration, all switches are configured members of the same &lt;strong&gt;VTP domain&lt;/strong&gt;. With the use of &lt;strong&gt;VTP&lt;/strong&gt;, an IT administrator can &lt;strong&gt;create&lt;/strong&gt;, &lt;strong&gt;delete&lt;/strong&gt; or &lt;strong&gt;rename VLANs&lt;/strong&gt; on the &lt;strong&gt;core switch&lt;/strong&gt;. All information is then automatically sent to all members of the &lt;strong&gt;VTP domain&lt;/strong&gt;. The &lt;strong&gt;VTP&lt;/strong&gt; equivalent for other vendors, such as HP and Juniper, is the &lt;strong&gt;Garp VLAN Registration Protocol&lt;/strong&gt; (&lt;strong&gt;GVRP&lt;/strong&gt;), which has been fine-tuned in the recent years and includes many features implemented previously only in &lt;strong&gt;Cisco's VTP Protocol&lt;/strong&gt; .&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-pruning.html&quot; target=&quot;_blank&quot; title=&quot;VTP pruning&quot;&gt;VTP pruning&lt;/a&gt;, an extension to VTP's functionality, ensures that unnecessary network traffic is not sent over trunk links. This is done by forwarding broadcasts and unknown unicast frames on a VLAN, over trunk links, only if the receiving end of the trunk has ports assigned to that VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In practice, this means that if a network broadcast occurred on VLAN5 for instance, and a particular switch did not have any ports assigned to VLAN5, it would never receive the broadcast traffic through its trunk link. This translates to a major discount in broadcast or multicast traffic received by end switches in a VLAN network.&lt;/p&gt;
&lt;h2&gt;4. Inter-VLAN Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html&quot; target=&quot;_blank&quot; title=&quot;Inter-VLAN routing&quot;&gt;Inter-VLAN routing&lt;/a&gt;, as the term implies, is all about routing packets between VLANs. This is perhaps one of the most important features found on advanced switches. Because &lt;strong&gt;inter-VLAN routing&lt;/strong&gt; directs packets based on their Layer 3 information (the IP address), switches that perform this function are known as &lt;strong&gt;Layer 3 switches&lt;/strong&gt; and, of course, are the most expensive. The &lt;strong&gt;core switch&lt;/strong&gt; is commonly a &lt;strong&gt;Layer 3 switch&lt;/strong&gt;. In cases where a Layer 3 switch is not available, this function can also be performed by a server with two or more network cards or a router, a method often referred to as&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html&quot; target=&quot;_blank&quot; title=&quot;router on a stick&quot;&gt;&lt;strong&gt;router on a stick&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because this in one of the most important aspects of a VLAN network, the Layer 3 switch must have a fast switching fabric (measured in Gbps) and provide advanced capabilities such as support for routing protocols, advanced access-lists and firewall . The Layer 3 switch can offer outstanding protection for a VLAN network but can also be a network administrator ' s worst nightmare if not properly configured.&lt;/p&gt;
&lt;h2&gt;5. Securing VLAN Devices&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even though many administrators and IT managers are aware of VLAN technologies and concepts, that doesn't necessarily hold true when it comes to VLAN security.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The first principle in securing a VLAN network is physical security. If an organization does not want its devices tampered with, physical access must be strictly controlled. Core switches are usually safely located in a data center with restricted access, but edge switches are often located in exposed areas.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Just as physical security guidelines require equipment to be in a controlled space, VLAN-based security requires the use of special tools and following a few best security practices to achieve the desired result.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These best practices include:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Removing console-port cables and introducing password-protected console or virtual terminal access with specified timeouts and restricted access policies;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Applying the same commands to the virtual terminal (telnet/Secure Shell) section and creating an access-list to restrict telnet/SHH access from specific networks and hosts;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Avoiding use of using VLAN1 (the default VLAN) as the network data VLAN ;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Disabling high-risk protocols on any port that doesn't require them (e.g CDP, DTP, PAgP, UDLD);&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Deploying VTP domain, VTP pruning and password protections;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Controlling inter-VLAN routing through the use of IP access lists.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;For hands-on details about each of these practices, read through our &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer3 Switch Configuration Guide&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer3 Switch Configuration Guide&lt;/a&gt;&lt;/strong&gt;.&lt;/div&gt;
&lt;h2&gt;Raising the Throttle&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VLAN technology offers numerous enhancements to the network and provides paths to run multiple services in isolated environments without sacrificing speed, quality and network availability. If the necessary basic security guidelines are taken into consideration during initial implementation and then during ongoing administration, a VLAN can dramatically reduce administrative overhead.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Perhaps the most serious mistake that can be made is to underestimate the importance of the data link layer and of VLANs in particular in the architecture of switched networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It should not be forgotten that any network is only as robust as its weakest link, and therefore an equal amount of attention needs to be given to every layer to assure the soundness of the entire structure.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This article covered &lt;strong&gt;basic VLAN concepts&lt;/strong&gt; such as &lt;strong&gt;Access Links&lt;/strong&gt;, &lt;strong&gt;Trunk Links&lt;/strong&gt;, &lt;strong&gt;Virtual Trunk Protocol&lt;/strong&gt; (&lt;strong&gt;VTP&lt;/strong&gt;), &lt;strong&gt;Inter-VLAN routing&lt;/strong&gt; and more. We explained &lt;strong&gt;how VLAN networks operate&lt;/strong&gt;, different methods on &lt;strong&gt;how VLANs communicate&lt;/strong&gt;, and also referenced a few &lt;strong&gt;best VLAN security practices&lt;/strong&gt;. This article is also available for download in pdf format here: VLAN Security - &lt;a href=&quot;https://www.firewall.cx/images/stories/downloads/FedTech_BP-Partsenidis.pdf&quot; target=&quot;_blank&quot; title=&quot;Making the Most of VLANs&quot;&gt;Making the Most of VLANs&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For more information on VLAN Network, readers and visit our dedicated &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Network section&quot;&gt;VLAN Network section&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-security-intro.webp&quot; alt=&quot;Securing VLAN Networks&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-security-intro.webp&quot; alt=&quot;Securing VLAN Networks&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Securing VLAN Networks&quot; /&gt;It's easy to see why &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-concept.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Networks&quot;&gt;virtual LANs&lt;/a&gt; have become extremely popular on networks of all sizes. In practical terms, multiple VLANs are pretty much the same as having multiple separate physical networks within a single organization — without the headache of managing multiple cable plants and switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because &lt;strong&gt;VLANs segment a network&lt;/strong&gt;, creating &lt;strong&gt;multiple broadcast domains&lt;/strong&gt;, they effectively allow traffic from the &lt;strong&gt;broadcast domains&lt;/strong&gt; to remain isolated while increasing the network's &lt;strong&gt;bandwidth&lt;/strong&gt;, &lt;strong&gt;availability&lt;/strong&gt; and &lt;strong&gt;security&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most managed switches are VLAN-capable, but this doesn't mean that they all perform the job equally well. The market has been flooded by thousands of switches that seem to do the job, but special consideration must be taken before making a purchase.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A switch in a VLAN-enabled network needs to do a lot more than just switch packets between its ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Core backbone switches&lt;/strong&gt; undertake the hefty task of managing the network's VLANs to ensure everything runs smoothly. The tasks of these switches include &lt;strong&gt;prioritizing network packets&lt;/strong&gt; based on their &lt;strong&gt;source&lt;/strong&gt; and &lt;strong&gt;destination&lt;/strong&gt; (essentially Quality of Service), ensuring all edge switches are aware of the VLANs configured in the network, continuously monitoring for possible network loops on every VLAN, switching packets between VLANs as required and ensuring network security according to their configuration .&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Edge switches&lt;/strong&gt;, also known as &lt;strong&gt;access switches&lt;/strong&gt;, are dedicated to the end devices: &lt;strong&gt;user workstations&lt;/strong&gt;, network peripherals and sometimes servers (most IT administrators rightly prefer to connect servers directly to the core- backbone switches). The &lt;strong&gt;edge switches&lt;/strong&gt; must be compatible with the VLAN features that the &lt;strong&gt;core backbone switches&lt;/strong&gt; support, otherwise unavoidable problems will arise because of incompatibilities among the switch devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is one reason many organizations standardize when it comes to network equipment from companies that include Cisco Systems, HP and Juniper Networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When deploying VLANs, here are &lt;strong&gt;five key considerations&lt;/strong&gt; to address:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;1. Links on VLAN Switches&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VLAN switches have two main types of links: &lt;strong&gt;access links&lt;/strong&gt; and &lt;strong&gt;trunk links&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;Access Links&quot;&gt;&lt;strong&gt;Access Links&lt;/strong&gt;&lt;/a&gt; are the most common type of links on any VLAN capable switch. All network hosts connect to the switch's Access Links to gain access to the local network. These links are the ordinary ports found on every switch, but configured to access a particular VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;Trunk Links&quot;&gt;&lt;strong&gt;Trunk Links&lt;/strong&gt;&lt;/a&gt; are the links that connect two VLAN capable switches together. While an Access Link is configured to access a specific VLAN, a Trunk Link is almost always configured to carry data from all available VLANs.&lt;/p&gt;
&lt;h2&gt;2. Native VLAN, ISL and 802.1q&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;When a port on a switch is configured as an &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;VLAN access link&quot;&gt;access link&lt;/a&gt;, it has access to one specific VLAN. Any network device connecting to it will become part of that VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Ethernet frames entering or exiting the port are standard &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II type frames&quot;&gt;Ethernet II type frames&lt;/a&gt;, which are understood by the network device connected to the port. Because these frames belong only to one network, they are said to be “untagged” — meaning that they do not contain any information as to which VLAN they are assigned.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Trunk links on the other hand are a bit more complicated. Because they carry frames from all VLANs, it's necessary to somehow identify the frames as they traverse switches. This is called &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html&quot; target=&quot;_blank&quot; title=&quot;VLAN tagging&quot;&gt;VLAN tagging&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Two methods known for this job are &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;ISL Protocol&quot;&gt;&lt;strong&gt;ISL&lt;/strong&gt;&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;Inter-Switch Link&quot;&gt;Inter-Switch Link&lt;/a&gt;, a proprietary Cisco protocol) and &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;IEEE 802.1q&quot;&gt;IEEE 802.1q&lt;/a&gt;. Of the two, &lt;strong&gt;802.1q&lt;/strong&gt; is the &lt;strong&gt;most popular&lt;/strong&gt; &lt;strong&gt;VLAN tagging method&lt;/strong&gt; and is compatible among all vendors supporting VLAN trunking.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What might come as a surprise is that a &lt;strong&gt;trunk link&lt;/strong&gt; can also be configured to act as an access link when a device (computer or switch) that does not support VLAN trunking connects to it. This means that if you have a trunk link on a switch and connect a computer, the port will automatically provide access to a specific VLAN. The VLAN in this case is known as the&amp;nbsp;&lt;strong&gt;native VLAN&lt;/strong&gt;, a common term that refers to the VLAN a &lt;strong&gt;trunk port&lt;/strong&gt; is configured for when acting as an &lt;strong&gt;access link&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;3.Virtual Trunk Protocol and VTP Pruning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;VTP Protocol&quot;&gt;VTP&lt;/a&gt; is Cisco proprietary protocol that ensures all VLAN information held by the &lt;strong&gt;VTP Server&lt;/strong&gt;, usually the core switch, is propagated to all network switches within the &lt;strong&gt;VTP domain&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During initial network configuration, all switches are configured members of the same &lt;strong&gt;VTP domain&lt;/strong&gt;. With the use of &lt;strong&gt;VTP&lt;/strong&gt;, an IT administrator can &lt;strong&gt;create&lt;/strong&gt;, &lt;strong&gt;delete&lt;/strong&gt; or &lt;strong&gt;rename VLANs&lt;/strong&gt; on the &lt;strong&gt;core switch&lt;/strong&gt;. All information is then automatically sent to all members of the &lt;strong&gt;VTP domain&lt;/strong&gt;. The &lt;strong&gt;VTP&lt;/strong&gt; equivalent for other vendors, such as HP and Juniper, is the &lt;strong&gt;Garp VLAN Registration Protocol&lt;/strong&gt; (&lt;strong&gt;GVRP&lt;/strong&gt;), which has been fine-tuned in the recent years and includes many features implemented previously only in &lt;strong&gt;Cisco's VTP Protocol&lt;/strong&gt; .&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-pruning.html&quot; target=&quot;_blank&quot; title=&quot;VTP pruning&quot;&gt;VTP pruning&lt;/a&gt;, an extension to VTP's functionality, ensures that unnecessary network traffic is not sent over trunk links. This is done by forwarding broadcasts and unknown unicast frames on a VLAN, over trunk links, only if the receiving end of the trunk has ports assigned to that VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In practice, this means that if a network broadcast occurred on VLAN5 for instance, and a particular switch did not have any ports assigned to VLAN5, it would never receive the broadcast traffic through its trunk link. This translates to a major discount in broadcast or multicast traffic received by end switches in a VLAN network.&lt;/p&gt;
&lt;h2&gt;4. Inter-VLAN Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html&quot; target=&quot;_blank&quot; title=&quot;Inter-VLAN routing&quot;&gt;Inter-VLAN routing&lt;/a&gt;, as the term implies, is all about routing packets between VLANs. This is perhaps one of the most important features found on advanced switches. Because &lt;strong&gt;inter-VLAN routing&lt;/strong&gt; directs packets based on their Layer 3 information (the IP address), switches that perform this function are known as &lt;strong&gt;Layer 3 switches&lt;/strong&gt; and, of course, are the most expensive. The &lt;strong&gt;core switch&lt;/strong&gt; is commonly a &lt;strong&gt;Layer 3 switch&lt;/strong&gt;. In cases where a Layer 3 switch is not available, this function can also be performed by a server with two or more network cards or a router, a method often referred to as&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html&quot; target=&quot;_blank&quot; title=&quot;router on a stick&quot;&gt;&lt;strong&gt;router on a stick&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because this in one of the most important aspects of a VLAN network, the Layer 3 switch must have a fast switching fabric (measured in Gbps) and provide advanced capabilities such as support for routing protocols, advanced access-lists and firewall . The Layer 3 switch can offer outstanding protection for a VLAN network but can also be a network administrator ' s worst nightmare if not properly configured.&lt;/p&gt;
&lt;h2&gt;5. Securing VLAN Devices&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even though many administrators and IT managers are aware of VLAN technologies and concepts, that doesn't necessarily hold true when it comes to VLAN security.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The first principle in securing a VLAN network is physical security. If an organization does not want its devices tampered with, physical access must be strictly controlled. Core switches are usually safely located in a data center with restricted access, but edge switches are often located in exposed areas.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Just as physical security guidelines require equipment to be in a controlled space, VLAN-based security requires the use of special tools and following a few best security practices to achieve the desired result.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These best practices include:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Removing console-port cables and introducing password-protected console or virtual terminal access with specified timeouts and restricted access policies;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Applying the same commands to the virtual terminal (telnet/Secure Shell) section and creating an access-list to restrict telnet/SHH access from specific networks and hosts;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Avoiding use of using VLAN1 (the default VLAN) as the network data VLAN ;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Disabling high-risk protocols on any port that doesn't require them (e.g CDP, DTP, PAgP, UDLD);&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Deploying VTP domain, VTP pruning and password protections;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Controlling inter-VLAN routing through the use of IP access lists.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;For hands-on details about each of these practices, read through our &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer3 Switch Configuration Guide&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer3 Switch Configuration Guide&lt;/a&gt;&lt;/strong&gt;.&lt;/div&gt;
&lt;h2&gt;Raising the Throttle&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VLAN technology offers numerous enhancements to the network and provides paths to run multiple services in isolated environments without sacrificing speed, quality and network availability. If the necessary basic security guidelines are taken into consideration during initial implementation and then during ongoing administration, a VLAN can dramatically reduce administrative overhead.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Perhaps the most serious mistake that can be made is to underestimate the importance of the data link layer and of VLANs in particular in the architecture of switched networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It should not be forgotten that any network is only as robust as its weakest link, and therefore an equal amount of attention needs to be given to every layer to assure the soundness of the entire structure.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This article covered &lt;strong&gt;basic VLAN concepts&lt;/strong&gt; such as &lt;strong&gt;Access Links&lt;/strong&gt;, &lt;strong&gt;Trunk Links&lt;/strong&gt;, &lt;strong&gt;Virtual Trunk Protocol&lt;/strong&gt; (&lt;strong&gt;VTP&lt;/strong&gt;), &lt;strong&gt;Inter-VLAN routing&lt;/strong&gt; and more. We explained &lt;strong&gt;how VLAN networks operate&lt;/strong&gt;, different methods on &lt;strong&gt;how VLANs communicate&lt;/strong&gt;, and also referenced a few &lt;strong&gt;best VLAN security practices&lt;/strong&gt;. This article is also available for download in pdf format here: VLAN Security - &lt;a href=&quot;https://www.firewall.cx/images/stories/downloads/FedTech_BP-Partsenidis.pdf&quot; target=&quot;_blank&quot; title=&quot;Making the Most of VLANs&quot;&gt;Making the Most of VLANs&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For more information on VLAN Network, readers and visit our dedicated &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Network section&quot;&gt;VLAN Network section&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VTP Pruning</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vtp-pruning.html"/>
		<published>2011-06-08T08:08:17+10:00</published>
		<updated>2011-06-08T08:08:17+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vtp-pruning.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vtp-pruning-intro.webp&quot; alt=&quot;VTP Pruning - Introduction&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vtp-pruning-intro.webp&quot; alt=&quot;vtp pruning&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vtp pruning&quot; /&gt;&lt;strong&gt;VTP (VLAN Trunking Protocol) pruning&lt;/strong&gt; is a feature that is used in Cisco switches to reduce unnecessary traffic in VLAN (Virtual Local Area Network) trunks. When VTP pruning is enabled on a trunk, the switch will stop forwarding broadcast, multicast, and unknown unicast traffic to VLANs that do not have any active ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This feature optimizes network bandwidth utilization by preventing unnecessary traffic from being sent across the network, which can help improve network performance. However, VTP pruning should only be used in situations where there are VLANs with no active ports, as enabling it on all trunks can cause connectivity issues if new ports are added to VLANs in the future.&lt;/p&gt;
&lt;h2&gt;The Broadcast And Unicast Problem In VLAN Networks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-concept.html&quot; target=&quot;_blank&quot; title=&quot;Introduction to VLAN Networks&quot;&gt;&lt;strong&gt;VLAN (Virtual Local Area Network) networks&lt;/strong&gt;&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Network Broadcasts&quot;&gt;broadcast&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-unicast.html&quot; target=&quot;_blank&quot; title=&quot;Unicast&quot;&gt;unicast&lt;/a&gt; problems can occur due to the presence of multiple VLANs within a single physical network. Broadcast packets are sent to all hosts on a network, while unicast packets are sent to a specific host. When a broadcast or unicast packet is sent within a VLAN network, it is forwarded to all ports within the same VLAN. If a large number of broadcast or unicast packets are sent, it can lead to network congestion and slow down the overall network performance. To mitigate these issues, VLANs are used to logically separate network traffic, reducing the number of devices that receive unnecessary broadcast and unicast packets. However, proper configuration and management of VLANs are essential to prevent broadcast storms and ensure efficient use of network resources.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below diagram is an example of how network broadcasts can flood the network, creating uncessary traffic through all trunk links:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-1.gif&quot; alt=&quot;vlans-pruning-1&quot; width=&quot;481&quot; height=&quot;307&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown and described, a host connected to a port configured for &lt;strong&gt;VLAN 2&lt;/strong&gt; on &lt;strong&gt;Switch 1&lt;/strong&gt; (first switch on the left), generates a &lt;strong&gt;network broadcast&lt;/strong&gt;. Naturally, the switch will forward the broadcast out &lt;strong&gt;all ports assigned to the same VLAN&lt;/strong&gt; it was received from, that is, &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, the Catalyst switch will forward the broadcast out its &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Trunk Links&quot;&gt;&lt;strong&gt;trunk link&lt;/strong&gt;&lt;/a&gt;, so it may reach all ports in the network assigned to &lt;strong&gt;VLAN 2&lt;/strong&gt;. The &lt;strong&gt;Root switch&lt;/strong&gt; receives the broadcast through one of it's trunks and immediately forwards it to its downlink ports to Switch 2 and Switch 3.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Switch 2 is delighted to receive the broadcast as it does in fact have one port assigned to VLAN 2. Switch 3 however has &lt;strong&gt;no ports assigned to VLAN 2&lt;/strong&gt; and therefore will drop the broadcast packet received. In this example, Switch 3's uplink received broadcast traffic that was not necessary, therefore wasting valuable bandwidth.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whie the inefficent usage of Switch 3's uplink doesn't seem like a major issue, the &lt;span data-dobid=&quot;hdw&quot;&gt;magnitude&lt;/span&gt; of this problem can be easily appreciated within a large network of switches as shown in the below diagram:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-2.gif&quot; alt=&quot;vlans-pruning-2&quot; width=&quot;578&quot; height=&quot;308&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Here we have a medium sized network powered by Cisco Catalyst switches. The two main switches up the top are the &lt;strong&gt;VTP servers&lt;/strong&gt; and also perform &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html&quot; target=&quot;_blank&quot; title=&quot;Inter-VLAN routing&quot;&gt;Inter-VLAN routing&lt;/a&gt; by routing packets between the different VLAN networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Below the core switches are the distribution-layer Catalyst switches (2950) with redundant fiber trunk links. Directly below the 2950 switches are the access-layer Catalyst switches (2948) allowing&amp;nbsp; workstations connect to the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In this example, a workstation connected to VLAN 2 sends a &lt;strong&gt;network broadcast&lt;/strong&gt; request (lower left corner) to the network. As shown on the diagram, this broadcast will be sent out all network ports assigned to VLAN 2 on the local switch, but also out through all uplink ports to other switches. The same will occur on all other switches, causing a large amount of uncessary traffic through network uplinks:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-3.gif&quot; alt=&quot;vlans-pruning-3&quot; width=&quot;578&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;We can appreciate how much uncessary traffic is generated here and how easily switch uplinks can be flooding with broadcast traffic.&lt;/p&gt;
&lt;p&gt;Once can still argue that in today's modern multi-gigabit networks, this would be insignificant traffic, however from a design perspective, this is by far not an efficient network design.&lt;/p&gt;
&lt;h2&gt;The Solution: Enabling VTP Pruning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VTP Pruning&lt;/strong&gt; as you might have already guessed solves the above problem by reducing the unnecessary flooded traffic described previously. This is done by forwarding broadcasts and unknown unicast frames on a VLAN over trunk links &lt;strong&gt;only&lt;/strong&gt; if the switch on the other end of the link &lt;strong&gt;has ports configured for that VLAN&lt;/strong&gt;.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-4.gif&quot; alt=&quot;vlans-pruning-4&quot; width=&quot;476&quot; height=&quot;298&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the above diagram you will notice that the Root Catalyst 3550 Switch receives a broadcast from Switch 1, but only forwards it out one of it's trunks. The Root Switch knows that the broadcast belongs to VLAN 2 and furthermore it's aware no port is assigned to VLAN 2 on Switch 3, therefore it won't forward it out the trunk link connecting to that switch.&lt;/p&gt;
&lt;h2&gt;Support For VTP Pruning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VTP Pruning service&lt;/strong&gt; is supported by both&lt;strong&gt; VTP 1&lt;/strong&gt; and &lt;strong&gt;VTP 2&lt;/strong&gt; versions of the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;VTP protocol&quot;&gt;VTP protocol&lt;/a&gt;. With VTP 1, VTP pruning is possible with the use of additional &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-analysis.html&quot; target=&quot;_blank&quot; title=&quot;VTP message types&quot;&gt;VTP message types&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a Cisco Catalyst switch has ports associated with a VLAN, it will send an advertisement to its neighboring switches informing them about the ports it has active on that VLAN. This information is then stored by the neighbors and used to decide if flooded traffic from a VLAN should be forwarded to the switch via the trunk port or not.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VTP Pruning configuration and commands are covered in section 11.4 as outlined in the &lt;a href=&quot;https://www.firewall.cx/networking-topics/vlan-networks.html&quot;&gt;VLAN Introduction page&lt;/a&gt;, however, we should inform you that you can actually enable pruning for specific VLANs in your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you enable VTP Pruning on your network, all VLANs become eligible for pruning on all trunk links. This default list of pruning eligibility can thankfully be modified to suite your needs but you must first clear all VLANs from the list using the&amp;nbsp;&lt;strong&gt;clear vtp prune-eligible vlan-range&lt;/strong&gt; command and then set the VLAN range you wish to add in the prune eligible list by issuing the following command:&amp;nbsp;&lt;strong&gt;set vtp prune-eligible vlan-range&lt;/strong&gt; where the 'vlan-range' is the actual inclusive range of VLANs e.g '2-20'.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By default, VLANs 2–1000 are eligible for pruning. VLAN 1 has a special meaning because it is normally used as a management VLAN and is never eligible for pruning, while VLANs 1001–1005 are also never eligible for pruning. If the VLANs are configured as pruning-ineligible, the flooding continues as illustrated in our examples.&lt;/p&gt;
&lt;p class=&quot;info&quot;&gt;&lt;strong&gt;VTP Pruning&lt;/strong&gt; is &lt;strong&gt;disabled&lt;/strong&gt; by default on all Cisco Catalyst switches and can be enabled by issuing the&amp;nbsp;&lt;strong&gt;set vtp pruning enable&lt;/strong&gt; command on the VTP Server. This will also enable VTP pruning for the entire management domain.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VTP Pruning&lt;/strong&gt; is a much welcomed feature within any VTP-enabled Cisco powered network, assiting in increasing bandwidth availability by restricting broadcast and unknown unicast traffic. We provided examples on how VTP can be configured and the effects it has in a small but also large network.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vtp-pruning-intro.webp&quot; alt=&quot;VTP Pruning - Introduction&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vtp-pruning-intro.webp&quot; alt=&quot;vtp pruning&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vtp pruning&quot; /&gt;&lt;strong&gt;VTP (VLAN Trunking Protocol) pruning&lt;/strong&gt; is a feature that is used in Cisco switches to reduce unnecessary traffic in VLAN (Virtual Local Area Network) trunks. When VTP pruning is enabled on a trunk, the switch will stop forwarding broadcast, multicast, and unknown unicast traffic to VLANs that do not have any active ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This feature optimizes network bandwidth utilization by preventing unnecessary traffic from being sent across the network, which can help improve network performance. However, VTP pruning should only be used in situations where there are VLANs with no active ports, as enabling it on all trunks can cause connectivity issues if new ports are added to VLANs in the future.&lt;/p&gt;
&lt;h2&gt;The Broadcast And Unicast Problem In VLAN Networks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-concept.html&quot; target=&quot;_blank&quot; title=&quot;Introduction to VLAN Networks&quot;&gt;&lt;strong&gt;VLAN (Virtual Local Area Network) networks&lt;/strong&gt;&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Network Broadcasts&quot;&gt;broadcast&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-unicast.html&quot; target=&quot;_blank&quot; title=&quot;Unicast&quot;&gt;unicast&lt;/a&gt; problems can occur due to the presence of multiple VLANs within a single physical network. Broadcast packets are sent to all hosts on a network, while unicast packets are sent to a specific host. When a broadcast or unicast packet is sent within a VLAN network, it is forwarded to all ports within the same VLAN. If a large number of broadcast or unicast packets are sent, it can lead to network congestion and slow down the overall network performance. To mitigate these issues, VLANs are used to logically separate network traffic, reducing the number of devices that receive unnecessary broadcast and unicast packets. However, proper configuration and management of VLANs are essential to prevent broadcast storms and ensure efficient use of network resources.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below diagram is an example of how network broadcasts can flood the network, creating uncessary traffic through all trunk links:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-1.gif&quot; alt=&quot;vlans-pruning-1&quot; width=&quot;481&quot; height=&quot;307&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown and described, a host connected to a port configured for &lt;strong&gt;VLAN 2&lt;/strong&gt; on &lt;strong&gt;Switch 1&lt;/strong&gt; (first switch on the left), generates a &lt;strong&gt;network broadcast&lt;/strong&gt;. Naturally, the switch will forward the broadcast out &lt;strong&gt;all ports assigned to the same VLAN&lt;/strong&gt; it was received from, that is, &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, the Catalyst switch will forward the broadcast out its &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Trunk Links&quot;&gt;&lt;strong&gt;trunk link&lt;/strong&gt;&lt;/a&gt;, so it may reach all ports in the network assigned to &lt;strong&gt;VLAN 2&lt;/strong&gt;. The &lt;strong&gt;Root switch&lt;/strong&gt; receives the broadcast through one of it's trunks and immediately forwards it to its downlink ports to Switch 2 and Switch 3.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Switch 2 is delighted to receive the broadcast as it does in fact have one port assigned to VLAN 2. Switch 3 however has &lt;strong&gt;no ports assigned to VLAN 2&lt;/strong&gt; and therefore will drop the broadcast packet received. In this example, Switch 3's uplink received broadcast traffic that was not necessary, therefore wasting valuable bandwidth.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whie the inefficent usage of Switch 3's uplink doesn't seem like a major issue, the &lt;span data-dobid=&quot;hdw&quot;&gt;magnitude&lt;/span&gt; of this problem can be easily appreciated within a large network of switches as shown in the below diagram:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-2.gif&quot; alt=&quot;vlans-pruning-2&quot; width=&quot;578&quot; height=&quot;308&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Here we have a medium sized network powered by Cisco Catalyst switches. The two main switches up the top are the &lt;strong&gt;VTP servers&lt;/strong&gt; and also perform &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html&quot; target=&quot;_blank&quot; title=&quot;Inter-VLAN routing&quot;&gt;Inter-VLAN routing&lt;/a&gt; by routing packets between the different VLAN networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Below the core switches are the distribution-layer Catalyst switches (2950) with redundant fiber trunk links. Directly below the 2950 switches are the access-layer Catalyst switches (2948) allowing&amp;nbsp; workstations connect to the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In this example, a workstation connected to VLAN 2 sends a &lt;strong&gt;network broadcast&lt;/strong&gt; request (lower left corner) to the network. As shown on the diagram, this broadcast will be sent out all network ports assigned to VLAN 2 on the local switch, but also out through all uplink ports to other switches. The same will occur on all other switches, causing a large amount of uncessary traffic through network uplinks:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-3.gif&quot; alt=&quot;vlans-pruning-3&quot; width=&quot;578&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;We can appreciate how much uncessary traffic is generated here and how easily switch uplinks can be flooding with broadcast traffic.&lt;/p&gt;
&lt;p&gt;Once can still argue that in today's modern multi-gigabit networks, this would be insignificant traffic, however from a design perspective, this is by far not an efficient network design.&lt;/p&gt;
&lt;h2&gt;The Solution: Enabling VTP Pruning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VTP Pruning&lt;/strong&gt; as you might have already guessed solves the above problem by reducing the unnecessary flooded traffic described previously. This is done by forwarding broadcasts and unknown unicast frames on a VLAN over trunk links &lt;strong&gt;only&lt;/strong&gt; if the switch on the other end of the link &lt;strong&gt;has ports configured for that VLAN&lt;/strong&gt;.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-pruning-4.gif&quot; alt=&quot;vlans-pruning-4&quot; width=&quot;476&quot; height=&quot;298&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the above diagram you will notice that the Root Catalyst 3550 Switch receives a broadcast from Switch 1, but only forwards it out one of it's trunks. The Root Switch knows that the broadcast belongs to VLAN 2 and furthermore it's aware no port is assigned to VLAN 2 on Switch 3, therefore it won't forward it out the trunk link connecting to that switch.&lt;/p&gt;
&lt;h2&gt;Support For VTP Pruning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VTP Pruning service&lt;/strong&gt; is supported by both&lt;strong&gt; VTP 1&lt;/strong&gt; and &lt;strong&gt;VTP 2&lt;/strong&gt; versions of the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;VTP protocol&quot;&gt;VTP protocol&lt;/a&gt;. With VTP 1, VTP pruning is possible with the use of additional &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-analysis.html&quot; target=&quot;_blank&quot; title=&quot;VTP message types&quot;&gt;VTP message types&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a Cisco Catalyst switch has ports associated with a VLAN, it will send an advertisement to its neighboring switches informing them about the ports it has active on that VLAN. This information is then stored by the neighbors and used to decide if flooded traffic from a VLAN should be forwarded to the switch via the trunk port or not.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VTP Pruning configuration and commands are covered in section 11.4 as outlined in the &lt;a href=&quot;https://www.firewall.cx/networking-topics/vlan-networks.html&quot;&gt;VLAN Introduction page&lt;/a&gt;, however, we should inform you that you can actually enable pruning for specific VLANs in your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you enable VTP Pruning on your network, all VLANs become eligible for pruning on all trunk links. This default list of pruning eligibility can thankfully be modified to suite your needs but you must first clear all VLANs from the list using the&amp;nbsp;&lt;strong&gt;clear vtp prune-eligible vlan-range&lt;/strong&gt; command and then set the VLAN range you wish to add in the prune eligible list by issuing the following command:&amp;nbsp;&lt;strong&gt;set vtp prune-eligible vlan-range&lt;/strong&gt; where the 'vlan-range' is the actual inclusive range of VLANs e.g '2-20'.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By default, VLANs 2–1000 are eligible for pruning. VLAN 1 has a special meaning because it is normally used as a management VLAN and is never eligible for pruning, while VLANs 1001–1005 are also never eligible for pruning. If the VLANs are configured as pruning-ineligible, the flooding continues as illustrated in our examples.&lt;/p&gt;
&lt;p class=&quot;info&quot;&gt;&lt;strong&gt;VTP Pruning&lt;/strong&gt; is &lt;strong&gt;disabled&lt;/strong&gt; by default on all Cisco Catalyst switches and can be enabled by issuing the&amp;nbsp;&lt;strong&gt;set vtp pruning enable&lt;/strong&gt; command on the VTP Server. This will also enable VTP pruning for the entire management domain.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VTP Pruning&lt;/strong&gt; is a much welcomed feature within any VTP-enabled Cisco powered network, assiting in increasing bandwidth availability by restricting broadcast and unknown unicast traffic. We provided examples on how VTP can be configured and the effects it has in a small but also large network.&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VTP Protocol - In-Depth Analysis</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vtp-analysis.html"/>
		<published>2011-06-08T07:42:11+10:00</published>
		<updated>2011-06-08T07:42:11+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vtp-analysis.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vtp-analysis-intro.webp&quot; alt=&quot;VTP Protocol Analysis&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vtp-analysis-intro.webp&quot; alt=&quot;vtp protocol analysis&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vtp protocol analysis&quot; /&gt;The &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;VTP Modes&quot;&gt;previous article&lt;/a&gt; introduced the &lt;strong&gt;VTP protocol&lt;/strong&gt;, we examined how it can be used within a network, to help manage VLANs and ease the administrative overhead, providing a stress-free VLAN environment by automatically updating all the network switches with the latest VLAN information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article extends on the above by delving into the &lt;strong&gt;VTP protocol&lt;/strong&gt; itself and analysing it's structure and format in order to gain a better understanding and enhance those troubleshooting skills.&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;The VTP Protocol Structure&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We've mentioned that the &lt;strong&gt;VTP protocol&lt;/strong&gt; runs only over &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;trunk links&quot;&gt;trunk links&lt;/a&gt; interconnecting switches in the network. Whether you're using &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;ISL Protocol&quot;&gt;ISL&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;IEEE 802.1q Protocol&quot;&gt;IEEE 802.1q&lt;/a&gt; as your encapsulation protocol, it really doesn't matter as the VTP structure in both cases remains the same.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Following are the fields which consist the &lt;strong&gt;VTP protocol&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;VTP Protocol Version (1 or 2)&lt;/strong&gt;&lt;/li&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;VTP Message Type (See Below)&lt;/strong&gt;&lt;/li&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;Management Domain Length&lt;/strong&gt;&lt;/li&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;Management Domain Name&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we need to note here is that because there are a variety of &lt;strong&gt;VTP Message Types&lt;/strong&gt;, the &lt;strong&gt;VTP Header&lt;/strong&gt; changes depending on these messages, but the fields we just mentioned above are always included.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To be more specific, here are the different messages currently supported by the VTP protocol:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Summary Advertisements&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Subset Advertisement&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Advertisement Requests&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Join Messages&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is obvious that all switches use these different messages to request information or advertise the VLANs they are aware of. These messages are extremely important to understand as they are the foundations of the VTP protocol.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We'll take each message and analyse them individually, explaining their purpose and usage, but before we proceed, let's take a quick visual look at the messages and their types to help make all the above clearer:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-1.gif&quot; alt=&quot;vlans-vtp-analysis-1&quot; width=&quot;484&quot; height=&quot;220&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First up is the&amp;nbsp;&lt;strong&gt;Summary Advertisements&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;VTP Protocol - Summary Advertisement Message&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Summary Advertisement&lt;/strong&gt; message is issued by all &lt;strong&gt;VTP Domain Servers&lt;/strong&gt; in &lt;strong&gt;5 minute intervals&lt;/strong&gt;, or every &lt;strong&gt;300 seconds&lt;/strong&gt;. These advertisements inform nearby Catalyst switches with a variety of information, including the &lt;strong&gt;VTP Domain name&lt;/strong&gt;, &lt;strong&gt;configuration revision number&lt;/strong&gt;, &lt;strong&gt;timestamp&lt;/strong&gt;, &lt;strong&gt;MD5 encryption hash code&lt;/strong&gt;, and the number of &lt;strong&gt;subset advertisements&lt;/strong&gt; to follow.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;configuration version number&lt;/strong&gt; is a value each switch stores to help it identify new changes made in the &lt;strong&gt;VTP domain&lt;/strong&gt;, similar to how DNS keeps track of changes to its resource records via the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/dns-protocol.html&quot; target=&quot;_blank&quot; title=&quot;DNS Protocol&quot;&gt;DNS serial number&lt;/a&gt;. Each time the VTP Server configuration is changed, the configuration revision number will automatically &lt;strong&gt;increment by one&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;When a switch receives a &lt;strong&gt;summary advertisement message&lt;/strong&gt;, it will first compare the &lt;strong&gt;VTP domain name&lt;/strong&gt; (Mgmt Domain Name field) with its own.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-2.gif&quot; alt=&quot;vlans-vtp-analysis-2&quot; width=&quot;600&quot; height=&quot;168&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;If the &lt;strong&gt;Domain Name&lt;/strong&gt; is found to be different, it will discard the message and forward it out its trunk links. However, in the likely case that the domain name is found to be the same, it will then check the &lt;strong&gt;configuration revision number&lt;/strong&gt; (Config Revision No.) and if found to be the same or lower than it's own, it will &lt;strong&gt;ignore the advertisement&lt;/strong&gt;. If however it is found to be greater, an &lt;strong&gt;advertisement request&lt;/strong&gt; is sent out.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Updater Identity&lt;/strong&gt; field contains the &lt;strong&gt;IP Address&lt;/strong&gt; of the switch that last incremented the &lt;strong&gt;Configuration Revision Number&lt;/strong&gt;, while the &lt;strong&gt;Update Timestamp&lt;/strong&gt; field gives the time the last update took place.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Message Digest 5&lt;/strong&gt; (MD5) carries the VTP password, if MD5 is configured and used to authenticate the validation of a VTP update. Further more, VTP takes the &lt;strong&gt;VTP domain name&lt;/strong&gt; into account when calculating the &lt;strong&gt;VTP MD5 hash&lt;/strong&gt;. MD5 hash &lt;strong&gt;is different&lt;/strong&gt; each time a &lt;strong&gt;vtp update message&lt;/strong&gt; is transmitted even though domain name and password (it is null by default) are same. This is because the &lt;strong&gt;configuration revision number&lt;/strong&gt; is &lt;strong&gt;used to calculate the MD5 hash&lt;/strong&gt; and as it is different after creating the vlan, therefore the MD5 will also be different.&lt;/p&gt;
&lt;p&gt;Lastly, summary advertisements are usually followed by &lt;strong&gt;Subset Advertisements&lt;/strong&gt;, this is indicated by the&amp;nbsp;&lt;strong&gt;Followers&lt;/strong&gt; field and is the next message we'll be closely examining.&lt;/p&gt;
&lt;h2&gt;VTP Protocol - Subset Advertisement&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned in the previous message, when VLAN changes are made on the Catalyst VTP Server, it will then issue a &lt;strong&gt;Summary Advertisement&lt;/strong&gt;, followed by a &lt;strong&gt;Subset Advertisement&lt;/strong&gt;. Depending on how many VLANs are configured in the domain, there might be more than one &lt;strong&gt;Subset Advertisement&lt;/strong&gt; sent to ensure all VLAN information is updated on the VTP Clients.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-3.gif&quot; alt=&quot;vlans-vtp-analysis-3&quot; width=&quot;476&quot; height=&quot;184&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Comparing the fields of this message with the previous one, you'll notice most of them are identical, except for the &lt;strong&gt;Sequence No.&lt;/strong&gt; and &lt;strong&gt;VLAN Info. Field&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Code&lt;/strong&gt; field for a &lt;strong&gt;Subset Advertisement&lt;/strong&gt; of this type is set to &lt;strong&gt;0x02&lt;/strong&gt; while the &lt;strong&gt;Sequence No.&lt;/strong&gt; field contains the sequence of the packet in the stream of packets following a summary advertisement. The sequence starts with 1 and increments based on the number of packets in the stream.&lt;/p&gt;
&lt;p&gt;Apart from these fields, we also have the &lt;strong&gt;VLAN Info Field&lt;/strong&gt;, which happens to be the most important as it contains all the VLAN information the switches are waiting for.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;VLAN Info Field&lt;/strong&gt; will be presented in segments. Complexity and importance requires us to break it up further and analyse the subfields it contains:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-4.gif&quot; alt=&quot;vlans-vtp-analysis-4&quot; width=&quot;602&quot; height=&quot;226&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each &lt;strong&gt;VLAN Info Field&lt;/strong&gt; contains all the information required for one VLAN. This means that if our network is powered with 10 VLANs and a &lt;strong&gt;Subset Advertisement&lt;/strong&gt; is triggered, the VTP Server will send a total of &lt;strong&gt;10 Subset Advertisements&lt;/strong&gt; since each &lt;strong&gt;VLAN Info Field&lt;/strong&gt; contains data for one VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The most important subfields in the &lt;strong&gt;VLAN Info Field&lt;/strong&gt; are the &lt;strong&gt;VLAN Name Length&lt;/strong&gt;, &lt;strong&gt;ISL VLAN ID&lt;/strong&gt;, &lt;strong&gt;MTU Size&lt;/strong&gt; and &lt;strong&gt;VLAN Name&lt;/strong&gt;. These subfields contain critical information about the VLAN advertised in the particular Subset Advertisement frame. Some might be suprised to see settings such as MTU's to be configurable in VLAN's, and this confirms that each VLAN is treated as a separate network, where even different MTU sizes are possible amongst your network's VLANS.&lt;/p&gt;
&lt;h2&gt;Advertisement Requests&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Turning a Cisco switch off will result loosing &lt;strong&gt;all&lt;/strong&gt; its VTP information stored in its memory (RAM). When the switch is next turned on, all its database information is reset and therefore requires to be updated with the latest version available from the VTP Server(s).&lt;/p&gt;
&lt;p&gt;A switch will also send an &lt;strong&gt;Advertisement Request&lt;/strong&gt; when it hears a &lt;strong&gt;VTP summary advertisement&lt;/strong&gt; with a &lt;strong&gt;higher revision number&lt;/strong&gt; than what it currently has. Another scenario where a request would be issued is when the &lt;strong&gt;VTP domain membership&lt;/strong&gt; has changed, even though this is quite uncommon since the VTP domain name is rarely, if ever, changed after its initial configuration.&lt;/p&gt;
&lt;p&gt;So what happens when an &lt;strong&gt;Advertisement Request&lt;/strong&gt; is sent on the network?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As you would already be aware from the &lt;strong&gt;message types&lt;/strong&gt; covered, the &lt;strong&gt;VTP Server&lt;/strong&gt; will respond with &lt;strong&gt;Summary Advertisement&lt;/strong&gt;, followed by as many &lt;strong&gt;Subset Advertisements&lt;/strong&gt; required to inform the &lt;strong&gt;VTP Clients&lt;/strong&gt; about the configured VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram below shows the structure of an &lt;strong&gt;Advertisement Request&lt;/strong&gt; sent by a &lt;strong&gt;VTP Client switch&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-5.gif&quot; alt=&quot;vlans-vtp-analysis-5&quot; width=&quot;447&quot; height=&quot;166&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Most fields as you can see, are similar to the previous messages we've seen, except two: The &lt;strong&gt;Reserved&lt;/strong&gt; and &lt;strong&gt;Starting Advertisement To Request&lt;/strong&gt;. The &lt;strong&gt;Reserved&lt;/strong&gt; is exactly what it implies - reserved and not used in the &lt;strong&gt;Advertisement Request&lt;/strong&gt; messages, while the &lt;strong&gt;Starting Advertisement To Request&lt;/strong&gt; is the actual request sent by the &lt;strong&gt;VTP Client&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;VTP Join Messages&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;VTP Join Messages &lt;/strong&gt;are similar to the &lt;strong&gt;Advertisement Request&lt;/strong&gt; messages but with a different &lt;strong&gt;Message Type&lt;/strong&gt; field value and a few more parameters. As indicated by the message name, a &lt;strong&gt;VTP Join Message&lt;/strong&gt; is sent by the&amp;nbsp;&lt;strong&gt;VTP Client&lt;/strong&gt;, and directed to the &lt;strong&gt;VTP Server&lt;/strong&gt;, when it first joins a &lt;strong&gt;VTP domain&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Other VTP Options - VTP Password&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The&lt;strong&gt; VTP Password&lt;/strong&gt; is a necessary feature to ensure the security and integrity of VTP messages. With the password feature, you are able to secure your &lt;strong&gt;VTP Domain&lt;/strong&gt; since only switches configured with the correct password are able to properly decrypt the &lt;strong&gt;VTP messages&lt;/strong&gt; advertised in the management VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;By default the &lt;strong&gt;VTP Password&lt;/strong&gt; option is not turned on and therefore most management VLANs are set to use non-secure advertisements. Once enabled on the VTP Domain Server(s), all switches participating in the domain must be manually configured with the same password, otherwise it will fail to decrypt all incoming VTP messages.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This page analysed the structure of each message the VTP protocol currently supports to maintain the network's switches in synchronisation with the VTP domain server(s):&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Summary Advertisements&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Subset Advertisement&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Advertisement Requests&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Join Messages&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We're sure you would agree that VLAN's are in fact a whole study case alone, but surely at the same time it's quite exciting as new concepts and methods of ensuring stability, speed and reliability are revealed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This completes our &lt;strong&gt;in-depth discussion&lt;/strong&gt; on the &lt;strong&gt;VTP Protocol messages&lt;/strong&gt;. Next up is &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-pruning.html&quot; target=&quot;_blank&quot; title=&quot;VTP Prunning&quot;&gt;VTP Prunning&lt;/a&gt;, a much needed service that ensures our network backbone is not constantly flooded with unnecessary traffic. We are sure you'll enjoy the page, along with the awesome diagrams we have prepared.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vtp-analysis-intro.webp&quot; alt=&quot;VTP Protocol Analysis&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vtp-analysis-intro.webp&quot; alt=&quot;vtp protocol analysis&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vtp protocol analysis&quot; /&gt;The &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;VTP Modes&quot;&gt;previous article&lt;/a&gt; introduced the &lt;strong&gt;VTP protocol&lt;/strong&gt;, we examined how it can be used within a network, to help manage VLANs and ease the administrative overhead, providing a stress-free VLAN environment by automatically updating all the network switches with the latest VLAN information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article extends on the above by delving into the &lt;strong&gt;VTP protocol&lt;/strong&gt; itself and analysing it's structure and format in order to gain a better understanding and enhance those troubleshooting skills.&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;The VTP Protocol Structure&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We've mentioned that the &lt;strong&gt;VTP protocol&lt;/strong&gt; runs only over &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; target=&quot;_blank&quot; title=&quot;trunk links&quot;&gt;trunk links&lt;/a&gt; interconnecting switches in the network. Whether you're using &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;ISL Protocol&quot;&gt;ISL&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;IEEE 802.1q Protocol&quot;&gt;IEEE 802.1q&lt;/a&gt; as your encapsulation protocol, it really doesn't matter as the VTP structure in both cases remains the same.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Following are the fields which consist the &lt;strong&gt;VTP protocol&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;VTP Protocol Version (1 or 2)&lt;/strong&gt;&lt;/li&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;VTP Message Type (See Below)&lt;/strong&gt;&lt;/li&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;Management Domain Length&lt;/strong&gt;&lt;/li&gt;
&lt;li type=&quot;square&quot;&gt;&lt;strong&gt;Management Domain Name&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we need to note here is that because there are a variety of &lt;strong&gt;VTP Message Types&lt;/strong&gt;, the &lt;strong&gt;VTP Header&lt;/strong&gt; changes depending on these messages, but the fields we just mentioned above are always included.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To be more specific, here are the different messages currently supported by the VTP protocol:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Summary Advertisements&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Subset Advertisement&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Advertisement Requests&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Join Messages&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is obvious that all switches use these different messages to request information or advertise the VLANs they are aware of. These messages are extremely important to understand as they are the foundations of the VTP protocol.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We'll take each message and analyse them individually, explaining their purpose and usage, but before we proceed, let's take a quick visual look at the messages and their types to help make all the above clearer:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-1.gif&quot; alt=&quot;vlans-vtp-analysis-1&quot; width=&quot;484&quot; height=&quot;220&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First up is the&amp;nbsp;&lt;strong&gt;Summary Advertisements&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;VTP Protocol - Summary Advertisement Message&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Summary Advertisement&lt;/strong&gt; message is issued by all &lt;strong&gt;VTP Domain Servers&lt;/strong&gt; in &lt;strong&gt;5 minute intervals&lt;/strong&gt;, or every &lt;strong&gt;300 seconds&lt;/strong&gt;. These advertisements inform nearby Catalyst switches with a variety of information, including the &lt;strong&gt;VTP Domain name&lt;/strong&gt;, &lt;strong&gt;configuration revision number&lt;/strong&gt;, &lt;strong&gt;timestamp&lt;/strong&gt;, &lt;strong&gt;MD5 encryption hash code&lt;/strong&gt;, and the number of &lt;strong&gt;subset advertisements&lt;/strong&gt; to follow.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;configuration version number&lt;/strong&gt; is a value each switch stores to help it identify new changes made in the &lt;strong&gt;VTP domain&lt;/strong&gt;, similar to how DNS keeps track of changes to its resource records via the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/dns-protocol.html&quot; target=&quot;_blank&quot; title=&quot;DNS Protocol&quot;&gt;DNS serial number&lt;/a&gt;. Each time the VTP Server configuration is changed, the configuration revision number will automatically &lt;strong&gt;increment by one&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;When a switch receives a &lt;strong&gt;summary advertisement message&lt;/strong&gt;, it will first compare the &lt;strong&gt;VTP domain name&lt;/strong&gt; (Mgmt Domain Name field) with its own.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-2.gif&quot; alt=&quot;vlans-vtp-analysis-2&quot; width=&quot;600&quot; height=&quot;168&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;If the &lt;strong&gt;Domain Name&lt;/strong&gt; is found to be different, it will discard the message and forward it out its trunk links. However, in the likely case that the domain name is found to be the same, it will then check the &lt;strong&gt;configuration revision number&lt;/strong&gt; (Config Revision No.) and if found to be the same or lower than it's own, it will &lt;strong&gt;ignore the advertisement&lt;/strong&gt;. If however it is found to be greater, an &lt;strong&gt;advertisement request&lt;/strong&gt; is sent out.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Updater Identity&lt;/strong&gt; field contains the &lt;strong&gt;IP Address&lt;/strong&gt; of the switch that last incremented the &lt;strong&gt;Configuration Revision Number&lt;/strong&gt;, while the &lt;strong&gt;Update Timestamp&lt;/strong&gt; field gives the time the last update took place.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Message Digest 5&lt;/strong&gt; (MD5) carries the VTP password, if MD5 is configured and used to authenticate the validation of a VTP update. Further more, VTP takes the &lt;strong&gt;VTP domain name&lt;/strong&gt; into account when calculating the &lt;strong&gt;VTP MD5 hash&lt;/strong&gt;. MD5 hash &lt;strong&gt;is different&lt;/strong&gt; each time a &lt;strong&gt;vtp update message&lt;/strong&gt; is transmitted even though domain name and password (it is null by default) are same. This is because the &lt;strong&gt;configuration revision number&lt;/strong&gt; is &lt;strong&gt;used to calculate the MD5 hash&lt;/strong&gt; and as it is different after creating the vlan, therefore the MD5 will also be different.&lt;/p&gt;
&lt;p&gt;Lastly, summary advertisements are usually followed by &lt;strong&gt;Subset Advertisements&lt;/strong&gt;, this is indicated by the&amp;nbsp;&lt;strong&gt;Followers&lt;/strong&gt; field and is the next message we'll be closely examining.&lt;/p&gt;
&lt;h2&gt;VTP Protocol - Subset Advertisement&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned in the previous message, when VLAN changes are made on the Catalyst VTP Server, it will then issue a &lt;strong&gt;Summary Advertisement&lt;/strong&gt;, followed by a &lt;strong&gt;Subset Advertisement&lt;/strong&gt;. Depending on how many VLANs are configured in the domain, there might be more than one &lt;strong&gt;Subset Advertisement&lt;/strong&gt; sent to ensure all VLAN information is updated on the VTP Clients.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-3.gif&quot; alt=&quot;vlans-vtp-analysis-3&quot; width=&quot;476&quot; height=&quot;184&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Comparing the fields of this message with the previous one, you'll notice most of them are identical, except for the &lt;strong&gt;Sequence No.&lt;/strong&gt; and &lt;strong&gt;VLAN Info. Field&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Code&lt;/strong&gt; field for a &lt;strong&gt;Subset Advertisement&lt;/strong&gt; of this type is set to &lt;strong&gt;0x02&lt;/strong&gt; while the &lt;strong&gt;Sequence No.&lt;/strong&gt; field contains the sequence of the packet in the stream of packets following a summary advertisement. The sequence starts with 1 and increments based on the number of packets in the stream.&lt;/p&gt;
&lt;p&gt;Apart from these fields, we also have the &lt;strong&gt;VLAN Info Field&lt;/strong&gt;, which happens to be the most important as it contains all the VLAN information the switches are waiting for.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;VLAN Info Field&lt;/strong&gt; will be presented in segments. Complexity and importance requires us to break it up further and analyse the subfields it contains:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-4.gif&quot; alt=&quot;vlans-vtp-analysis-4&quot; width=&quot;602&quot; height=&quot;226&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each &lt;strong&gt;VLAN Info Field&lt;/strong&gt; contains all the information required for one VLAN. This means that if our network is powered with 10 VLANs and a &lt;strong&gt;Subset Advertisement&lt;/strong&gt; is triggered, the VTP Server will send a total of &lt;strong&gt;10 Subset Advertisements&lt;/strong&gt; since each &lt;strong&gt;VLAN Info Field&lt;/strong&gt; contains data for one VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The most important subfields in the &lt;strong&gt;VLAN Info Field&lt;/strong&gt; are the &lt;strong&gt;VLAN Name Length&lt;/strong&gt;, &lt;strong&gt;ISL VLAN ID&lt;/strong&gt;, &lt;strong&gt;MTU Size&lt;/strong&gt; and &lt;strong&gt;VLAN Name&lt;/strong&gt;. These subfields contain critical information about the VLAN advertised in the particular Subset Advertisement frame. Some might be suprised to see settings such as MTU's to be configurable in VLAN's, and this confirms that each VLAN is treated as a separate network, where even different MTU sizes are possible amongst your network's VLANS.&lt;/p&gt;
&lt;h2&gt;Advertisement Requests&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Turning a Cisco switch off will result loosing &lt;strong&gt;all&lt;/strong&gt; its VTP information stored in its memory (RAM). When the switch is next turned on, all its database information is reset and therefore requires to be updated with the latest version available from the VTP Server(s).&lt;/p&gt;
&lt;p&gt;A switch will also send an &lt;strong&gt;Advertisement Request&lt;/strong&gt; when it hears a &lt;strong&gt;VTP summary advertisement&lt;/strong&gt; with a &lt;strong&gt;higher revision number&lt;/strong&gt; than what it currently has. Another scenario where a request would be issued is when the &lt;strong&gt;VTP domain membership&lt;/strong&gt; has changed, even though this is quite uncommon since the VTP domain name is rarely, if ever, changed after its initial configuration.&lt;/p&gt;
&lt;p&gt;So what happens when an &lt;strong&gt;Advertisement Request&lt;/strong&gt; is sent on the network?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As you would already be aware from the &lt;strong&gt;message types&lt;/strong&gt; covered, the &lt;strong&gt;VTP Server&lt;/strong&gt; will respond with &lt;strong&gt;Summary Advertisement&lt;/strong&gt;, followed by as many &lt;strong&gt;Subset Advertisements&lt;/strong&gt; required to inform the &lt;strong&gt;VTP Clients&lt;/strong&gt; about the configured VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram below shows the structure of an &lt;strong&gt;Advertisement Request&lt;/strong&gt; sent by a &lt;strong&gt;VTP Client switch&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-analysis-5.gif&quot; alt=&quot;vlans-vtp-analysis-5&quot; width=&quot;447&quot; height=&quot;166&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Most fields as you can see, are similar to the previous messages we've seen, except two: The &lt;strong&gt;Reserved&lt;/strong&gt; and &lt;strong&gt;Starting Advertisement To Request&lt;/strong&gt;. The &lt;strong&gt;Reserved&lt;/strong&gt; is exactly what it implies - reserved and not used in the &lt;strong&gt;Advertisement Request&lt;/strong&gt; messages, while the &lt;strong&gt;Starting Advertisement To Request&lt;/strong&gt; is the actual request sent by the &lt;strong&gt;VTP Client&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;VTP Join Messages&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;VTP Join Messages &lt;/strong&gt;are similar to the &lt;strong&gt;Advertisement Request&lt;/strong&gt; messages but with a different &lt;strong&gt;Message Type&lt;/strong&gt; field value and a few more parameters. As indicated by the message name, a &lt;strong&gt;VTP Join Message&lt;/strong&gt; is sent by the&amp;nbsp;&lt;strong&gt;VTP Client&lt;/strong&gt;, and directed to the &lt;strong&gt;VTP Server&lt;/strong&gt;, when it first joins a &lt;strong&gt;VTP domain&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Other VTP Options - VTP Password&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The&lt;strong&gt; VTP Password&lt;/strong&gt; is a necessary feature to ensure the security and integrity of VTP messages. With the password feature, you are able to secure your &lt;strong&gt;VTP Domain&lt;/strong&gt; since only switches configured with the correct password are able to properly decrypt the &lt;strong&gt;VTP messages&lt;/strong&gt; advertised in the management VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;By default the &lt;strong&gt;VTP Password&lt;/strong&gt; option is not turned on and therefore most management VLANs are set to use non-secure advertisements. Once enabled on the VTP Domain Server(s), all switches participating in the domain must be manually configured with the same password, otherwise it will fail to decrypt all incoming VTP messages.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This page analysed the structure of each message the VTP protocol currently supports to maintain the network's switches in synchronisation with the VTP domain server(s):&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Summary Advertisements&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Subset Advertisement&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Advertisement Requests&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Join Messages&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We're sure you would agree that VLAN's are in fact a whole study case alone, but surely at the same time it's quite exciting as new concepts and methods of ensuring stability, speed and reliability are revealed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This completes our &lt;strong&gt;in-depth discussion&lt;/strong&gt; on the &lt;strong&gt;VTP Protocol messages&lt;/strong&gt;. Next up is &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-pruning.html&quot; target=&quot;_blank&quot; title=&quot;VTP Prunning&quot;&gt;VTP Prunning&lt;/a&gt;, a much needed service that ensures our network backbone is not constantly flooded with unnecessary traffic. We are sure you'll enjoy the page, along with the awesome diagrams we have prepared.&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VTP Introduction &amp; Modes</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html"/>
		<published>2011-05-30T06:45:10+10:00</published>
		<updated>2011-05-30T06:45:10+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vtp-introduction-intro.webp&quot; alt=&quot;Introduction to VTP and VTP Modes&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vtp-introduction-intro.webp&quot; alt=&quot;vtp introduction intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vtp introduction&quot; /&gt;The invention of VLANs was very much welcomed by all engineers and administrators, allowing them to extend, redesign and segment their existing network with minimal costs, while at the same time making it more secure, faster and reliable!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you're responsible for a network of up to 4-6 switches that include a few VLANs, then you'll surely agree that it's usually a low overhead to administer them and periodically make changes - most engineers can live with that:)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Ask now an engineer who's in charge of a medium to a large scale network and you will definately not receive the same answer, simply because these small changes can quickly become a nightmare and if you add the possibility of human error, then the result could be network outages and possibly downtime.&lt;/p&gt;
&lt;h2&gt;Welcome To Virtual Trunk Protocol (VTP)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VTP, a Cisco proprietary protocol, was designed by Cisco with the network engineer and administrator in mind, reducing the administration overhead and the possibility of error as described above in any switched network environment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a new VLAN is created and configured on a switch without the VTP protocol enabled, this must be manually replicated to all switches on the network so they are all aware of the newly created VLAN. This means that the administrator must configure each switch separately, a task that requires a lot of time and adds a considerable amount of overhead depending on the size of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The configuration of a VLAN includes the VLAN number, name and a few more parameters which will be analysed further on. This information is then stored on each switch's NVRAM and any VLAN changes made to any switch must again be replicated manually on all switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the idea of manually updating all switches within your network doesn't scare you because your network is small, then imagine updating more than 15-20 switches a few times per week, so your network can respond to your organisation's needs....have we got you thinking now? :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the VTP protocol configured and operating, you can forget about running around making sure you have updated all switches as you only need to make the changes on the nominated VTP server switch(es) on your network. This will also ensure these changes are magically propagated to all other switches regardless of where they are.&lt;/p&gt;
&lt;h2&gt;Introducing The VTP Modes&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VTP protocol&lt;/strong&gt; is a fairly complex protocol, but easy to understand and implement once you get to know it. Currently, 3 different versions of the protocol exist, that is, version 1, 2 (adds support for Token Ring networks) and 3, with the first version being used in most networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite the variety of versions, it also operates in 3 different modes: Server, client and transparent mode, giving us maximum flexibility on how changes in the network effect the rest of our switches. To help keep things simple and in order to avoid confusion, we will work with the first version of the &lt;strong&gt;VTP protocol - VTP v1&lt;/strong&gt;, covering more than 90% of networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below you'll find the 3 modes the VTP protocol can operate on any switch throughout the network:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;VTP Server mode&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Client mode&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Transparent mode&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each mode has been designed to cover specific network setups and needs, as we are about to see, but for now, we need to understand the purpose of each mode and the following network diagram will help us do exactly that.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-1.gif&quot; alt=&quot;vlans-vtp-1&quot; width=&quot;552&quot; height=&quot;406&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A typical setup involves at least one switch configured as a &lt;strong&gt;VTP Server&lt;/strong&gt;, and multiple switches configured as &lt;strong&gt;VTP Clients&lt;/strong&gt;. The logic behind this setup is that all information regarding VLANs is stored only on the &lt;strong&gt;VTP Server&lt;/strong&gt; switch from which all clients are updated. Any change in the &lt;strong&gt;VLAN database&lt;/strong&gt; will trigger an update from the &lt;strong&gt;VTP Server&lt;/strong&gt; towards all &lt;strong&gt;VTP clients&lt;/strong&gt; so they can update their database.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, be informed that these &lt;strong&gt;VTP updates&lt;/strong&gt; will &lt;strong&gt;only traverse Trunk links&lt;/strong&gt;. This means that you must ensure that all switches connect to the network backbone via &lt;strong&gt;Trunk links&lt;/strong&gt;, otherwise &lt;strong&gt;no VTP updates&lt;/strong&gt; will reach the rest of the switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's now take a closer look at what each &lt;strong&gt;VTP mode&lt;/strong&gt; does and where it can be used.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;VTP Server Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;By default all switches are configured as &lt;strong&gt;VTP Servers&lt;/strong&gt; when first powered on. All VLAN information such as VLAN number and VLAN name is &lt;strong&gt;stored locally&lt;/strong&gt;, on a separate &lt;strong&gt;NVRAM&lt;/strong&gt; memory which is where the device's &lt;strong&gt;startup-config&lt;/strong&gt; is stored. This happens only when the switch is in &lt;strong&gt;VTP Server mode&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For small networks with a limited number of switches and VLANs, storing all VLAN information on every switch is usually not a problem, but as the network expands and VLANs increase in number, it becomes a problem and a decision must be made to select a few powerful switches as the VTP Servers while configuring all other switches to VTP Client mode.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-2.gif&quot; alt=&quot;vlans-vtp-2&quot; width=&quot;552&quot; height=&quot;379&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram above shows a Cisco Catalyst 3550 selected to take the role of the network's VTP Server since it is the most powerful switch. All other Catalyst switches have been configured as VTP Clients, obtaining all VLAN information and updates from the 3550 VTP Server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The method and frequency by which these updates occur is covered in much detail on the pages that follow, so we won't get into any more detail at this point. However, for those who noticed, there is a new concept introduced in the above diagram that we haven't spoken about: The VTP Domain.&lt;/p&gt;
&lt;h2&gt;The VTP Domain - VLAN Management Domain&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VTP Domain&lt;/strong&gt;, also known as the &lt;strong&gt;VLAN Management Domain&lt;/strong&gt;, is a &lt;strong&gt;VTP parameter&lt;/strong&gt; configured on every switch connected to the network and used to define the switches that will participate in any changes or updates made in the specified VTP domain.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Naturally, the core switch (VTP Server) and all other switches participate in the same domain, e.g firewall, so when the VTP Server advertises new VLAN information for the VTP firewall domain, only clients (switches) configured with the same VTP Domain parameter will accept and process these changes, the rest will simply ignore them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, some people tend to relate the VTP Domain with the Internet Domain name space, however, this is completely incorrect. Even though the acronym 'DNS' contains the word 'Domain', it is not related in any way with the VTP Domain. Here (in VTP land), the word 'Domain' is simply used to describe a logical area in which certain hosts (switches) belong to or participate in, and are affected by any changes made within it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We should also note that all Cisco switches default to &lt;strong&gt;VTP Server mode&lt;/strong&gt; but will not transmit any VLAN information to the network until a &lt;strong&gt;VTP Domain&lt;/strong&gt; is set on the switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point we are only referencing the &lt;strong&gt;VTP Domain concept&lt;/strong&gt; as this is also analyzed in greater depth further on, so let's continue with the VTP modes!&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;VTP Client Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In Client Mode, a switch will accept and store in its RAM all VLAN information received from the VTP Server, however, this information is also saved in NVRAM, so if the switch is powered off, it won't loose its VLAN information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The VTP Client behaves like a VTP Server, but you are unable to create, modify or delete VLAN's on it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In most networks, the clients connect directly to the VTP Server as shown in our previous diagram. If, for any reason, two clients are cascaded together, then the information will propagate downwards via the available Trunk links, ensuring it reaches all switches:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-3.gif&quot; alt=&quot;vlans-vtp-3&quot; width=&quot;397&quot; height=&quot;277&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram shows a 3550 Catalyst switch configured as a VTP Server and 4 Catalyst 2950 switches configured as VTP Clients and cascaded below our 3550. When the VTP Server sends a VTP update, this will travel through all trunk links (ISL, 802.1q, 802.10 and ATM LANE), as shown in the diagram.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The advertised information will firstly reach the two Catalyst 2950 switches directly connected to the 3550 and will then travel to the cascaded switches below and through the trunk links. If the link between the cascaded 2950's was not a trunk link but an access link, then the 2nd set of switches would not receive and VTP updates:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-4.gif&quot; alt=&quot;vlans-vtp-4&quot; width=&quot;397&quot; height=&quot;277&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As you can see, the VTP updates will happlily arrive at the first catalyst switches but stop there as there are no trunk links between them and the 2950's below them. It is very important you keep this in mind when designing a network or making changes to the existing one.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;VTP Transparent Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;VTP Transparent mode&lt;/strong&gt; is something between a &lt;strong&gt;VTP Server&lt;/strong&gt; and a &lt;strong&gt;VTP Client&lt;/strong&gt; but does not participate in the &lt;strong&gt;VTP Domain&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In &lt;strong&gt;Transparent mode&lt;/strong&gt;, you are able to create, modify and delete VLANs on the local switch, without affecting any other switches regardless of the mode they might be in. Most importantly, if the transparently configured switch receives an advertisement containing VLAN information, it will ignore it but at the same time forward it out its trunk ports to any other switches it might be connected to.&lt;/p&gt;
&lt;p class=&quot;info&quot;&gt;Note: A &lt;strong&gt;Transparent VTP switch&lt;/strong&gt; will act as a &lt;strong&gt;VTP relay&lt;/strong&gt; (forward all VTP information it receives, out its trunk ports) only when &lt;strong&gt;VTP version 2&lt;/strong&gt; is used in the network. With &lt;strong&gt;VTP version 1&lt;/strong&gt;, the transparent switch will simply ignore and discard any VTP messages received from the rest of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Lastly, all switches configured to operate in &lt;strong&gt;Transparent mode&lt;/strong&gt; save their configuration in their NVRAM (just like all the previous two modes) but not to advertise any VLAN information of its own, even though it will happily forward any VTP information received from the rest of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This important functionality allows transparently configured switches to be placed anywhere within the network, without any implications to the rest of the network because as mentioned, they act as a repeater for any VLAN information received:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-5.gif&quot; alt=&quot;vlans-vtp-5&quot; width=&quot;453&quot; height=&quot;203&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Our 3550 Catalyst here is configured as a &lt;strong&gt;VTP Server&lt;/strong&gt; for the domain labelled &quot;Firewall&quot;. In addition, we have two switches configured in VTP Client mode, obtaining their VLAN information from the 3550 &lt;strong&gt;VTP Server&lt;/strong&gt;, but between these two VTP Clients, we have placed another switch configured to run in &lt;strong&gt;VTP Transparent mode&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Our Transparent switch has been configured with the domain called &quot;Lab&quot;, and as such, the switch will forward all incoming VTP updates belonging to the &quot;Firewall&quot; domain out its other trunk link, without processing the information. At the same time, it won't advertise its own VLAN information to its neighbouring switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Closing, the &lt;strong&gt;VTP Transparent mode&lt;/strong&gt; is not often used in live networks, but is well worth mentioning and learning about.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This page introduced a few new and very important concepts. The VTP Protocol is considered to be the heart of VLANs in large scale networks as it completely makes the administration point of view easy and transparent for every switch on your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We briefly spoke about the three different modes offered by the &lt;strong&gt;VTP protocol&lt;/strong&gt;: &lt;strong&gt;Server&lt;/strong&gt;, &lt;strong&gt;Client&lt;/strong&gt; and &lt;strong&gt;Transparent mode&lt;/strong&gt;. To assist in providing a quick summary, the table below shows the main characteristics for each mode:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 594px; height: 398px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 129px;&quot; bgcolor=&quot;#003300&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;VTP Mode&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; bgcolor=&quot;#000033&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Description&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th scope=&quot;row&quot; style=&quot;height: 153px;&quot;&gt;VTP Server&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;The default mode for all switches supporting VTP. You can create, modify, and delete VLANs and&lt;br /&gt;specify other configuration parameters (such as VTP version)&lt;br /&gt;for the entire VTP domain.&lt;/p&gt;
&lt;p&gt;VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk&lt;br /&gt;links. VLAN configurations are saved in NVRAM.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;&lt;th scope=&quot;row&quot;&gt;VTP Client&lt;/th&gt;
&lt;td&gt;Behaves like a VTP server, but you cannot create, change, or delete VLANs on a VTP client. VLAN configurations are saved in NVRAM.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;&lt;th scope=&quot;row&quot; style=&quot;height: 151px;&quot;&gt;VTP Transparent&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;Does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, they will forward VTP advertisements as they are received from other switches.&lt;/p&gt;
&lt;p&gt;You can create, modify, and delete VLANs on a switch in VTP transparent mode. VLAN configurations are saved in NVRAM, but they are not advertised to other switches.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;All switches by default are configured as &lt;strong&gt;VTP Servers&lt;/strong&gt; but without a domain. At this point we need to select the 'Core' switch (usually the most powerful) and configure it as a VTP Server, while reconfiguring all the rest to Client mode. Also, VTP Updates sent by the Server will only propagate through trunk links configured for ISL, IEEE 802.1q, 802.10 or LANE encapsulation.&lt;/p&gt;
&lt;p&gt;You should be aware that all VTP Messages are sent through what we call the &quot;Management VLAN&quot;. This specially created VLAN is usually the first one in the network - VLAN 1 - and by rule is never used by anyone else other than the switches themselves.&lt;/p&gt;
&lt;p&gt;The creation of a Management VLAN ensures all switches have their own network to communicate between each other without any disruptions.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The next article will analyse the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-analysis.html&quot; target=&quot;_blank&quot; title=&quot;VTP Protocol structure&quot;&gt;VTP Protocol structure&lt;/a&gt;, messages and updates. This will provide a deep understanding on how VTP works and what information it's messages contain. For those out there keen on configuring a switch for VTP, it's covered towards the end of the VLAN topic as shown on the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Introduction&quot;&gt;VLAN Introduction&lt;/a&gt; page.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vtp-introduction-intro.webp&quot; alt=&quot;Introduction to VTP and VTP Modes&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vtp-introduction-intro.webp&quot; alt=&quot;vtp introduction intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vtp introduction&quot; /&gt;The invention of VLANs was very much welcomed by all engineers and administrators, allowing them to extend, redesign and segment their existing network with minimal costs, while at the same time making it more secure, faster and reliable!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you're responsible for a network of up to 4-6 switches that include a few VLANs, then you'll surely agree that it's usually a low overhead to administer them and periodically make changes - most engineers can live with that:)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Ask now an engineer who's in charge of a medium to a large scale network and you will definately not receive the same answer, simply because these small changes can quickly become a nightmare and if you add the possibility of human error, then the result could be network outages and possibly downtime.&lt;/p&gt;
&lt;h2&gt;Welcome To Virtual Trunk Protocol (VTP)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VTP, a Cisco proprietary protocol, was designed by Cisco with the network engineer and administrator in mind, reducing the administration overhead and the possibility of error as described above in any switched network environment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a new VLAN is created and configured on a switch without the VTP protocol enabled, this must be manually replicated to all switches on the network so they are all aware of the newly created VLAN. This means that the administrator must configure each switch separately, a task that requires a lot of time and adds a considerable amount of overhead depending on the size of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The configuration of a VLAN includes the VLAN number, name and a few more parameters which will be analysed further on. This information is then stored on each switch's NVRAM and any VLAN changes made to any switch must again be replicated manually on all switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the idea of manually updating all switches within your network doesn't scare you because your network is small, then imagine updating more than 15-20 switches a few times per week, so your network can respond to your organisation's needs....have we got you thinking now? :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the VTP protocol configured and operating, you can forget about running around making sure you have updated all switches as you only need to make the changes on the nominated VTP server switch(es) on your network. This will also ensure these changes are magically propagated to all other switches regardless of where they are.&lt;/p&gt;
&lt;h2&gt;Introducing The VTP Modes&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VTP protocol&lt;/strong&gt; is a fairly complex protocol, but easy to understand and implement once you get to know it. Currently, 3 different versions of the protocol exist, that is, version 1, 2 (adds support for Token Ring networks) and 3, with the first version being used in most networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite the variety of versions, it also operates in 3 different modes: Server, client and transparent mode, giving us maximum flexibility on how changes in the network effect the rest of our switches. To help keep things simple and in order to avoid confusion, we will work with the first version of the &lt;strong&gt;VTP protocol - VTP v1&lt;/strong&gt;, covering more than 90% of networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below you'll find the 3 modes the VTP protocol can operate on any switch throughout the network:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;VTP Server mode&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Client mode&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;VTP Transparent mode&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each mode has been designed to cover specific network setups and needs, as we are about to see, but for now, we need to understand the purpose of each mode and the following network diagram will help us do exactly that.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-1.gif&quot; alt=&quot;vlans-vtp-1&quot; width=&quot;552&quot; height=&quot;406&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A typical setup involves at least one switch configured as a &lt;strong&gt;VTP Server&lt;/strong&gt;, and multiple switches configured as &lt;strong&gt;VTP Clients&lt;/strong&gt;. The logic behind this setup is that all information regarding VLANs is stored only on the &lt;strong&gt;VTP Server&lt;/strong&gt; switch from which all clients are updated. Any change in the &lt;strong&gt;VLAN database&lt;/strong&gt; will trigger an update from the &lt;strong&gt;VTP Server&lt;/strong&gt; towards all &lt;strong&gt;VTP clients&lt;/strong&gt; so they can update their database.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, be informed that these &lt;strong&gt;VTP updates&lt;/strong&gt; will &lt;strong&gt;only traverse Trunk links&lt;/strong&gt;. This means that you must ensure that all switches connect to the network backbone via &lt;strong&gt;Trunk links&lt;/strong&gt;, otherwise &lt;strong&gt;no VTP updates&lt;/strong&gt; will reach the rest of the switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's now take a closer look at what each &lt;strong&gt;VTP mode&lt;/strong&gt; does and where it can be used.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;VTP Server Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;By default all switches are configured as &lt;strong&gt;VTP Servers&lt;/strong&gt; when first powered on. All VLAN information such as VLAN number and VLAN name is &lt;strong&gt;stored locally&lt;/strong&gt;, on a separate &lt;strong&gt;NVRAM&lt;/strong&gt; memory which is where the device's &lt;strong&gt;startup-config&lt;/strong&gt; is stored. This happens only when the switch is in &lt;strong&gt;VTP Server mode&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For small networks with a limited number of switches and VLANs, storing all VLAN information on every switch is usually not a problem, but as the network expands and VLANs increase in number, it becomes a problem and a decision must be made to select a few powerful switches as the VTP Servers while configuring all other switches to VTP Client mode.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-2.gif&quot; alt=&quot;vlans-vtp-2&quot; width=&quot;552&quot; height=&quot;379&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram above shows a Cisco Catalyst 3550 selected to take the role of the network's VTP Server since it is the most powerful switch. All other Catalyst switches have been configured as VTP Clients, obtaining all VLAN information and updates from the 3550 VTP Server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The method and frequency by which these updates occur is covered in much detail on the pages that follow, so we won't get into any more detail at this point. However, for those who noticed, there is a new concept introduced in the above diagram that we haven't spoken about: The VTP Domain.&lt;/p&gt;
&lt;h2&gt;The VTP Domain - VLAN Management Domain&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VTP Domain&lt;/strong&gt;, also known as the &lt;strong&gt;VLAN Management Domain&lt;/strong&gt;, is a &lt;strong&gt;VTP parameter&lt;/strong&gt; configured on every switch connected to the network and used to define the switches that will participate in any changes or updates made in the specified VTP domain.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Naturally, the core switch (VTP Server) and all other switches participate in the same domain, e.g firewall, so when the VTP Server advertises new VLAN information for the VTP firewall domain, only clients (switches) configured with the same VTP Domain parameter will accept and process these changes, the rest will simply ignore them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, some people tend to relate the VTP Domain with the Internet Domain name space, however, this is completely incorrect. Even though the acronym 'DNS' contains the word 'Domain', it is not related in any way with the VTP Domain. Here (in VTP land), the word 'Domain' is simply used to describe a logical area in which certain hosts (switches) belong to or participate in, and are affected by any changes made within it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We should also note that all Cisco switches default to &lt;strong&gt;VTP Server mode&lt;/strong&gt; but will not transmit any VLAN information to the network until a &lt;strong&gt;VTP Domain&lt;/strong&gt; is set on the switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point we are only referencing the &lt;strong&gt;VTP Domain concept&lt;/strong&gt; as this is also analyzed in greater depth further on, so let's continue with the VTP modes!&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;VTP Client Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In Client Mode, a switch will accept and store in its RAM all VLAN information received from the VTP Server, however, this information is also saved in NVRAM, so if the switch is powered off, it won't loose its VLAN information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The VTP Client behaves like a VTP Server, but you are unable to create, modify or delete VLAN's on it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In most networks, the clients connect directly to the VTP Server as shown in our previous diagram. If, for any reason, two clients are cascaded together, then the information will propagate downwards via the available Trunk links, ensuring it reaches all switches:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-3.gif&quot; alt=&quot;vlans-vtp-3&quot; width=&quot;397&quot; height=&quot;277&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram shows a 3550 Catalyst switch configured as a VTP Server and 4 Catalyst 2950 switches configured as VTP Clients and cascaded below our 3550. When the VTP Server sends a VTP update, this will travel through all trunk links (ISL, 802.1q, 802.10 and ATM LANE), as shown in the diagram.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The advertised information will firstly reach the two Catalyst 2950 switches directly connected to the 3550 and will then travel to the cascaded switches below and through the trunk links. If the link between the cascaded 2950's was not a trunk link but an access link, then the 2nd set of switches would not receive and VTP updates:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-4.gif&quot; alt=&quot;vlans-vtp-4&quot; width=&quot;397&quot; height=&quot;277&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As you can see, the VTP updates will happlily arrive at the first catalyst switches but stop there as there are no trunk links between them and the 2950's below them. It is very important you keep this in mind when designing a network or making changes to the existing one.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;VTP Transparent Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;VTP Transparent mode&lt;/strong&gt; is something between a &lt;strong&gt;VTP Server&lt;/strong&gt; and a &lt;strong&gt;VTP Client&lt;/strong&gt; but does not participate in the &lt;strong&gt;VTP Domain&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In &lt;strong&gt;Transparent mode&lt;/strong&gt;, you are able to create, modify and delete VLANs on the local switch, without affecting any other switches regardless of the mode they might be in. Most importantly, if the transparently configured switch receives an advertisement containing VLAN information, it will ignore it but at the same time forward it out its trunk ports to any other switches it might be connected to.&lt;/p&gt;
&lt;p class=&quot;info&quot;&gt;Note: A &lt;strong&gt;Transparent VTP switch&lt;/strong&gt; will act as a &lt;strong&gt;VTP relay&lt;/strong&gt; (forward all VTP information it receives, out its trunk ports) only when &lt;strong&gt;VTP version 2&lt;/strong&gt; is used in the network. With &lt;strong&gt;VTP version 1&lt;/strong&gt;, the transparent switch will simply ignore and discard any VTP messages received from the rest of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Lastly, all switches configured to operate in &lt;strong&gt;Transparent mode&lt;/strong&gt; save their configuration in their NVRAM (just like all the previous two modes) but not to advertise any VLAN information of its own, even though it will happily forward any VTP information received from the rest of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This important functionality allows transparently configured switches to be placed anywhere within the network, without any implications to the rest of the network because as mentioned, they act as a repeater for any VLAN information received:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-vtp-5.gif&quot; alt=&quot;vlans-vtp-5&quot; width=&quot;453&quot; height=&quot;203&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Our 3550 Catalyst here is configured as a &lt;strong&gt;VTP Server&lt;/strong&gt; for the domain labelled &quot;Firewall&quot;. In addition, we have two switches configured in VTP Client mode, obtaining their VLAN information from the 3550 &lt;strong&gt;VTP Server&lt;/strong&gt;, but between these two VTP Clients, we have placed another switch configured to run in &lt;strong&gt;VTP Transparent mode&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Our Transparent switch has been configured with the domain called &quot;Lab&quot;, and as such, the switch will forward all incoming VTP updates belonging to the &quot;Firewall&quot; domain out its other trunk link, without processing the information. At the same time, it won't advertise its own VLAN information to its neighbouring switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Closing, the &lt;strong&gt;VTP Transparent mode&lt;/strong&gt; is not often used in live networks, but is well worth mentioning and learning about.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This page introduced a few new and very important concepts. The VTP Protocol is considered to be the heart of VLANs in large scale networks as it completely makes the administration point of view easy and transparent for every switch on your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We briefly spoke about the three different modes offered by the &lt;strong&gt;VTP protocol&lt;/strong&gt;: &lt;strong&gt;Server&lt;/strong&gt;, &lt;strong&gt;Client&lt;/strong&gt; and &lt;strong&gt;Transparent mode&lt;/strong&gt;. To assist in providing a quick summary, the table below shows the main characteristics for each mode:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 594px; height: 398px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 129px;&quot; bgcolor=&quot;#003300&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;VTP Mode&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; bgcolor=&quot;#000033&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Description&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th scope=&quot;row&quot; style=&quot;height: 153px;&quot;&gt;VTP Server&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;The default mode for all switches supporting VTP. You can create, modify, and delete VLANs and&lt;br /&gt;specify other configuration parameters (such as VTP version)&lt;br /&gt;for the entire VTP domain.&lt;/p&gt;
&lt;p&gt;VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk&lt;br /&gt;links. VLAN configurations are saved in NVRAM.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;&lt;th scope=&quot;row&quot;&gt;VTP Client&lt;/th&gt;
&lt;td&gt;Behaves like a VTP server, but you cannot create, change, or delete VLANs on a VTP client. VLAN configurations are saved in NVRAM.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;&lt;th scope=&quot;row&quot; style=&quot;height: 151px;&quot;&gt;VTP Transparent&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;Does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, they will forward VTP advertisements as they are received from other switches.&lt;/p&gt;
&lt;p&gt;You can create, modify, and delete VLANs on a switch in VTP transparent mode. VLAN configurations are saved in NVRAM, but they are not advertised to other switches.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;All switches by default are configured as &lt;strong&gt;VTP Servers&lt;/strong&gt; but without a domain. At this point we need to select the 'Core' switch (usually the most powerful) and configure it as a VTP Server, while reconfiguring all the rest to Client mode. Also, VTP Updates sent by the Server will only propagate through trunk links configured for ISL, IEEE 802.1q, 802.10 or LANE encapsulation.&lt;/p&gt;
&lt;p&gt;You should be aware that all VTP Messages are sent through what we call the &quot;Management VLAN&quot;. This specially created VLAN is usually the first one in the network - VLAN 1 - and by rule is never used by anyone else other than the switches themselves.&lt;/p&gt;
&lt;p&gt;The creation of a Management VLAN ensures all switches have their own network to communicate between each other without any disruptions.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The next article will analyse the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-analysis.html&quot; target=&quot;_blank&quot; title=&quot;VTP Protocol structure&quot;&gt;VTP Protocol structure&lt;/a&gt;, messages and updates. This will provide a deep understanding on how VTP works and what information it's messages contain. For those out there keen on configuring a switch for VTP, it's covered towards the end of the VLAN topic as shown on the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Introduction&quot;&gt;VLAN Introduction&lt;/a&gt; page.&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>InterVLAN Routing - Routing between VLAN Networks</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html"/>
		<published>2011-05-30T05:44:11+10:00</published>
		<updated>2011-05-30T05:44:11+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/intervlan-routing-intro.webp&quot; alt=&quot;InterVLAN Routing&quot;&gt;&lt;/p&gt;&lt;div&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/intervlan-routing-intro.webp&quot; alt=&quot;intervlan routing intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;InterVLAN Routing&quot; /&gt;This article deals with the popular topic of InterVLAN routing, which is used to allow routing &amp;amp; communication between VLAN networks. Our article analyses InterVLAN routing and provides 4 different methods of InterVLAN routing to help understand the concept&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;VLAN Configuration&lt;/strong&gt; and &lt;strong&gt;InterVLAN routing&lt;/strong&gt; for &lt;strong&gt;Cisco Enterprise Layer 3 switches&lt;/strong&gt;&amp;nbsp; (e.g 3560, 3750, 3800, 4500, 6500 and 9400 series switches) is covered extensively in our article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;The Need For Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each network has it's own needs, though whether it's a large or small network, internal routing, in most cases, is essential - if not critical. The ability to segment your network by creating VLANs, thus reducing network broadcasts and increasing your security, is a tactic used by most engineers. Popular setups include a separate broadcast domain for critical services such as File Servers, Print servers, Domain Controllers e.t.c, serving your users non-stop.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The issue here is how can users from one VLAN (broadcast domain), use services offered by another VLAN?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Thankfully there's an answer to every problem and in this case, its &lt;strong&gt;VLAN routing&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-1.gif&quot; alt=&quot;vlans-routing-1&quot; width=&quot;363&quot; height=&quot;243&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above diagram is a very simple but effective example to help you get the idea. Two VLANs consisting of two servers and workstations of which one workstation has been placed along with the servers in &lt;strong&gt;VLAN 1&lt;/strong&gt;, while the second workstation is placed in &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this scenario, both workstations require access to the File and Print servers, making it a very simple task for the workstation residing in &lt;strong&gt;VLAN 1&lt;/strong&gt;, but obviously not for our workstation in &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you might have already guessed, we need to somehow route packets between the two VLANs and the good news is that there is more than one way to achieve this and that's what we'll be covering on this page.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solutions&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While the two Cisco Catalyst switches are connected via a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Cisco switching - Trunk Link configuration&quot;&gt;trunk link&lt;/a&gt;, they are unable to route packets from one VLAN to another. If we wanted the switch to support routing, we would require it to be a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;How to configure Layer-3 switching on Cisco Catalyst switch&quot;&gt;layer 3 switch&lt;/a&gt; with routing capabilities, a service offered by most enterprise Cisco Catalyst switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are four ways to enable the communcation between VLANs (InterVLAN Routing being the most popular) using a single switch or router and this article will cover them all, providing an in-depth view on VLAN routing methods.&lt;/p&gt;
&lt;p class=&quot;info&quot; style=&quot;text-align: justify;&quot;&gt;Note: The term &lt;strong&gt;InterVLAN Routing&lt;/strong&gt; refers to a specific routing method which we will cover as a last scenario, however it is advised that you read through all given solutions to ensure you have a solid understanding on the VLAN routing topic.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.1: Using A Router With 2 Ethernet Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Decades ago, this was one of the preferred and fastest methods to route packets between different VLAN networks. The setup is quite simple and involves a Cisco router with two Ethernet interfaces as shown in the diagram, connecting to both VLANs with an appropriate IP Address assigned to each interface. In this setup, enabling &lt;strong&gt;IP Routing&lt;/strong&gt; on the router is a prerequisite, and we also have the option of applying access lists (ACLs) to control access between our VLAN networks:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-2.gif&quot; alt=&quot;vlans-routing-2&quot; width=&quot;400&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With this setup, each host (servers and workstations) will have need to have the local router interface IP configured as a default gateway to access the other VLAN network. This VLAN routing solution is considered expensive and doesn't scale well for today's complex and large network environments.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the case where there are more than two VLANs, additional Ethernet interfaces will be required, so basically, the idea here is that you need one Ethernet interface for each VLAN network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To finish this scenario, as the network gets bigger and more VLANs are created, it will very quickly get messy and expensive, so this solution will prove inadequate to cover our future growth.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.2: Using A Router With One Ethernet (Trunk) Interface&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This solution is certainly fancier but requires, as you would have already guessed, a router that supports trunk links. With this kind of setup, the trunk link is created, using of course the same type of encapsulation the switches use (&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;ISL&quot;&gt;ISL&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;802.1q Analysis&quot;&gt;802.1q&lt;/a&gt;), and enabling IP routing on the router side. This method of InterVLAN routing is also known as &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-8021q-router-stick.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Router on a Stick Configuration&quot;&gt;Router on a Stick&lt;/a&gt;.&amp;nbsp; You can read more on its configuration under our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Router Knowledgebase&quot;&gt;Cisco Router Knowledgebase&lt;/a&gt;&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-3.gif&quot; alt=&quot;vlans-routing-3&quot; width=&quot;400&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The downside here is that not many engineers will sacrifice a router just for routing between VLANs when there are many cheaper alternatives, as you will soon find out. Nevertheless, despite the high cost and dedicated hardware, it's still a valid and workable solution and depending on your needs and available equipment, it might be just what you're looking for!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Closing this scenario, the router will need to be configured with two virtual interfaces, one for each VLAN, with the appropriate IP Address assigned to each one so routing can be performed.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.3: Using A Server With Two Network Cards&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Back in the 90's the need to route between VLAN networks was often resolved by using Windows or Linux servers to perform the routing between VLAN networks.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-4.gif&quot; alt=&quot;vlans-routing-4&quot; width=&quot;397&quot; height=&quot;221&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In order for the server to route between the two network, it requires two network cards - one for each VLAN with the appropriate IP Addresses assigned, therefore one network card will be configured with IP Addresses 192.168.1.1 and the other with IP address 192.168.2.1. Once this is complete, all that's required is to &lt;strong&gt;enable IP routing&lt;/strong&gt; on the server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Lastly, each workstation must use the server as either a gateway, or a static route entry needs be created to be able to reach the other network.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.4: InterVLAN Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;And at last, InterVLAN routing! This is without a doubt the best VLAN routing solution out of all of the above. InterVLAN routing makes use of the latest in technology switches ensuring a super fast, reliable, and acceptable cost routing solution.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-5.gif&quot; alt=&quot;vlans-routing-5&quot; width=&quot;400&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The Cisco Catalyst series switches used here are layer 3 switches with built-in &lt;strong&gt;IP routing capabilities&lt;/strong&gt;, making them the preferred choice at a reasonable cost. Of course, the proposed solution shown here is only a small part of a large scale network where switches such as the Catalyst 3550 are usually placed as core switches, connecting all branch switches together (2924's in this case) via superfast fiber Gigabit or Fast Ethernet links, ensuring a fast and reliable network backbone.&lt;/p&gt;
&lt;p class=&quot;info&quot; style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;VLAN Configuration&lt;/strong&gt; and &lt;strong&gt;InterVLAN routing&lt;/strong&gt; for &lt;strong&gt;Cisco Enterprise Layer 3 switches&lt;/strong&gt;&amp;nbsp; (e.g 3560, 3750, 3800, 4500, 6500 and 9400 series switches) is covered extensively in our article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We should also note that &lt;strong&gt;InterVLAN routing&lt;/strong&gt; on the Catalyst enterprise switches has certain software requirements regarding the IOS image loaded on the switch as outlined on the table below:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 438px; height: 132px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Image Type &amp;amp; Version&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;
&lt;p&gt;&lt;span style=&quot;color: #000000;&quot;&gt;&lt;strong&gt;InterVLAN Routing Capability&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Enhanced Multilayer Image (EMI) - All Versions&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;YES&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Standard Multilayer Image (SMI) - prior to 12.1(11)EA1&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;NO&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Standard Multilayer Image (SMI) - 12.1(11)EA1 and later&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;YES&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Issuing the &lt;strong&gt;Show version&lt;/strong&gt; command to reveal the IOS version or license, allowing us to determine if IP routing (InterVLAN Routing) is supported.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In returning to our example, our 3550 Catalyst will be configured with two virtual (SVI) interfaces, one for each VLAN, and of course the appropriate IP Address assigned to them to ensure there is a logical interface connected to both networks. Lastly, as you might have guessed, we need to issue the 'IP Routing' command to enable the InterVLAN Routing service!&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-6.gif&quot; alt=&quot;vlans-routing-6&quot; width=&quot;406&quot; height=&quot;256&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram above was designed to help you 'visualise' how switches and their interfaces are configured to specific VLAN, making the InterVLAN routing service possible. The switch above has been configured with two VLANs, VLAN 1 and 2. The Ethernet interfaces are then assigned to each VLAN, allowing them to communicate directly with all other interfaces assigned to the same VLAN and the other VLAN, when the internal routing process is present and enabled.&lt;/p&gt;
&lt;h2&gt;Access Lists &amp;amp; InterVLAN Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Another common addition to the InterVLAN routing service is the application of Access Lists (packet filtering) on the routing switch,to restrict access to services or hosts as required.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In modern implementations, central file servers and services are usually placed in their own isolated VLAN, securing them from possible network attacks while controlling access to them. When you take into consideration that most trojans and viruses perform an initial scan of the network before attacking, an administrator can smartly disable ICMP echoes and other protocols used to detect a live host, avoiding possible detection by an attacker host located on a different VLAN.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;InterVLAN is a terrific service and one that you simply can't live without in a large network. The topic is a fairly easy one once you get the idea, and this is our aim here, to help you get that idea, and extend it further by giving you other alternative methods.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The key element to the InterVLAN routing service is that you must have at least one VLAN interface configured with an IP Address on the InterVLAN capable switch, which will also dictate the IP network for that VLAN. All hosts participating in that VLAN must also use the same IP addressing scheme to ensure communication between them. When the above requirements are met, it's then as simple as enabling the IP Routing service on the switch and you have the InterVLAN service activated.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/intervlan-routing-intro.webp&quot; alt=&quot;InterVLAN Routing&quot;&gt;&lt;/p&gt;&lt;div&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/intervlan-routing-intro.webp&quot; alt=&quot;intervlan routing intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;InterVLAN Routing&quot; /&gt;This article deals with the popular topic of InterVLAN routing, which is used to allow routing &amp;amp; communication between VLAN networks. Our article analyses InterVLAN routing and provides 4 different methods of InterVLAN routing to help understand the concept&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;VLAN Configuration&lt;/strong&gt; and &lt;strong&gt;InterVLAN routing&lt;/strong&gt; for &lt;strong&gt;Cisco Enterprise Layer 3 switches&lt;/strong&gt;&amp;nbsp; (e.g 3560, 3750, 3800, 4500, 6500 and 9400 series switches) is covered extensively in our article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;The Need For Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each network has it's own needs, though whether it's a large or small network, internal routing, in most cases, is essential - if not critical. The ability to segment your network by creating VLANs, thus reducing network broadcasts and increasing your security, is a tactic used by most engineers. Popular setups include a separate broadcast domain for critical services such as File Servers, Print servers, Domain Controllers e.t.c, serving your users non-stop.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The issue here is how can users from one VLAN (broadcast domain), use services offered by another VLAN?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Thankfully there's an answer to every problem and in this case, its &lt;strong&gt;VLAN routing&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-1.gif&quot; alt=&quot;vlans-routing-1&quot; width=&quot;363&quot; height=&quot;243&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above diagram is a very simple but effective example to help you get the idea. Two VLANs consisting of two servers and workstations of which one workstation has been placed along with the servers in &lt;strong&gt;VLAN 1&lt;/strong&gt;, while the second workstation is placed in &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this scenario, both workstations require access to the File and Print servers, making it a very simple task for the workstation residing in &lt;strong&gt;VLAN 1&lt;/strong&gt;, but obviously not for our workstation in &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you might have already guessed, we need to somehow route packets between the two VLANs and the good news is that there is more than one way to achieve this and that's what we'll be covering on this page.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solutions&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While the two Cisco Catalyst switches are connected via a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Cisco switching - Trunk Link configuration&quot;&gt;trunk link&lt;/a&gt;, they are unable to route packets from one VLAN to another. If we wanted the switch to support routing, we would require it to be a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;How to configure Layer-3 switching on Cisco Catalyst switch&quot;&gt;layer 3 switch&lt;/a&gt; with routing capabilities, a service offered by most enterprise Cisco Catalyst switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are four ways to enable the communcation between VLANs (InterVLAN Routing being the most popular) using a single switch or router and this article will cover them all, providing an in-depth view on VLAN routing methods.&lt;/p&gt;
&lt;p class=&quot;info&quot; style=&quot;text-align: justify;&quot;&gt;Note: The term &lt;strong&gt;InterVLAN Routing&lt;/strong&gt; refers to a specific routing method which we will cover as a last scenario, however it is advised that you read through all given solutions to ensure you have a solid understanding on the VLAN routing topic.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.1: Using A Router With 2 Ethernet Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Decades ago, this was one of the preferred and fastest methods to route packets between different VLAN networks. The setup is quite simple and involves a Cisco router with two Ethernet interfaces as shown in the diagram, connecting to both VLANs with an appropriate IP Address assigned to each interface. In this setup, enabling &lt;strong&gt;IP Routing&lt;/strong&gt; on the router is a prerequisite, and we also have the option of applying access lists (ACLs) to control access between our VLAN networks:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-2.gif&quot; alt=&quot;vlans-routing-2&quot; width=&quot;400&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With this setup, each host (servers and workstations) will have need to have the local router interface IP configured as a default gateway to access the other VLAN network. This VLAN routing solution is considered expensive and doesn't scale well for today's complex and large network environments.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the case where there are more than two VLANs, additional Ethernet interfaces will be required, so basically, the idea here is that you need one Ethernet interface for each VLAN network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To finish this scenario, as the network gets bigger and more VLANs are created, it will very quickly get messy and expensive, so this solution will prove inadequate to cover our future growth.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.2: Using A Router With One Ethernet (Trunk) Interface&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This solution is certainly fancier but requires, as you would have already guessed, a router that supports trunk links. With this kind of setup, the trunk link is created, using of course the same type of encapsulation the switches use (&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;ISL&quot;&gt;ISL&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;802.1q Analysis&quot;&gt;802.1q&lt;/a&gt;), and enabling IP routing on the router side. This method of InterVLAN routing is also known as &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-8021q-router-stick.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Router on a Stick Configuration&quot;&gt;Router on a Stick&lt;/a&gt;.&amp;nbsp; You can read more on its configuration under our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Router Knowledgebase&quot;&gt;Cisco Router Knowledgebase&lt;/a&gt;&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-3.gif&quot; alt=&quot;vlans-routing-3&quot; width=&quot;400&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The downside here is that not many engineers will sacrifice a router just for routing between VLANs when there are many cheaper alternatives, as you will soon find out. Nevertheless, despite the high cost and dedicated hardware, it's still a valid and workable solution and depending on your needs and available equipment, it might be just what you're looking for!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Closing this scenario, the router will need to be configured with two virtual interfaces, one for each VLAN, with the appropriate IP Address assigned to each one so routing can be performed.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.3: Using A Server With Two Network Cards&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Back in the 90's the need to route between VLAN networks was often resolved by using Windows or Linux servers to perform the routing between VLAN networks.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-4.gif&quot; alt=&quot;vlans-routing-4&quot; width=&quot;397&quot; height=&quot;221&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In order for the server to route between the two network, it requires two network cards - one for each VLAN with the appropriate IP Addresses assigned, therefore one network card will be configured with IP Addresses 192.168.1.1 and the other with IP address 192.168.2.1. Once this is complete, all that's required is to &lt;strong&gt;enable IP routing&lt;/strong&gt; on the server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Lastly, each workstation must use the server as either a gateway, or a static route entry needs be created to be able to reach the other network.&lt;/p&gt;
&lt;h2&gt;VLAN Routing Solution No.4: InterVLAN Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;And at last, InterVLAN routing! This is without a doubt the best VLAN routing solution out of all of the above. InterVLAN routing makes use of the latest in technology switches ensuring a super fast, reliable, and acceptable cost routing solution.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-5.gif&quot; alt=&quot;vlans-routing-5&quot; width=&quot;400&quot; height=&quot;291&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The Cisco Catalyst series switches used here are layer 3 switches with built-in &lt;strong&gt;IP routing capabilities&lt;/strong&gt;, making them the preferred choice at a reasonable cost. Of course, the proposed solution shown here is only a small part of a large scale network where switches such as the Catalyst 3550 are usually placed as core switches, connecting all branch switches together (2924's in this case) via superfast fiber Gigabit or Fast Ethernet links, ensuring a fast and reliable network backbone.&lt;/p&gt;
&lt;p class=&quot;info&quot; style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;VLAN Configuration&lt;/strong&gt; and &lt;strong&gt;InterVLAN routing&lt;/strong&gt; for &lt;strong&gt;Cisco Enterprise Layer 3 switches&lt;/strong&gt;&amp;nbsp; (e.g 3560, 3750, 3800, 4500, 6500 and 9400 series switches) is covered extensively in our article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We should also note that &lt;strong&gt;InterVLAN routing&lt;/strong&gt; on the Catalyst enterprise switches has certain software requirements regarding the IOS image loaded on the switch as outlined on the table below:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 438px; height: 132px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Image Type &amp;amp; Version&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;
&lt;p&gt;&lt;span style=&quot;color: #000000;&quot;&gt;&lt;strong&gt;InterVLAN Routing Capability&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Enhanced Multilayer Image (EMI) - All Versions&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;YES&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Standard Multilayer Image (SMI) - prior to 12.1(11)EA1&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;NO&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Standard Multilayer Image (SMI) - 12.1(11)EA1 and later&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #d8bfd8; text-align: center;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;YES&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Issuing the &lt;strong&gt;Show version&lt;/strong&gt; command to reveal the IOS version or license, allowing us to determine if IP routing (InterVLAN Routing) is supported.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In returning to our example, our 3550 Catalyst will be configured with two virtual (SVI) interfaces, one for each VLAN, and of course the appropriate IP Address assigned to them to ensure there is a logical interface connected to both networks. Lastly, as you might have guessed, we need to issue the 'IP Routing' command to enable the InterVLAN Routing service!&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-routing-6.gif&quot; alt=&quot;vlans-routing-6&quot; width=&quot;406&quot; height=&quot;256&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram above was designed to help you 'visualise' how switches and their interfaces are configured to specific VLAN, making the InterVLAN routing service possible. The switch above has been configured with two VLANs, VLAN 1 and 2. The Ethernet interfaces are then assigned to each VLAN, allowing them to communicate directly with all other interfaces assigned to the same VLAN and the other VLAN, when the internal routing process is present and enabled.&lt;/p&gt;
&lt;h2&gt;Access Lists &amp;amp; InterVLAN Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Another common addition to the InterVLAN routing service is the application of Access Lists (packet filtering) on the routing switch,to restrict access to services or hosts as required.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In modern implementations, central file servers and services are usually placed in their own isolated VLAN, securing them from possible network attacks while controlling access to them. When you take into consideration that most trojans and viruses perform an initial scan of the network before attacking, an administrator can smartly disable ICMP echoes and other protocols used to detect a live host, avoiding possible detection by an attacker host located on a different VLAN.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;InterVLAN is a terrific service and one that you simply can't live without in a large network. The topic is a fairly easy one once you get the idea, and this is our aim here, to help you get that idea, and extend it further by giving you other alternative methods.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The key element to the InterVLAN routing service is that you must have at least one VLAN interface configured with an IP Address on the InterVLAN capable switch, which will also dictate the IP network for that VLAN. All hosts participating in that VLAN must also use the same IP addressing scheme to ensure communication between them. When the above requirements are met, it's then as simple as enabling the IP Routing service on the switch and you have the InterVLAN service activated.&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VLANs - IEEE 802.1q Trunk Link Protocol Analysis</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html"/>
		<published>2011-05-30T05:35:52+10:00</published>
		<updated>2011-05-30T05:35:52+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-8021q-analysis-intro.webp&quot; alt=&quot;IEEE 802.1q header analysis&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-8021q-analysis-intro.webp&quot; alt=&quot;vlan 802.1q analysis intro&quot; style=&quot;margin-top: 7px; margin-bottom: 7px; float: left;&quot; title=&quot;vlan 802.1q analysis intro&quot; /&gt;While the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Tagging&quot;&gt;VLAN Tagging&lt;/a&gt; article briefly covered the &lt;strong&gt;IEEE 802.1q protocol&lt;/strong&gt; this article will continue building upon it by further analyzing the &lt;strong&gt;IEEE 802.1q Trunk Link Protocol&lt;/strong&gt;. The &lt;strong&gt;IEEE 802.1q tagging&lt;/strong&gt; method is the most popular as it allows the seemless integration of VLAN capable devices from all vendors supporting the protocol.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;IEEE 802.1q Analysis&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;IEEE 802.1q tagging mechanism&lt;/strong&gt; seems quite simple and efficient thanks to its &lt;strong&gt;4-byte overhead&lt;/strong&gt; squeezed between the &lt;strong&gt;Source Address&lt;/strong&gt; and &lt;strong&gt;Type/Length field&lt;/strong&gt; of our &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II frame&quot;&gt;&lt;strong&gt;Ethernet II frame&lt;/strong&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-8021q-analysis-1.gif&quot; alt=&quot;vlans-8021q-analysis-1&quot; width=&quot;600&quot; height=&quot;211&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The process of inserting the &lt;strong&gt;802.1q tag&lt;/strong&gt; into an &lt;strong&gt;Ethernet II frame&lt;/strong&gt; results in the original &lt;strong&gt;Frame Check Sequence (FCS)&lt;/strong&gt; field to become invalid since we are altering the frame, hence it is essential that a &lt;strong&gt;new FCS&lt;/strong&gt; is recalculated, based on the new frame now containing the &lt;strong&gt;IEEE 802.1q field&lt;/strong&gt;. This process is &lt;strong&gt;automatically performed&lt;/strong&gt; by the switch, right before it sends the frame through a &lt;strong&gt;trunk link&lt;/strong&gt;. Our focus here will be the pink 3D block, labeled as the &lt;strong&gt;IEEE 802.1q header&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;The IEEE 802.1q Header&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As noted, the &lt;strong&gt;802.1q header&lt;/strong&gt; is &lt;strong&gt;only 4 bytes&lt;/strong&gt; or &lt;strong&gt;32 bits&lt;/strong&gt; in length while within this space there is all the necessary information required to successfully identify the frame's VLAN and ensure it arrived to the correct destination. The diagram below analyses all fields contained in a &lt;strong&gt;802.1q header&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-8021q-analysis-2.gif&quot; alt=&quot;vlans-8021q-analysis-2&quot; width=&quot;500&quot; height=&quot;150&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The structure is quite simple as there are &lt;strong&gt;only 4 fields&lt;/strong&gt; when compared with the &lt;strong&gt;11 fields &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;InterSwitch Link (ISL)&quot;&gt;InterSwitch Link (ISL)&lt;/a&gt;&lt;/strong&gt; has. We will continue by analysing each of these fields in order to discover what the protocol is all about.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;TPID - Tag Protocol IDentifier&lt;/h2&gt;
&lt;p align=&quot;left&quot;&gt;The &lt;strong&gt;TPID field&lt;/strong&gt; is &lt;strong&gt;16 bit long&lt;/strong&gt; with a value of &lt;strong&gt;0x8100&lt;/strong&gt;. It is used to identify the frame as an &lt;strong&gt;IEEE 802.1q tagged frame&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;info&quot; style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Note: The next three fields, &lt;strong&gt;Priority&lt;/strong&gt;, &lt;strong&gt;CFI&lt;/strong&gt; and &lt;strong&gt;VLAN ID&lt;/strong&gt; are also known as the &lt;strong&gt;TCI (Tag Control Information) &lt;/strong&gt;field and are often represented as &lt;strong&gt;one single field (TCI Field)&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;Priority&lt;/h2&gt;
&lt;p align=&quot;left&quot;&gt;The &lt;strong&gt;Priority field&lt;/strong&gt; is only&lt;strong&gt; 3 bits long&lt;/strong&gt; but used for prioritisation of the data this frame is carrying.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;Data Prioritisation&lt;/strong&gt; is a whole study in itself but we won't be analysing it here since it's well beyond the scope of our topic. However, for those interested, data prioritisation allows us to give special priority to &lt;strong&gt;time-latency sensitive services&lt;/strong&gt;, such as &lt;strong&gt;Voice Over IP (VoIP)&lt;/strong&gt;, over normal data. This means that the specified bandwidth is allocated for these critical services to pass them through the link without any delay.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;IEEE 802.1p priority protocol&lt;/strong&gt; was developed to provide such services and is utilised by the &lt;strong&gt;IEEE 802.1q tagging protocol&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The&lt;strong&gt; Priority field&lt;/strong&gt; is approximately &lt;strong&gt;3 bits long&lt;/strong&gt;, allowing a total of &lt;strong&gt;2^3=8&lt;/strong&gt; different priorities for each frame, that is, &lt;strong&gt;level zero (0)&lt;/strong&gt; to &lt;strong&gt;seven (7)&lt;/strong&gt; inclusive.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-8021q-analysis-3.gif&quot; alt=&quot;vlans-8021q-analysis-3&quot; width=&quot;500&quot; height=&quot;150&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;CFI - Canonical Format Indicator&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;CFI field&lt;/strong&gt; is only &lt;strong&gt;1 bit long&lt;/strong&gt;. If set to &lt;strong&gt;1&lt;/strong&gt;, then it means the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC Address&quot;&gt;&lt;strong&gt;MAC Address&lt;/strong&gt;&lt;/a&gt; is in non-canonical format, otherwise &lt;strong&gt;0&lt;/strong&gt; means it is canonical format. For Ethernet switches, this field is always set to &lt;strong&gt;zero (0)&lt;/strong&gt;. The &lt;strong&gt;CFI field&lt;/strong&gt; is mainly used for compatibility reasons between &lt;strong&gt;Ethernet&lt;/strong&gt; and &lt;strong&gt;Token Ring&lt;/strong&gt; networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the case where a frame arrives to an Ethernet port and the &lt;strong&gt;CFI flag&lt;/strong&gt; is set to &lt;strong&gt;one (1)&lt;/strong&gt;, then that frame should not be forwarded as it was received to any &lt;strong&gt;untagged port&lt;/strong&gt; (&lt;strong&gt;Access Link port&lt;/strong&gt;).&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;VLAN ID - Virtual Local Area Network Identifier&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;VLAN ID field&lt;/strong&gt; is perhaps the most important field out of all because we are able to identify which VLAN the frame belongs to, allowing the receiving switch to decide which ports the frame is allowed to exit depending on the switch configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For those who recall our &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Tagging&quot;&gt;VLAN Tagging&lt;/a&gt; article, we mentioned that the &lt;strong&gt;IEEE 802.1q tagging&lt;/strong&gt; method supports up to &lt;strong&gt;4096 different VLANs&lt;/strong&gt;. This number derives from the &lt;strong&gt;12 bit VLAN ID field&lt;/strong&gt; we are analysing right now and here are the calculations to prove this: &lt;strong&gt;2^12=4096&lt;/strong&gt;, which translates from &lt;strong&gt;VLAN 0&lt;/strong&gt; to &lt;strong&gt;VLAN 4095 inclusive&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;That completes our analysis on the &lt;strong&gt;IEEE 802.1q protocol&lt;/strong&gt;. As a last note, you should remember that this protocol is the most wide spread tagging method used around the world that supports up to &lt;strong&gt;4096 VLANs&lt;/strong&gt;!&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-8021q-analysis-intro.webp&quot; alt=&quot;IEEE 802.1q header analysis&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-8021q-analysis-intro.webp&quot; alt=&quot;vlan 802.1q analysis intro&quot; style=&quot;margin-top: 7px; margin-bottom: 7px; float: left;&quot; title=&quot;vlan 802.1q analysis intro&quot; /&gt;While the &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Tagging&quot;&gt;VLAN Tagging&lt;/a&gt; article briefly covered the &lt;strong&gt;IEEE 802.1q protocol&lt;/strong&gt; this article will continue building upon it by further analyzing the &lt;strong&gt;IEEE 802.1q Trunk Link Protocol&lt;/strong&gt;. The &lt;strong&gt;IEEE 802.1q tagging&lt;/strong&gt; method is the most popular as it allows the seemless integration of VLAN capable devices from all vendors supporting the protocol.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;IEEE 802.1q Analysis&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;IEEE 802.1q tagging mechanism&lt;/strong&gt; seems quite simple and efficient thanks to its &lt;strong&gt;4-byte overhead&lt;/strong&gt; squeezed between the &lt;strong&gt;Source Address&lt;/strong&gt; and &lt;strong&gt;Type/Length field&lt;/strong&gt; of our &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II frame&quot;&gt;&lt;strong&gt;Ethernet II frame&lt;/strong&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-8021q-analysis-1.gif&quot; alt=&quot;vlans-8021q-analysis-1&quot; width=&quot;600&quot; height=&quot;211&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The process of inserting the &lt;strong&gt;802.1q tag&lt;/strong&gt; into an &lt;strong&gt;Ethernet II frame&lt;/strong&gt; results in the original &lt;strong&gt;Frame Check Sequence (FCS)&lt;/strong&gt; field to become invalid since we are altering the frame, hence it is essential that a &lt;strong&gt;new FCS&lt;/strong&gt; is recalculated, based on the new frame now containing the &lt;strong&gt;IEEE 802.1q field&lt;/strong&gt;. This process is &lt;strong&gt;automatically performed&lt;/strong&gt; by the switch, right before it sends the frame through a &lt;strong&gt;trunk link&lt;/strong&gt;. Our focus here will be the pink 3D block, labeled as the &lt;strong&gt;IEEE 802.1q header&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;The IEEE 802.1q Header&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As noted, the &lt;strong&gt;802.1q header&lt;/strong&gt; is &lt;strong&gt;only 4 bytes&lt;/strong&gt; or &lt;strong&gt;32 bits&lt;/strong&gt; in length while within this space there is all the necessary information required to successfully identify the frame's VLAN and ensure it arrived to the correct destination. The diagram below analyses all fields contained in a &lt;strong&gt;802.1q header&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-8021q-analysis-2.gif&quot; alt=&quot;vlans-8021q-analysis-2&quot; width=&quot;500&quot; height=&quot;150&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The structure is quite simple as there are &lt;strong&gt;only 4 fields&lt;/strong&gt; when compared with the &lt;strong&gt;11 fields &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html&quot; target=&quot;_blank&quot; title=&quot;InterSwitch Link (ISL)&quot;&gt;InterSwitch Link (ISL)&lt;/a&gt;&lt;/strong&gt; has. We will continue by analysing each of these fields in order to discover what the protocol is all about.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;TPID - Tag Protocol IDentifier&lt;/h2&gt;
&lt;p align=&quot;left&quot;&gt;The &lt;strong&gt;TPID field&lt;/strong&gt; is &lt;strong&gt;16 bit long&lt;/strong&gt; with a value of &lt;strong&gt;0x8100&lt;/strong&gt;. It is used to identify the frame as an &lt;strong&gt;IEEE 802.1q tagged frame&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;info&quot; style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Note: The next three fields, &lt;strong&gt;Priority&lt;/strong&gt;, &lt;strong&gt;CFI&lt;/strong&gt; and &lt;strong&gt;VLAN ID&lt;/strong&gt; are also known as the &lt;strong&gt;TCI (Tag Control Information) &lt;/strong&gt;field and are often represented as &lt;strong&gt;one single field (TCI Field)&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;Priority&lt;/h2&gt;
&lt;p align=&quot;left&quot;&gt;The &lt;strong&gt;Priority field&lt;/strong&gt; is only&lt;strong&gt; 3 bits long&lt;/strong&gt; but used for prioritisation of the data this frame is carrying.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;Data Prioritisation&lt;/strong&gt; is a whole study in itself but we won't be analysing it here since it's well beyond the scope of our topic. However, for those interested, data prioritisation allows us to give special priority to &lt;strong&gt;time-latency sensitive services&lt;/strong&gt;, such as &lt;strong&gt;Voice Over IP (VoIP)&lt;/strong&gt;, over normal data. This means that the specified bandwidth is allocated for these critical services to pass them through the link without any delay.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;IEEE 802.1p priority protocol&lt;/strong&gt; was developed to provide such services and is utilised by the &lt;strong&gt;IEEE 802.1q tagging protocol&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The&lt;strong&gt; Priority field&lt;/strong&gt; is approximately &lt;strong&gt;3 bits long&lt;/strong&gt;, allowing a total of &lt;strong&gt;2^3=8&lt;/strong&gt; different priorities for each frame, that is, &lt;strong&gt;level zero (0)&lt;/strong&gt; to &lt;strong&gt;seven (7)&lt;/strong&gt; inclusive.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-8021q-analysis-3.gif&quot; alt=&quot;vlans-8021q-analysis-3&quot; width=&quot;500&quot; height=&quot;150&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;CFI - Canonical Format Indicator&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;CFI field&lt;/strong&gt; is only &lt;strong&gt;1 bit long&lt;/strong&gt;. If set to &lt;strong&gt;1&lt;/strong&gt;, then it means the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC Address&quot;&gt;&lt;strong&gt;MAC Address&lt;/strong&gt;&lt;/a&gt; is in non-canonical format, otherwise &lt;strong&gt;0&lt;/strong&gt; means it is canonical format. For Ethernet switches, this field is always set to &lt;strong&gt;zero (0)&lt;/strong&gt;. The &lt;strong&gt;CFI field&lt;/strong&gt; is mainly used for compatibility reasons between &lt;strong&gt;Ethernet&lt;/strong&gt; and &lt;strong&gt;Token Ring&lt;/strong&gt; networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the case where a frame arrives to an Ethernet port and the &lt;strong&gt;CFI flag&lt;/strong&gt; is set to &lt;strong&gt;one (1)&lt;/strong&gt;, then that frame should not be forwarded as it was received to any &lt;strong&gt;untagged port&lt;/strong&gt; (&lt;strong&gt;Access Link port&lt;/strong&gt;).&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;VLAN ID - Virtual Local Area Network Identifier&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;VLAN ID field&lt;/strong&gt; is perhaps the most important field out of all because we are able to identify which VLAN the frame belongs to, allowing the receiving switch to decide which ports the frame is allowed to exit depending on the switch configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For those who recall our &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Tagging&quot;&gt;VLAN Tagging&lt;/a&gt; article, we mentioned that the &lt;strong&gt;IEEE 802.1q tagging&lt;/strong&gt; method supports up to &lt;strong&gt;4096 different VLANs&lt;/strong&gt;. This number derives from the &lt;strong&gt;12 bit VLAN ID field&lt;/strong&gt; we are analysing right now and here are the calculations to prove this: &lt;strong&gt;2^12=4096&lt;/strong&gt;, which translates from &lt;strong&gt;VLAN 0&lt;/strong&gt; to &lt;strong&gt;VLAN 4095 inclusive&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;left&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;That completes our analysis on the &lt;strong&gt;IEEE 802.1q protocol&lt;/strong&gt;. As a last note, you should remember that this protocol is the most wide spread tagging method used around the world that supports up to &lt;strong&gt;4096 VLANs&lt;/strong&gt;!&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VLAN InterSwitch Link (ISL) Protocol Analysis</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html"/>
		<published>2011-05-30T05:18:55+10:00</published>
		<updated>2011-05-30T05:18:55+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-isl-analysis.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-isl-analysis-intro.webp&quot; alt=&quot;Introduction to ISL Analysis&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-isl-analysis-intro.webp&quot; alt=&quot;vlan isl analysis intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vlan isl analysis intro&quot; /&gt;Deciding whether to use &lt;strong&gt;ISL&lt;/strong&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;IEEE 802.1q&quot;&gt;&lt;strong&gt;IEEE 802.1q&lt;/strong&gt;&lt;/a&gt; to power your trunk links can be quite confusing if you cannot identify the advantages and disadvantages of each protocol within your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article will cover the &lt;strong&gt;ISL protocol&lt;/strong&gt; in great detail, providing an insight to its secrets and capabilities which you probably were unaware of. In turn, this will also help you understand the existence of certain limitations the protocol has, but most importantly allow you to decide if ISL is the tagging process you require within your network.&lt;/p&gt;
&lt;h2&gt;InterSwitch Link (ISL)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;ISL&lt;/strong&gt; is &lt;strong&gt;Cisco's propriety tagging method&lt;/strong&gt; and supported only on Cisco's equipment through &lt;strong&gt;Fast&lt;/strong&gt; &amp;amp; &lt;strong&gt;Gigabit Ethernet links&lt;/strong&gt;. The size of an &lt;strong&gt;ISL frame&lt;/strong&gt; can be expected to start from &lt;strong&gt;94 bytes&lt;/strong&gt; and increase up to &lt;strong&gt;1548 bytes&lt;/strong&gt; due to the overhead (additional fields) the protocol places within the frame it is tagging.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These fields and their length are also shown on the diagram below:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-1.gif&quot; alt=&quot;vlans-isl-analysis-1&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco ISL Frame Structure&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will be focusing on the two purple coloured 3D blocks, the &lt;strong&gt;ISL header&lt;/strong&gt; and &lt;strong&gt;ISL Frame Check Sequence&lt;/strong&gt; &lt;strong&gt;(FCS)&lt;/strong&gt; respectively. The rest of the Ethernet frame shown is a standard &lt;strong&gt;Ethernet II frame&lt;/strong&gt; as we know it. If you need more information, visit our &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II Frame&quot;&gt;Ethernet II&lt;/a&gt; page.&lt;/p&gt;
&lt;h2&gt;The ISL Header&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;ISL header&lt;/strong&gt; is &lt;strong&gt;26 byte field&lt;/strong&gt; containing all the VLAN information required (as one would expect), to allow a frame traverse over a &lt;strong&gt;Trunk Link&lt;/strong&gt; and find its way to its destination.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a closer look at the header and all the fields it contains:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-2.gif&quot; alt=&quot;vlans-isl-analysis-2&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can see that the &lt;strong&gt;ISL header&lt;/strong&gt; is made out of quite a few fields, perhaps a lot more than what you might have expected, but this shouldn't alarm you as only a handful of these fields are important. As usual, we will start from the left field and work our way to the far right side of the header. First up...... the &lt;strong&gt;DA&lt;/strong&gt; field:&lt;/p&gt;
&lt;h3&gt;Destination Address (DA) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;DA&lt;/strong&gt;' field is a &lt;strong&gt;40 bit destination address&lt;/strong&gt; field that contains a multicast address usually set to &quot;&lt;strong&gt;0x01-00-0C-00-00&lt;/strong&gt;&quot; or &quot;&lt;strong&gt;0x03-00-0C-00-00&lt;/strong&gt;&quot;. This address is used to signal to the receiver that the packet is in ISL format.&lt;/p&gt;
&lt;h3&gt;Type Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'Type' field is 4 bits long and helps identify the encapsulated original frame. Depending on the frame type, the ISL 'Type' field can take 4 possible values as outlined in the table below:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 438px; height: 132px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; bgcolor=&quot;#000066&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Type Value&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; bgcolor=&quot;#006600&quot;&gt;
&lt;p&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Encapsulated Frame&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0000&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Ethernet&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0001&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Token-Ring&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0010&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;FDDI&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0011&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;ATM&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;4 bits&lt;/strong&gt; of space assigned to the '&lt;strong&gt;Type Value&lt;/strong&gt;' field allow a maximum of &lt;strong&gt;2^4=16&lt;/strong&gt; different values. Since all combinations are not used, there is plenty of room for future encapsulations that might be developed.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-2.gif&quot; alt=&quot;vlans-isl-analysis-2&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;User Defined Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'User' field occupying 4 bits serves as an extension to the previous 'Type' field and is mostly used when the original encapsulated frame is an Ethernet II type frame. When this happens, the first two bits of the 'User' field act as a prioritisation mechanism, allowing the frames to find their way to the destination much faster.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Currently, there are &lt;strong&gt;4 different priorities&lt;/strong&gt; available, as shown in the table below:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 438px; height: 132px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 156px;&quot; bgcolor=&quot;#420900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Type Value&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 266px;&quot; bgcolor=&quot;#006600&quot;&gt;
&lt;p&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Frame Priority&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX00&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Normal Priority&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX01&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Priority 1&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX10&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Priority 2&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX11&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Highest Priority&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We should also note that the use of priorities is optional and not required.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-3.gif&quot; alt=&quot;vlans-isl-analysis-3&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Source Address (SA) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'SA' field is the source MAC address of the switch port transmitting the frame. This field is -as expected- 48 bits long. The receiving device can choose to ignore this field. It is worth noting that while the Destination Address field located at the beginning of the header contains a multicast MAC Address, the Source MAC address field we are looking at here contains the MAC address of the sending device - usually a switch.&lt;/p&gt;
&lt;h3&gt;Length Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'Length' field is 16 bits long and contains the whole ISL frame's length minus the DA, Type, User, SA, LEN and FCS fields. If you're good at mathematics, you can easily calculate the total length of the excluded fields, which is 18 bytes. With this in mind, a quick way to find this field's value is to take the total frame size and subtract 18 bytes :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Length fields are used in frames to help the receiving end identify where specific portions of the frame exist within the frame received.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-3.gif&quot; alt=&quot;vlans-isl-analysis-3&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;AAAA03 (SNAP) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNAP field&lt;/strong&gt; is a &lt;strong&gt;24 bit long field&lt;/strong&gt; with a value of &quot;&lt;strong&gt;0xAAAA03&lt;/strong&gt;&quot;.&lt;/p&gt;
&lt;h3&gt;High bits Source Address (HSA) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;HSA&lt;/strong&gt;' field is a &lt;strong&gt;24 bit value&lt;/strong&gt;. This field represents the upper three bytes of the &lt;strong&gt;SA field&lt;/strong&gt; (the manufacturers ID portion) and must contain the value &quot;&lt;strong&gt;0x00-00-0C&lt;/strong&gt;&quot;. Since the &lt;strong&gt;SA field&lt;/strong&gt; is &lt;strong&gt;48 bits long&lt;/strong&gt; or &lt;strong&gt;6 bytes&lt;/strong&gt;, the &lt;strong&gt;upper 3 bytes&lt;/strong&gt; of the &lt;strong&gt;SA field&lt;/strong&gt; would translate to &lt;strong&gt;24 bits&lt;/strong&gt;, hence the length of the &lt;strong&gt;HSA field&lt;/strong&gt;.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-4.gif&quot; alt=&quot;vlans-isl-analysis-4&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;VLAN - Destination Virtual LAN ID Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VLAN field&lt;/strong&gt; is the &lt;strong&gt;Virtual LAN ID&lt;/strong&gt; of the frame. This is perhaps the most important field of all as our frame moves between trunk links because it allows all trunk links to identify the VLAN this frame belongs to. The &lt;strong&gt;VLAN ID field&lt;/strong&gt; is &lt;strong&gt;15 bits long&lt;/strong&gt; and often referred to as the &quot;color&quot; of the frame.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Without this field, there would be no way of identifying which VLAN the frame transitting a trunk link belongs to.&lt;/p&gt;
&lt;h3&gt;Bridge Protocol Data Unit (BPDU) &amp;amp; Cisco Discovery Protocol (CDP) Indicator&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;BPDU&lt;/strong&gt;' field is only &lt;strong&gt;1 bit long&lt;/strong&gt; but very important as it is set for &lt;strong&gt;all BPDU packets&lt;/strong&gt; encapsulated by the &lt;strong&gt;ISL frame&lt;/strong&gt;. For those unaware, BPDU's are used by the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol.html&quot; target=&quot;_blank&quot; title=&quot;Spanning Tree Protocol (STP)&quot;&gt;&lt;strong&gt;Spanning Tree Protocol (STP)&lt;/strong&gt;&lt;/a&gt; to shut down redundant links and avoid network loops. This field is also used for &lt;strong&gt;CDP&lt;/strong&gt; and &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;Virtual Trunk Protocol (VTP)&quot;&gt;Virtual Trunk Protocol (VTP)&lt;/a&gt; frames&lt;/strong&gt; that are encapsulated.&lt;/p&gt;
&lt;h3&gt;Index Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Index field&lt;/strong&gt; is a &lt;strong&gt;16 bit value&lt;/strong&gt; and indicates the port index of the source of the packet as it exits the switch. It is used for diagnostic purposes only and may be set to any value by other devices.&lt;/p&gt;
&lt;h3&gt;RES Field - Reserved for Token Ring and Fiber Distributed Data Interface (FDDI)&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RES field&lt;/strong&gt; is a &lt;strong&gt;16 bit value&lt;/strong&gt; and used when &lt;strong&gt;Token Ring&lt;/strong&gt; or &lt;strong&gt;FDDI packets&lt;/strong&gt; are encapsulated with an &lt;strong&gt;ISL frame&lt;/strong&gt;. In the case of &lt;strong&gt;Token Ring&lt;/strong&gt; frames, the &lt;strong&gt;Access Control (AC)&lt;/strong&gt; and &lt;strong&gt;Frame Control (FC)&lt;/strong&gt; fields are placed here whereas in the case of &lt;strong&gt;FDDI&lt;/strong&gt;, the &lt;strong&gt;FC field&lt;/strong&gt; is placed in the &lt;strong&gt;Least Significant Byte (LSB)&lt;/strong&gt; of this field (as in a &lt;strong&gt;FC&lt;/strong&gt; of&amp;nbsp;&lt;strong&gt;0x12&lt;/strong&gt; would have a &lt;strong&gt;RES&lt;/strong&gt; field of &lt;strong&gt;0x0012&lt;/strong&gt;). For Ethernet packets, the &lt;strong&gt;RES&lt;/strong&gt; field should be set to &lt;strong&gt;all zeros&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Frame Check Sequence (ISL FCS)&lt;/h3&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-5.gif&quot; alt=&quot;vlans-isl-analysis-5&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Coming to the end of the &lt;strong&gt;ISL protocol analysis&lt;/strong&gt;, we met the &lt;strong&gt;FCS&lt;/strong&gt; field which consists of &lt;strong&gt;four bytes&lt;/strong&gt;. The &lt;strong&gt;FCS&lt;/strong&gt; contains a &lt;strong&gt;32-bit CRC value&lt;/strong&gt;, which is created by the sending MAC (switch) and is recalculated by the receiving MAC (switch) to check for corrupt frames. In an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II frame&quot;&gt;Ethernet II frame&lt;/a&gt;, the &lt;strong&gt;FCS&lt;/strong&gt; is generated using the &lt;strong&gt;Destination MAC&lt;/strong&gt;, &lt;strong&gt;Source MAC&lt;/strong&gt;, &lt;strong&gt;Ethertype&lt;/strong&gt;, and &lt;strong&gt;Data&lt;/strong&gt; fields while &lt;strong&gt;ISL's FCS&lt;/strong&gt; is calculated based on the &lt;strong&gt;entire ISL frame&lt;/strong&gt; and added to the end of it.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article analysed all fields of the &lt;strong&gt;ISL header&lt;/strong&gt; and &lt;strong&gt;FCS&lt;/strong&gt;. The next page deals with the popular&lt;strong&gt; IEEE 802.1q&lt;/strong&gt;, an alternative to Cisco's &lt;strong&gt;ISL tagging protocol&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-isl-analysis-intro.webp&quot; alt=&quot;Introduction to ISL Analysis&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-isl-analysis-intro.webp&quot; alt=&quot;vlan isl analysis intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vlan isl analysis intro&quot; /&gt;Deciding whether to use &lt;strong&gt;ISL&lt;/strong&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html&quot; target=&quot;_blank&quot; title=&quot;IEEE 802.1q&quot;&gt;&lt;strong&gt;IEEE 802.1q&lt;/strong&gt;&lt;/a&gt; to power your trunk links can be quite confusing if you cannot identify the advantages and disadvantages of each protocol within your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article will cover the &lt;strong&gt;ISL protocol&lt;/strong&gt; in great detail, providing an insight to its secrets and capabilities which you probably were unaware of. In turn, this will also help you understand the existence of certain limitations the protocol has, but most importantly allow you to decide if ISL is the tagging process you require within your network.&lt;/p&gt;
&lt;h2&gt;InterSwitch Link (ISL)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;ISL&lt;/strong&gt; is &lt;strong&gt;Cisco's propriety tagging method&lt;/strong&gt; and supported only on Cisco's equipment through &lt;strong&gt;Fast&lt;/strong&gt; &amp;amp; &lt;strong&gt;Gigabit Ethernet links&lt;/strong&gt;. The size of an &lt;strong&gt;ISL frame&lt;/strong&gt; can be expected to start from &lt;strong&gt;94 bytes&lt;/strong&gt; and increase up to &lt;strong&gt;1548 bytes&lt;/strong&gt; due to the overhead (additional fields) the protocol places within the frame it is tagging.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These fields and their length are also shown on the diagram below:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-1.gif&quot; alt=&quot;vlans-isl-analysis-1&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco ISL Frame Structure&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will be focusing on the two purple coloured 3D blocks, the &lt;strong&gt;ISL header&lt;/strong&gt; and &lt;strong&gt;ISL Frame Check Sequence&lt;/strong&gt; &lt;strong&gt;(FCS)&lt;/strong&gt; respectively. The rest of the Ethernet frame shown is a standard &lt;strong&gt;Ethernet II frame&lt;/strong&gt; as we know it. If you need more information, visit our &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II Frame&quot;&gt;Ethernet II&lt;/a&gt; page.&lt;/p&gt;
&lt;h2&gt;The ISL Header&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;ISL header&lt;/strong&gt; is &lt;strong&gt;26 byte field&lt;/strong&gt; containing all the VLAN information required (as one would expect), to allow a frame traverse over a &lt;strong&gt;Trunk Link&lt;/strong&gt; and find its way to its destination.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a closer look at the header and all the fields it contains:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-2.gif&quot; alt=&quot;vlans-isl-analysis-2&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can see that the &lt;strong&gt;ISL header&lt;/strong&gt; is made out of quite a few fields, perhaps a lot more than what you might have expected, but this shouldn't alarm you as only a handful of these fields are important. As usual, we will start from the left field and work our way to the far right side of the header. First up...... the &lt;strong&gt;DA&lt;/strong&gt; field:&lt;/p&gt;
&lt;h3&gt;Destination Address (DA) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;DA&lt;/strong&gt;' field is a &lt;strong&gt;40 bit destination address&lt;/strong&gt; field that contains a multicast address usually set to &quot;&lt;strong&gt;0x01-00-0C-00-00&lt;/strong&gt;&quot; or &quot;&lt;strong&gt;0x03-00-0C-00-00&lt;/strong&gt;&quot;. This address is used to signal to the receiver that the packet is in ISL format.&lt;/p&gt;
&lt;h3&gt;Type Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'Type' field is 4 bits long and helps identify the encapsulated original frame. Depending on the frame type, the ISL 'Type' field can take 4 possible values as outlined in the table below:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 438px; height: 132px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; bgcolor=&quot;#000066&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Type Value&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; bgcolor=&quot;#006600&quot;&gt;
&lt;p&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Encapsulated Frame&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0000&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Ethernet&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0001&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Token-Ring&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0010&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;FDDI&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#006699&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;0011&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;ATM&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;4 bits&lt;/strong&gt; of space assigned to the '&lt;strong&gt;Type Value&lt;/strong&gt;' field allow a maximum of &lt;strong&gt;2^4=16&lt;/strong&gt; different values. Since all combinations are not used, there is plenty of room for future encapsulations that might be developed.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-2.gif&quot; alt=&quot;vlans-isl-analysis-2&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;User Defined Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'User' field occupying 4 bits serves as an extension to the previous 'Type' field and is mostly used when the original encapsulated frame is an Ethernet II type frame. When this happens, the first two bits of the 'User' field act as a prioritisation mechanism, allowing the frames to find their way to the destination much faster.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Currently, there are &lt;strong&gt;4 different priorities&lt;/strong&gt; available, as shown in the table below:&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 438px; height: 132px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 156px;&quot; bgcolor=&quot;#420900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Type Value&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 266px;&quot; bgcolor=&quot;#006600&quot;&gt;
&lt;p&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Frame Priority&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX00&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Normal Priority&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX01&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Priority 1&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX10&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Priority 2&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;th bgcolor=&quot;#990000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;XX11&lt;/span&gt;&lt;/th&gt;&lt;th bgcolor=&quot;#009900&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Highest Priority&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We should also note that the use of priorities is optional and not required.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-3.gif&quot; alt=&quot;vlans-isl-analysis-3&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Source Address (SA) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'SA' field is the source MAC address of the switch port transmitting the frame. This field is -as expected- 48 bits long. The receiving device can choose to ignore this field. It is worth noting that while the Destination Address field located at the beginning of the header contains a multicast MAC Address, the Source MAC address field we are looking at here contains the MAC address of the sending device - usually a switch.&lt;/p&gt;
&lt;h3&gt;Length Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 'Length' field is 16 bits long and contains the whole ISL frame's length minus the DA, Type, User, SA, LEN and FCS fields. If you're good at mathematics, you can easily calculate the total length of the excluded fields, which is 18 bytes. With this in mind, a quick way to find this field's value is to take the total frame size and subtract 18 bytes :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Length fields are used in frames to help the receiving end identify where specific portions of the frame exist within the frame received.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-3.gif&quot; alt=&quot;vlans-isl-analysis-3&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;AAAA03 (SNAP) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNAP field&lt;/strong&gt; is a &lt;strong&gt;24 bit long field&lt;/strong&gt; with a value of &quot;&lt;strong&gt;0xAAAA03&lt;/strong&gt;&quot;.&lt;/p&gt;
&lt;h3&gt;High bits Source Address (HSA) Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;HSA&lt;/strong&gt;' field is a &lt;strong&gt;24 bit value&lt;/strong&gt;. This field represents the upper three bytes of the &lt;strong&gt;SA field&lt;/strong&gt; (the manufacturers ID portion) and must contain the value &quot;&lt;strong&gt;0x00-00-0C&lt;/strong&gt;&quot;. Since the &lt;strong&gt;SA field&lt;/strong&gt; is &lt;strong&gt;48 bits long&lt;/strong&gt; or &lt;strong&gt;6 bytes&lt;/strong&gt;, the &lt;strong&gt;upper 3 bytes&lt;/strong&gt; of the &lt;strong&gt;SA field&lt;/strong&gt; would translate to &lt;strong&gt;24 bits&lt;/strong&gt;, hence the length of the &lt;strong&gt;HSA field&lt;/strong&gt;.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-4.gif&quot; alt=&quot;vlans-isl-analysis-4&quot; width=&quot;591&quot; height=&quot;146&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;VLAN - Destination Virtual LAN ID Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VLAN field&lt;/strong&gt; is the &lt;strong&gt;Virtual LAN ID&lt;/strong&gt; of the frame. This is perhaps the most important field of all as our frame moves between trunk links because it allows all trunk links to identify the VLAN this frame belongs to. The &lt;strong&gt;VLAN ID field&lt;/strong&gt; is &lt;strong&gt;15 bits long&lt;/strong&gt; and often referred to as the &quot;color&quot; of the frame.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Without this field, there would be no way of identifying which VLAN the frame transitting a trunk link belongs to.&lt;/p&gt;
&lt;h3&gt;Bridge Protocol Data Unit (BPDU) &amp;amp; Cisco Discovery Protocol (CDP) Indicator&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;BPDU&lt;/strong&gt;' field is only &lt;strong&gt;1 bit long&lt;/strong&gt; but very important as it is set for &lt;strong&gt;all BPDU packets&lt;/strong&gt; encapsulated by the &lt;strong&gt;ISL frame&lt;/strong&gt;. For those unaware, BPDU's are used by the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol.html&quot; target=&quot;_blank&quot; title=&quot;Spanning Tree Protocol (STP)&quot;&gt;&lt;strong&gt;Spanning Tree Protocol (STP)&lt;/strong&gt;&lt;/a&gt; to shut down redundant links and avoid network loops. This field is also used for &lt;strong&gt;CDP&lt;/strong&gt; and &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html&quot; target=&quot;_blank&quot; title=&quot;Virtual Trunk Protocol (VTP)&quot;&gt;Virtual Trunk Protocol (VTP)&lt;/a&gt; frames&lt;/strong&gt; that are encapsulated.&lt;/p&gt;
&lt;h3&gt;Index Field&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Index field&lt;/strong&gt; is a &lt;strong&gt;16 bit value&lt;/strong&gt; and indicates the port index of the source of the packet as it exits the switch. It is used for diagnostic purposes only and may be set to any value by other devices.&lt;/p&gt;
&lt;h3&gt;RES Field - Reserved for Token Ring and Fiber Distributed Data Interface (FDDI)&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RES field&lt;/strong&gt; is a &lt;strong&gt;16 bit value&lt;/strong&gt; and used when &lt;strong&gt;Token Ring&lt;/strong&gt; or &lt;strong&gt;FDDI packets&lt;/strong&gt; are encapsulated with an &lt;strong&gt;ISL frame&lt;/strong&gt;. In the case of &lt;strong&gt;Token Ring&lt;/strong&gt; frames, the &lt;strong&gt;Access Control (AC)&lt;/strong&gt; and &lt;strong&gt;Frame Control (FC)&lt;/strong&gt; fields are placed here whereas in the case of &lt;strong&gt;FDDI&lt;/strong&gt;, the &lt;strong&gt;FC field&lt;/strong&gt; is placed in the &lt;strong&gt;Least Significant Byte (LSB)&lt;/strong&gt; of this field (as in a &lt;strong&gt;FC&lt;/strong&gt; of&amp;nbsp;&lt;strong&gt;0x12&lt;/strong&gt; would have a &lt;strong&gt;RES&lt;/strong&gt; field of &lt;strong&gt;0x0012&lt;/strong&gt;). For Ethernet packets, the &lt;strong&gt;RES&lt;/strong&gt; field should be set to &lt;strong&gt;all zeros&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Frame Check Sequence (ISL FCS)&lt;/h3&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-isl-analysis-5.gif&quot; alt=&quot;vlans-isl-analysis-5&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Coming to the end of the &lt;strong&gt;ISL protocol analysis&lt;/strong&gt;, we met the &lt;strong&gt;FCS&lt;/strong&gt; field which consists of &lt;strong&gt;four bytes&lt;/strong&gt;. The &lt;strong&gt;FCS&lt;/strong&gt; contains a &lt;strong&gt;32-bit CRC value&lt;/strong&gt;, which is created by the sending MAC (switch) and is recalculated by the receiving MAC (switch) to check for corrupt frames. In an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II frame&quot;&gt;Ethernet II frame&lt;/a&gt;, the &lt;strong&gt;FCS&lt;/strong&gt; is generated using the &lt;strong&gt;Destination MAC&lt;/strong&gt;, &lt;strong&gt;Source MAC&lt;/strong&gt;, &lt;strong&gt;Ethertype&lt;/strong&gt;, and &lt;strong&gt;Data&lt;/strong&gt; fields while &lt;strong&gt;ISL's FCS&lt;/strong&gt; is calculated based on the &lt;strong&gt;entire ISL frame&lt;/strong&gt; and added to the end of it.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article analysed all fields of the &lt;strong&gt;ISL header&lt;/strong&gt; and &lt;strong&gt;FCS&lt;/strong&gt;. The next page deals with the popular&lt;strong&gt; IEEE 802.1q&lt;/strong&gt;, an alternative to Cisco's &lt;strong&gt;ISL tagging protocol&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VLAN Tagging - Understanding VLANs Ethernet Frames</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html"/>
		<published>2011-05-30T05:08:09+10:00</published>
		<updated>2011-05-30T05:08:09+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-tagging.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-tagging-intro.webp&quot; alt=&quot;Introduction to VLAN Tagging&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-tagging-intro.webp&quot; alt=&quot;Introduction to VLAN Tagging&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to VLAN Tagging&quot; /&gt;We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently configure each port to a specific VLAN. However, we haven't explained how these packets run through the Trunk Links and network backbone, eventually finding their way to the destination port without getting mixed or lost with the rest of the packets flowing through the Trunk Links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This is process belongs to the world of VLAN Tagging!&lt;/p&gt;
&lt;h2&gt;VLAN Tagging&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As it arrives at the end of the trunk link the tag is removed and the frame is sent to the correct access link port according to the switch's table, so that the receiving end is unaware of any VLAN information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram below illustrates the process described above:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-1.gif&quot; alt=&quot;vlans-tagging-1&quot; width=&quot;500&quot; height=&quot;430&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here we see two 3500 series Catalyst switches and one Cisco 3745 router connected via the Trunk Links. The Trunk Links allow frames from all VLANs to travel throughout the network backbone and reach their destination regardless of the VLAN the frame belongs to. On the other side, the workstations are connected directly to Access Links (ports configured for one VLAN membership only), gaining access to the resources required by VLAN's members.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Again, when we call a port 'Access Link' or 'Trunk Link', we are describing it based on the way it has been configured. This is because a port can be configured as an Access Link or Trunk Link (in the case where it's 100Mbits or faster).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is stressed because a lot of people think that it's the other way around, meaning, a switch's uplink is always a Trunk Link and any normal port where you would usually connect a workstation, is an Access Link port!&lt;/p&gt;
&lt;div class=&quot;box-info&quot;&gt;VLAN Configuration, InterVLAN routing,Trunk Link configuration for Cisco Layer 3 switches (3550, 3560 series, 3750 series, 4500 series and 6500 series switches) is covered extensively at the following article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;VLAN Tagging Protocol&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We're now familiar with the term 'Trunk Link' and its purpose, that is, to allow frames from multiple VLANs to run across the network backbone, finding their way to their destination. What you might not have known though is that there is more than one method to 'tag' these frames as they run through the Trunk Links or ... the VLAN Highway as we like to call it.&lt;/p&gt;
&lt;h2&gt;InterSwitch Link (ISL)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;ISL is a Cisco propriety protocol used for FastEthernet and Gigabit Ethernet links only. The protocol can be used in various equipments such as switch ports, router interfaces, server interface cards to create a trunk to a server and much more. You'll find more information on VLAN implementations on our last page of the VLAN topic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Being a propriety protocol, ISL is available and supported naturally on Cisco products only:) You may also be interested in knowing that ISL is what we call, an 'external tagging process'. This means that the protocol does not alter the Ethernet frame as shown above in our previous diagram - placing the VLAN Tag inside the Ethernet frame, but encapsulating the Ethernet frame with a new 26 byte ISL header and adding an additional 4 byte frame check sequence (FCS) field at the end of frame, as illustrated below:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-2.gif&quot; alt=&quot;vlans-tagging-2&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite this extra overhead, ISL is capable of supporting up to 1000 VLANs and does not introduce any delays in data transfers between Trunk Links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above diagram we can see an ISL frame encapsulating an Ethernet II frame. This is the actual frame that runs through a trunk link between two Cisco devices when configured to use ISL as their trunk tagging protocol.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The encapsulation method mentioned above also happens to be the reason why only ISL-aware devices are able to read it, and because of the addition of an ISL header and FCS field, the frame can end up being 1548 bytes long! For those who can't remember, Ethernet's maximum frame size is 1518 bytes, making an ISL frame of 1548 bytes, what we call a 'giant' or 'jumbo' frame!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, ISL uses Per VLAN Spanning Tree (PVST) which runs one instance of the Spanning Tree Protocol (STP) per VLAN. This method allows us to optimise the root switch placement for each available VLAN while supporting neat features such as VLAN load balancing between multiple trunks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since the ISL's header fields are covered on a separate page, we won't provide further details here.&lt;/p&gt;
&lt;h2&gt;IEEE 802.1q&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 802.1q standard was created by the IEEE group to address the problem breaking large networks into smaller and manageable ones through the use of VLANs. The 802.1q standard is of course an alternative to Cisco's ISL, and one that all vendors implement on their network equipment to ensure compatibility and seamless integration with the existing network infrastructure.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As with all 'open standards' the IEEE 802.1q tagging method is by far the most popular and commonly used even in Cisco oriented network installations mainly for compatability with other equipment and future upgrades that might tend towards different vendors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to the compatability issue, there are several more reasons for which most engineers prefer this method of tagging. These include:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li type=&quot;square&quot;&gt;Support of up to 4096 VLANs&lt;/li&gt;
&lt;li&gt;Insertion of a 4-byte VLAN tag with no encapsulation&lt;/li&gt;
&lt;li&gt;Smaller final frame sizes when compared with ISL&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Amazingly enough, the 802.1q tagging method supports a whopping 4096 VLANs (as opposed to 1000 VLANs ISL supports), a large amount indeed which is merely impossible to deplet in your local area network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 4-byte tag we mentioned is inserted within the existing Ethernet frame, right after the Source MAC Address as illustrated in the diagram below:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-3.gif&quot; alt=&quot;vlans-tagging-3&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because of the extra 4-byte tag, the minimum Ethernet II frame size increases from 64 bytes to 68 bytes, while the maximum Ethernet II frame size now becomes 1522 bytes. If you require more information on the tag's fields, visit our protocol page where further details are given.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you may have already concluded yourself, the maximum Ethernet frame is considerably smaller in size (by 26 bytes) when using the IEEE 802.1q tagging method rather than ISL. This difference in size might also be interpreted by many that the IEEE 802.1q tagging method is much faster than ISL, but this is not true. In fact, Cisco recommends you use ISL tagging when in a Cisco native environment, but as outlined earlier, most network engineers and administrators believe that the IEEE802.1q approach is much safer, ensuring maximum compatability.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And because not everything in this world is perfect, no matter how good the 802.1q tagging protocol might seem, it does come with its restrictions:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;In a Cisco powered network, the switch maintains one instance of the Spanning Tree Protocol (STP) per VLAN. This means that if you have 10 VLANs in your network, there will also be 10 instances of STP running amongst the switches. In the case of non-Cisco switches, then only 1 instance of STP is maintained for all VLANs, which is certainly not something a network administrator would want.&lt;/li&gt;
&lt;li&gt;It is imperative that the VLAN for an IEEE 802.1q trunk is the same for both ends of the trunk link, otherwise network loops are likely to occur.&lt;/li&gt;
&lt;li&gt;Cisco always advises that disabling a STP instance on one 802.1q VLAN trunk without disabling it on the rest of the available VLANs, is not a good idea because network loops might be created. It's best to either disable or enable STP on all VLANs.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;LAN Emulation (LANE)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;LAN Emulation was introduced to solve the need of creating VLANs over WAN links, allowing network managers to define workgroups based on logical function, rather than physical location. With this new technology (so to speak - it's actually been around since 1995!), we are now able to create VLANs between remote offices, regardless of their location and distance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;LANE is not very common and you will most probably never see it implemented in small to mid-sized networks, however, this is no reason to ignore it. Just keep in mind that we won't be looking at it in much depth, but briefly covering it so we can grasp the concept.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;LANE has been supported by Cisco since 1995 and Cisco's ISO release 11.0. When implemented between two point-to-point links, the WAN network becomes totally transparent to the end users:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-4.gif&quot; alt=&quot;vlans-tagging-4&quot; width=&quot;565&quot; height=&quot;316&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Every LAN or native ATM host, like the switch or router shown in the diagram, connects to the ATM network via a special software interface called 'LAN Emulation Client'. The LANE Client works with the LAN Emulation Server (LES) to handle all messages and packets flowing through the network, ensuring that the end clients are not aware of the WAN network infrastructure and therefore making it transparent.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The LANE specification defines a LAN Emulation Configuration Server (LECS), a service running inside an ATM switch or a physical server connected to the ATM switch, that resides within the ATM network and allows network administrators to control which LANs are combined to form VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The LAN Emulation Server with the help of the LANE Client, maps MAC addresses to ATM addresses, emulating Layer 2 protocols (DataLink layer) and transporting higher layer protocols such as TCP/IP, IPX/SPX without modification.&lt;/p&gt;
&lt;h2&gt;802.10 (FDDI)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Tagging VLAN frames on Fiber Distributed Data Interface (FDDI) networks is quite common in large scale networks. This implementation is usually found on Cisco's high-end switch models such as the Catalyst 5000 series where special modules are installed inside the switches, connecting them to an FDDI backbone. This backbone interconnects all major network switches, providing a fully redundant network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The various modules available for the Cisco Catalyst switches allow the integration of Ethernet into the FDDI network. When intalling the appropriate switch modules and with the use of the 802.10 SAID field, a mapping between the Ethernet VLAN and 802.10 network is created, and as such, all Ethernet VLANs are able to run over the FDDI network.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-5.gif&quot; alt=&quot;vlans-tagging-5&quot; width=&quot;500&quot; height=&quot;218&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram above shows two Catalyst switches connected to a FDDI backbone. The links between the switches and the backbone can either be Access type links (meaning one VLAN passes through them) or Trunk links (all VLANs are able to pass through them). At both ends, the switches have an Ethernet port belonging to VLAN 6, and to 'connect' these ports we map each switch's Ethernet module with its FDDI module.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, the special FDDI modules mentioned above support both single VLANs (non-trunk) and multiple VLANs (trunk).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To provide further detail, the diagram below shows the IEEE 802.10 frame, along with the SAID field in which the VLAN ID is inserted, allowing the frame to transit trunk links as described:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-6.gif&quot; alt=&quot;vlans-tagging-6&quot; width=&quot;630&quot; height=&quot;150&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It's okay if your impressed or seem confused with the structure of the above frame, that's normal:) You'll be suprised to find out that the Cisco switch in the previous diagram must process the Ethernet II frame and convert it before placing it on the IEEE 802.10 backbone or trunk.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During this stage, the original Ethernet II frame is converted to an Ethernet SNAP frame and then finally to an IEEE 802.10 frame. This conversion is required to maintain compatability and reliability between the two different topologies. The most important bit to remember here is the SAID field and its purpose.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This page introduced four popular VLAN tagging methods, providing you with the frame structure and general details of each tagging method. Out of all, the IEEE 802.1q and ISL tagging methods are the most popular, so make sure you understand them quite well.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-tagging-intro.webp&quot; alt=&quot;Introduction to VLAN Tagging&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-tagging-intro.webp&quot; alt=&quot;Introduction to VLAN Tagging&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to VLAN Tagging&quot; /&gt;We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently configure each port to a specific VLAN. However, we haven't explained how these packets run through the Trunk Links and network backbone, eventually finding their way to the destination port without getting mixed or lost with the rest of the packets flowing through the Trunk Links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This is process belongs to the world of VLAN Tagging!&lt;/p&gt;
&lt;h2&gt;VLAN Tagging&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As it arrives at the end of the trunk link the tag is removed and the frame is sent to the correct access link port according to the switch's table, so that the receiving end is unaware of any VLAN information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The diagram below illustrates the process described above:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-1.gif&quot; alt=&quot;vlans-tagging-1&quot; width=&quot;500&quot; height=&quot;430&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here we see two 3500 series Catalyst switches and one Cisco 3745 router connected via the Trunk Links. The Trunk Links allow frames from all VLANs to travel throughout the network backbone and reach their destination regardless of the VLAN the frame belongs to. On the other side, the workstations are connected directly to Access Links (ports configured for one VLAN membership only), gaining access to the resources required by VLAN's members.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Again, when we call a port 'Access Link' or 'Trunk Link', we are describing it based on the way it has been configured. This is because a port can be configured as an Access Link or Trunk Link (in the case where it's 100Mbits or faster).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is stressed because a lot of people think that it's the other way around, meaning, a switch's uplink is always a Trunk Link and any normal port where you would usually connect a workstation, is an Access Link port!&lt;/p&gt;
&lt;div class=&quot;box-info&quot;&gt;VLAN Configuration, InterVLAN routing,Trunk Link configuration for Cisco Layer 3 switches (3550, 3560 series, 3750 series, 4500 series and 6500 series switches) is covered extensively at the following article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;VLAN Tagging Protocol&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We're now familiar with the term 'Trunk Link' and its purpose, that is, to allow frames from multiple VLANs to run across the network backbone, finding their way to their destination. What you might not have known though is that there is more than one method to 'tag' these frames as they run through the Trunk Links or ... the VLAN Highway as we like to call it.&lt;/p&gt;
&lt;h2&gt;InterSwitch Link (ISL)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;ISL is a Cisco propriety protocol used for FastEthernet and Gigabit Ethernet links only. The protocol can be used in various equipments such as switch ports, router interfaces, server interface cards to create a trunk to a server and much more. You'll find more information on VLAN implementations on our last page of the VLAN topic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Being a propriety protocol, ISL is available and supported naturally on Cisco products only:) You may also be interested in knowing that ISL is what we call, an 'external tagging process'. This means that the protocol does not alter the Ethernet frame as shown above in our previous diagram - placing the VLAN Tag inside the Ethernet frame, but encapsulating the Ethernet frame with a new 26 byte ISL header and adding an additional 4 byte frame check sequence (FCS) field at the end of frame, as illustrated below:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-2.gif&quot; alt=&quot;vlans-tagging-2&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite this extra overhead, ISL is capable of supporting up to 1000 VLANs and does not introduce any delays in data transfers between Trunk Links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above diagram we can see an ISL frame encapsulating an Ethernet II frame. This is the actual frame that runs through a trunk link between two Cisco devices when configured to use ISL as their trunk tagging protocol.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The encapsulation method mentioned above also happens to be the reason why only ISL-aware devices are able to read it, and because of the addition of an ISL header and FCS field, the frame can end up being 1548 bytes long! For those who can't remember, Ethernet's maximum frame size is 1518 bytes, making an ISL frame of 1548 bytes, what we call a 'giant' or 'jumbo' frame!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, ISL uses Per VLAN Spanning Tree (PVST) which runs one instance of the Spanning Tree Protocol (STP) per VLAN. This method allows us to optimise the root switch placement for each available VLAN while supporting neat features such as VLAN load balancing between multiple trunks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since the ISL's header fields are covered on a separate page, we won't provide further details here.&lt;/p&gt;
&lt;h2&gt;IEEE 802.1q&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 802.1q standard was created by the IEEE group to address the problem breaking large networks into smaller and manageable ones through the use of VLANs. The 802.1q standard is of course an alternative to Cisco's ISL, and one that all vendors implement on their network equipment to ensure compatibility and seamless integration with the existing network infrastructure.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As with all 'open standards' the IEEE 802.1q tagging method is by far the most popular and commonly used even in Cisco oriented network installations mainly for compatability with other equipment and future upgrades that might tend towards different vendors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to the compatability issue, there are several more reasons for which most engineers prefer this method of tagging. These include:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li type=&quot;square&quot;&gt;Support of up to 4096 VLANs&lt;/li&gt;
&lt;li&gt;Insertion of a 4-byte VLAN tag with no encapsulation&lt;/li&gt;
&lt;li&gt;Smaller final frame sizes when compared with ISL&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Amazingly enough, the 802.1q tagging method supports a whopping 4096 VLANs (as opposed to 1000 VLANs ISL supports), a large amount indeed which is merely impossible to deplet in your local area network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The 4-byte tag we mentioned is inserted within the existing Ethernet frame, right after the Source MAC Address as illustrated in the diagram below:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-3.gif&quot; alt=&quot;vlans-tagging-3&quot; width=&quot;600&quot; height=&quot;211&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because of the extra 4-byte tag, the minimum Ethernet II frame size increases from 64 bytes to 68 bytes, while the maximum Ethernet II frame size now becomes 1522 bytes. If you require more information on the tag's fields, visit our protocol page where further details are given.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you may have already concluded yourself, the maximum Ethernet frame is considerably smaller in size (by 26 bytes) when using the IEEE 802.1q tagging method rather than ISL. This difference in size might also be interpreted by many that the IEEE 802.1q tagging method is much faster than ISL, but this is not true. In fact, Cisco recommends you use ISL tagging when in a Cisco native environment, but as outlined earlier, most network engineers and administrators believe that the IEEE802.1q approach is much safer, ensuring maximum compatability.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And because not everything in this world is perfect, no matter how good the 802.1q tagging protocol might seem, it does come with its restrictions:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;In a Cisco powered network, the switch maintains one instance of the Spanning Tree Protocol (STP) per VLAN. This means that if you have 10 VLANs in your network, there will also be 10 instances of STP running amongst the switches. In the case of non-Cisco switches, then only 1 instance of STP is maintained for all VLANs, which is certainly not something a network administrator would want.&lt;/li&gt;
&lt;li&gt;It is imperative that the VLAN for an IEEE 802.1q trunk is the same for both ends of the trunk link, otherwise network loops are likely to occur.&lt;/li&gt;
&lt;li&gt;Cisco always advises that disabling a STP instance on one 802.1q VLAN trunk without disabling it on the rest of the available VLANs, is not a good idea because network loops might be created. It's best to either disable or enable STP on all VLANs.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;LAN Emulation (LANE)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;LAN Emulation was introduced to solve the need of creating VLANs over WAN links, allowing network managers to define workgroups based on logical function, rather than physical location. With this new technology (so to speak - it's actually been around since 1995!), we are now able to create VLANs between remote offices, regardless of their location and distance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;LANE is not very common and you will most probably never see it implemented in small to mid-sized networks, however, this is no reason to ignore it. Just keep in mind that we won't be looking at it in much depth, but briefly covering it so we can grasp the concept.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;LANE has been supported by Cisco since 1995 and Cisco's ISO release 11.0. When implemented between two point-to-point links, the WAN network becomes totally transparent to the end users:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-4.gif&quot; alt=&quot;vlans-tagging-4&quot; width=&quot;565&quot; height=&quot;316&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Every LAN or native ATM host, like the switch or router shown in the diagram, connects to the ATM network via a special software interface called 'LAN Emulation Client'. The LANE Client works with the LAN Emulation Server (LES) to handle all messages and packets flowing through the network, ensuring that the end clients are not aware of the WAN network infrastructure and therefore making it transparent.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The LANE specification defines a LAN Emulation Configuration Server (LECS), a service running inside an ATM switch or a physical server connected to the ATM switch, that resides within the ATM network and allows network administrators to control which LANs are combined to form VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The LAN Emulation Server with the help of the LANE Client, maps MAC addresses to ATM addresses, emulating Layer 2 protocols (DataLink layer) and transporting higher layer protocols such as TCP/IP, IPX/SPX without modification.&lt;/p&gt;
&lt;h2&gt;802.10 (FDDI)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Tagging VLAN frames on Fiber Distributed Data Interface (FDDI) networks is quite common in large scale networks. This implementation is usually found on Cisco's high-end switch models such as the Catalyst 5000 series where special modules are installed inside the switches, connecting them to an FDDI backbone. This backbone interconnects all major network switches, providing a fully redundant network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The various modules available for the Cisco Catalyst switches allow the integration of Ethernet into the FDDI network. When intalling the appropriate switch modules and with the use of the 802.10 SAID field, a mapping between the Ethernet VLAN and 802.10 network is created, and as such, all Ethernet VLANs are able to run over the FDDI network.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-5.gif&quot; alt=&quot;vlans-tagging-5&quot; width=&quot;500&quot; height=&quot;218&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram above shows two Catalyst switches connected to a FDDI backbone. The links between the switches and the backbone can either be Access type links (meaning one VLAN passes through them) or Trunk links (all VLANs are able to pass through them). At both ends, the switches have an Ethernet port belonging to VLAN 6, and to 'connect' these ports we map each switch's Ethernet module with its FDDI module.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lastly, the special FDDI modules mentioned above support both single VLANs (non-trunk) and multiple VLANs (trunk).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To provide further detail, the diagram below shows the IEEE 802.10 frame, along with the SAID field in which the VLAN ID is inserted, allowing the frame to transit trunk links as described:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-tagging-6.gif&quot; alt=&quot;vlans-tagging-6&quot; width=&quot;630&quot; height=&quot;150&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It's okay if your impressed or seem confused with the structure of the above frame, that's normal:) You'll be suprised to find out that the Cisco switch in the previous diagram must process the Ethernet II frame and convert it before placing it on the IEEE 802.10 backbone or trunk.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During this stage, the original Ethernet II frame is converted to an Ethernet SNAP frame and then finally to an IEEE 802.10 frame. This conversion is required to maintain compatability and reliability between the two different topologies. The most important bit to remember here is the SAID field and its purpose.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This page introduced four popular VLAN tagging methods, providing you with the frame structure and general details of each tagging method. Out of all, the IEEE 802.1q and ISL tagging methods are the most popular, so make sure you understand them quite well.&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>VLANs -  Access &amp; Trunk Links</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html"/>
		<published>2011-05-30T04:57:10+10:00</published>
		<updated>2011-05-30T04:57:10+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlans-access-and-trunk-links-intro.webp&quot; alt=&quot;Introduction to Access and Trunk Links&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-access-and-trunk-links-intro.webp&quot; alt=&quot;vlans access and trunk links intro&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vlans access and trunk links intro&quot; /&gt;If you've read our previous article&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-concept.html&quot; target=&quot;_blank&quot; title=&quot;The VLAN Concept - Introduction to VLANs&quot;&gt;The VLAN Concept - Introduction to VLANs&lt;/a&gt;&amp;nbsp; then you should feel comfortable with terms such as 'VLAN', 'Static &amp;amp; Dynamic VLANs', however this is just the beginning in this complex world. This article will start to slowly expand on these terms to help understand how VLANs are implemented inside an enterprise network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To begin with, we will take a closer look at the port interfaces on these smart switches and then start moving towards the interfaces connecting to the network backbone where things become slightly more complicated, though do not be alarmed since our detailed and easy to read diagrams are here to ensure the learning process is as enjoyable as possible.&lt;/p&gt;
&lt;h2&gt;VLAN Links - Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When inside the world of VLANs there are two types of interfaces, or if you like, links. These links allow us to connect multiple switches together or just simple network devices e.g PC, that will access the VLAN network. Depending on their configuration, they are called Access Links, or Trunk Links.&lt;/p&gt;
&lt;p class=&quot;box-hint&quot;&gt;VLAN Configuration, InterVLAN routing,Trunk Link configuration for Cisco Layer 3 switches (3550, 3560 series, 3750 series, 4500 series and 6500 series switches) is covered extensively at the following article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;strong style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #ffcc00;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Access Links&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Access Links are the most common type of links on any VLAN switch. All network hosts connect to the switch's Access Links in order to gain access to the local network. These links are your ordinary ports found on every switch, but configured in a special way, so you are able to plug a computer into them and access your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here's a picture of a Cisco Catalyst 3550 series switch, with it's Access Links (ports) marked in the Green circle:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-1.jpg&quot; alt=&quot;vlans-links-1&quot; width=&quot;567&quot; height=&quot;150&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We must note that the 'Access Link' term describes a configured port - this means that the ports above can be configured as the second type of VLAN links - Trunk Links. What we are showing here is what's usually configured as an Access Link port in 95% of all switches. Depending on your needs, you might require to configure the first port (top left corner) as a Trunk Link, in which case, it is obviously not called a Access Link port anymore, but a Trunk Link!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When configuring ports on a switch to act as Access Links, we usually configure only one VLAN per port, that is, the VLAN our device will be allowed to access. If you recall the diagram below which was also present during the introduction of the VLAN concept, you'll see that each PC is assigned to a specific port:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-2.gif&quot; alt=&quot;vlans-links-2&quot; width=&quot;509&quot; height=&quot;267&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this case, each of the 6 ports used have been configured for a specific VLAN. Ports 1, 2 and 3 have been assigned to VLAN 1 while ports 4, 5 and 6 to VLAN 2.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above diagram, this translates to allowing only VLAN 1 traffic in and out of ports 1, 2 and 3, while ports 4, 5 and 6 will carry VLAN 2 traffic. As you would remember, these two VLANs do not exchange any traffic between each other, unless we are using a layer 3 switch (or router) and we have explicitly configured the switch to route traffic between the two VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is equally important to note at this point that any device connected to an Access Link (port) is totally unaware of the VLAN assigned to the port. The device simply assumes it is part of a single broadcast domain, just as it happens with any normal switch. During data transfers, any VLAN information or data from other VLANs is removed so the recipient has no information about them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following diagram illustrates this to help you get the picture:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-3.gif&quot; alt=&quot;vlans-links-3&quot; width=&quot;441&quot; height=&quot;359&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown, all packets arriving, entering or exiting the port are standard Ethernet II type packets which are understood by the network device connected to the port. There is nothing special about these packets, other than the fact that they belong only to the VLAN the port is configured for.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If, for example, we configured the port shown above for VLAN 1, then any packets entering/exiting this port would be for that VLAN only. In addition, if we decided to use a logical network such as 192.168.0.0 with a default subnet mask of 255.255.255.0 (/24), then all network devices connecting to ports assigned to VLAN 1 must be configured with the appropriate network address so they may communicate with all other hosts in the same VLAN.&lt;/p&gt;
&lt;h2&gt;Trunk Links&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we've seen so far is a switch port configured to carry only one VLAN, that is, an Access Link port. There is, however, one more type of port configuration which we mentioned in the introductory section on this page - the Trunk Link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A Trunk Link, or 'Trunk' is a port configured to carry packets for any VLAN. These type of ports are usually found in connections between switches. These links require the ability to carry packets from all available VLANs because VLANs span over multiple switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows multiple switches connected throughout a network and the Trunk Links are marked in purple colour to help you identify them:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-4.gif&quot; alt=&quot;vlans-links-4&quot; width=&quot;550&quot; height=&quot;433&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see in our diagram, our switches connect to the network backbone via the Trunk Links. This allows all VLANs created in our network to propagate throughout the whole network. Now in the unlikely event of Trunk Link failure on one of our switches, the devices connected to that switch's ports would be isolated from the rest of the network, allowing only ports on that switch, belonging to the same VLAN, to communicate with each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So now that we have an idea of what Trunk Links are and their purpose, let's take a look at an actual switch to identify a possible Trunk Link:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-5.gif&quot; alt=&quot;vlans-links-5&quot; width=&quot;567&quot; height=&quot;150&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As we noted with the explanation of Access Link ports, the term '&lt;strong&gt;Trunk Link&lt;/strong&gt;' describes a configured port. In this case, the Gigabit ports are usually configured as Trunk Links, connecting the switch to the network backbone at the speed of 1 Gigabit, while the Access Link ports connect at 100Mbits.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In addition, we should note that for a port or link to operate as a Trunk Link, it is imperative that it runs at speeds of 100Mbit or greater. A port running at speeds of 10Mbit's cannot operate as a Trunk Link and this is logical because a Trunk Link is always used to connect to the network backbone, which must operate at speeds greater than most Access Links!&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This page introduced the Access and Trunk links. We will be seeing a lot of both links from now on, so it's best you get comfortable with them! Configuration of these links is covered later on, because there is still quite a bit of theory to cover!&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlans-access-and-trunk-links-intro.webp&quot; alt=&quot;Introduction to Access and Trunk Links&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-access-and-trunk-links-intro.webp&quot; alt=&quot;vlans access and trunk links intro&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vlans access and trunk links intro&quot; /&gt;If you've read our previous article&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-concept.html&quot; target=&quot;_blank&quot; title=&quot;The VLAN Concept - Introduction to VLANs&quot;&gt;The VLAN Concept - Introduction to VLANs&lt;/a&gt;&amp;nbsp; then you should feel comfortable with terms such as 'VLAN', 'Static &amp;amp; Dynamic VLANs', however this is just the beginning in this complex world. This article will start to slowly expand on these terms to help understand how VLANs are implemented inside an enterprise network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To begin with, we will take a closer look at the port interfaces on these smart switches and then start moving towards the interfaces connecting to the network backbone where things become slightly more complicated, though do not be alarmed since our detailed and easy to read diagrams are here to ensure the learning process is as enjoyable as possible.&lt;/p&gt;
&lt;h2&gt;VLAN Links - Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When inside the world of VLANs there are two types of interfaces, or if you like, links. These links allow us to connect multiple switches together or just simple network devices e.g PC, that will access the VLAN network. Depending on their configuration, they are called Access Links, or Trunk Links.&lt;/p&gt;
&lt;p class=&quot;box-hint&quot;&gt;VLAN Configuration, InterVLAN routing,Trunk Link configuration for Cisco Layer 3 switches (3550, 3560 series, 3750 series, 4500 series and 6500 series switches) is covered extensively at the following article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;strong style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #ffcc00;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Access Links&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Access Links are the most common type of links on any VLAN switch. All network hosts connect to the switch's Access Links in order to gain access to the local network. These links are your ordinary ports found on every switch, but configured in a special way, so you are able to plug a computer into them and access your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here's a picture of a Cisco Catalyst 3550 series switch, with it's Access Links (ports) marked in the Green circle:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-1.jpg&quot; alt=&quot;vlans-links-1&quot; width=&quot;567&quot; height=&quot;150&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We must note that the 'Access Link' term describes a configured port - this means that the ports above can be configured as the second type of VLAN links - Trunk Links. What we are showing here is what's usually configured as an Access Link port in 95% of all switches. Depending on your needs, you might require to configure the first port (top left corner) as a Trunk Link, in which case, it is obviously not called a Access Link port anymore, but a Trunk Link!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When configuring ports on a switch to act as Access Links, we usually configure only one VLAN per port, that is, the VLAN our device will be allowed to access. If you recall the diagram below which was also present during the introduction of the VLAN concept, you'll see that each PC is assigned to a specific port:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-2.gif&quot; alt=&quot;vlans-links-2&quot; width=&quot;509&quot; height=&quot;267&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this case, each of the 6 ports used have been configured for a specific VLAN. Ports 1, 2 and 3 have been assigned to VLAN 1 while ports 4, 5 and 6 to VLAN 2.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above diagram, this translates to allowing only VLAN 1 traffic in and out of ports 1, 2 and 3, while ports 4, 5 and 6 will carry VLAN 2 traffic. As you would remember, these two VLANs do not exchange any traffic between each other, unless we are using a layer 3 switch (or router) and we have explicitly configured the switch to route traffic between the two VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is equally important to note at this point that any device connected to an Access Link (port) is totally unaware of the VLAN assigned to the port. The device simply assumes it is part of a single broadcast domain, just as it happens with any normal switch. During data transfers, any VLAN information or data from other VLANs is removed so the recipient has no information about them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following diagram illustrates this to help you get the picture:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-3.gif&quot; alt=&quot;vlans-links-3&quot; width=&quot;441&quot; height=&quot;359&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown, all packets arriving, entering or exiting the port are standard Ethernet II type packets which are understood by the network device connected to the port. There is nothing special about these packets, other than the fact that they belong only to the VLAN the port is configured for.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If, for example, we configured the port shown above for VLAN 1, then any packets entering/exiting this port would be for that VLAN only. In addition, if we decided to use a logical network such as 192.168.0.0 with a default subnet mask of 255.255.255.0 (/24), then all network devices connecting to ports assigned to VLAN 1 must be configured with the appropriate network address so they may communicate with all other hosts in the same VLAN.&lt;/p&gt;
&lt;h2&gt;Trunk Links&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we've seen so far is a switch port configured to carry only one VLAN, that is, an Access Link port. There is, however, one more type of port configuration which we mentioned in the introductory section on this page - the Trunk Link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A Trunk Link, or 'Trunk' is a port configured to carry packets for any VLAN. These type of ports are usually found in connections between switches. These links require the ability to carry packets from all available VLANs because VLANs span over multiple switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows multiple switches connected throughout a network and the Trunk Links are marked in purple colour to help you identify them:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-4.gif&quot; alt=&quot;vlans-links-4&quot; width=&quot;550&quot; height=&quot;433&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see in our diagram, our switches connect to the network backbone via the Trunk Links. This allows all VLANs created in our network to propagate throughout the whole network. Now in the unlikely event of Trunk Link failure on one of our switches, the devices connected to that switch's ports would be isolated from the rest of the network, allowing only ports on that switch, belonging to the same VLAN, to communicate with each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So now that we have an idea of what Trunk Links are and their purpose, let's take a look at an actual switch to identify a possible Trunk Link:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-links-5.gif&quot; alt=&quot;vlans-links-5&quot; width=&quot;567&quot; height=&quot;150&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As we noted with the explanation of Access Link ports, the term '&lt;strong&gt;Trunk Link&lt;/strong&gt;' describes a configured port. In this case, the Gigabit ports are usually configured as Trunk Links, connecting the switch to the network backbone at the speed of 1 Gigabit, while the Access Link ports connect at 100Mbits.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In addition, we should note that for a port or link to operate as a Trunk Link, it is imperative that it runs at speeds of 100Mbit or greater. A port running at speeds of 10Mbit's cannot operate as a Trunk Link and this is logical because a Trunk Link is always used to connect to the network backbone, which must operate at speeds greater than most Access Links!&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This page introduced the Access and Trunk links. We will be seeing a lot of both links from now on, so it's best you get comfortable with them! Configuration of these links is covered later on, because there is still quite a bit of theory to cover!&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>Dynamic VLANs</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/dynamic-vlans.html"/>
		<published>2011-05-30T04:13:45+10:00</published>
		<updated>2011-05-30T04:13:45+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/dynamic-vlans.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/dynamic-vlans-intro.webp&quot; alt=&quot;Introduction to Dynamic VLANs&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/dynamic-vlans-intro.webp&quot; alt=&quot;dynamic vlans intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;dynamic vlans intro&quot; /&gt;Dynamic VLANs were introduced to grant the flexibility and complexity(!) that Static VLANs did not provide. Dynamic VLANs are quite rare because of their requirements and initial administrative overhead. As such, most administrators and network engineers tend to prefer Static VLANs.&lt;/p&gt;
&lt;h2&gt;Dynamic VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Dynamic VLANs, as opposed to Static VLANs, do not require the administrator to individually configure each port, but instead, a central server called the VMPS (VLAN Member Policy Server). The VMPS is used to handle the on-the-spot port configuration of every switch participating on the VLAN network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The VMPS server contains a database of all workstation MAC addresses, along with the associated VLAN the MAC address belongs to. This way, we essentially have a VLAN-to-MAC address mapping:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-1.gif&quot; alt=&quot;vlans-designing-vlans-dynamic-1&quot; width=&quot;454&quot; height=&quot;316&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above diagram works as an aim to help us understand the mapping relationship that exists in the VMPS server. As shown, each MAC address, which translates to a host on the network, is mapped to a VLAN, allowing this host to move inside the network, connecting to any switch that is part of the VMPS network and maintain its VLAN configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can now start to imagine the initial workload involved when configuring a VMPS server for a network of over 300 workstations:)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As one would expect, the above model works very well and also requires the switches to be in constant contact with the VMPS server, requesting configuration information everytime a host connects to a switch participating in the VLAN network. Of course, there is a lot more information we can use to configure the VMPS database, but we won't be covering that just as yet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Like all network services offered, Cisco has cleverly designed this model to be as flexible as our network might require. For example, you are able to connect more than one host on one dynamically configured port, as long as all hosts are part of the same VLAN:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-2.gif&quot; alt=&quot;vlans-designing-vlans-dynamic-2&quot; width=&quot;350&quot; height=&quot;355&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram above shows us a VLAN capable switch that has been configured to support Dynamic VLANs. On port No.5, we have connected a simple switch (not VLAN aware) from which another 4 workstations are connected.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned previously, this type of configuration is valid and therefore supported, but it also has its restrictions and limitations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the restrictions, which by the way can also be considered as a semi-security feature, is that all workstations connected to the same port, must be configured in the VMPS server as part of the same VLAN, otherwise the port is most likely to shut down as a security precaution.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To consider the limitations of this configuration: if the switch detects more than 20 active hosts (20 MAC addresses) on the port, it will once again shut it down, leaving the workstations without any network connection. When this happens, the port that shuts down will return into an isolated state, not belonging to any VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The fact is that Dynamic VLANs are really not suitable for every network, even though they allow a great deal of flexibility and security. If you consider the advantage one single feature of Dynamic VLANs can provide you with, then it might be all you need to implement them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because each host connected to the switch is checked against the VMPS database for its VLAN membership before the port is activated and assigned to a VLAN, this gives the network administrator the ability to ensure no foreign host is able to walk up to a wall socket and simply plug their workstation to access the network, if his MAC address is not stored in the VMPS database. For a large scale network, this could be considered an ACE card under your sleeve.&lt;/p&gt;
&lt;h2&gt;Choosing Correct Switches&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One important factor we haven't yet mentioned is that you cannot run the VMPS server on a Cisco Catalyst 2900 or 3500 series. The Catalyst 4500 and upwards are able to act as a VMPS, and at the time of writing, this switch has reached its end of retail life. For those who have dealt with Cisco Catalyst switches in the past, you would know that a Catalyst 4500 is not the type of switch you would use in a 20 or 50 node network!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Catalyst 4500, 6500 series, are switches designed for enterprise networks, as such, they are built to be modular, easily expandable depending on your needs, and lastly, fully redundant because you can't have your core backbone switch failing when all other switches and network equipment are directly connected to it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We've added a few pictures of the Catalyst 6500 series for you to admire :)&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-3.jpg&quot; alt=&quot;vlans-designing-vlans-dynamic-3&quot; width=&quot;532&quot; height=&quot;194&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can clearly see the slots available that allow the Catalyst switches to expand and grow with your network. In the likely event you require more ports as your network expands, you simply buy a Fastethernet blade (some people call them 'slices') and insert it into an available slot!&lt;/p&gt;
&lt;h2&gt;Dynamic VLANs &amp;amp; FallBack VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another very interesting and smart feature Dynamic VLANs support is the fallback VLAN. This neat feature allows you to automatically configure a port to a VLAN specially created for workstations whose MAC address is not in the VMPS server. Consider company visitors or clients who require specific or restricted access to your network, they can freely connect to the network and have Internet access, alongside with limited rights on public directories.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the event the fallback VLAN has not been configured and the MAC address connected to the switch's port is unknown, the VMPS server will send an 'access-denied' response, blocking access to the network, but the port will remain active. If the VMPS server is running in 'secure-mode', it will proceed and shutdown the port as an additional security measure.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-4.gif&quot; alt=&quot;vlans-designing-vlans-dynamic-4&quot; width=&quot;500&quot; height=&quot;438&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above diagram represents a portion of a large scale network using a Cisco 6500 Catalyst as the core switch. The switch has been configured to support Dynamic VLANs, therefore a VMPS server has been configured inside the switch, alongside with a DHCP server for each created VLAN. The administrator has already assigned the 3 workstations MAC addresses to the VLANs shown and also created the fallback VLAN for any MAC address that does not exist in the database.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now consider this interesting scenario: One morning a visitor arrives in the office and requires Internet connection so he can demonstate a new product to the management. As an administrator, you've already configured a fallback VLAN with a DHCP server activated for the VLAN, pushing the necessary settings to the clients so they may obtain Internet access services.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The visitor finds a free RJ-45 socket on the wall, which connects to a Catalyst 3550 switch nearby, and plugs in his laptop. Before the user is allowed to access the network, the Cisco 3550 switch checks the laptop's MAC address and reads 4B:63:3F:A2:3E:F9. At this point, the port is blocked, not allowing the laptop computer to send or receive data. The Cisco 3550 switch sends the MAC address to the 6500 Catalyst switch which is acting as the VMPS server and it checks for an entry that matches the specified MAC address but is unable to find one.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Naturally, it determines that this a visitor, so it creates an entry for that MAC address to the fallback VLAN and sends the information back to the Cisco 3550 switch. The switch will then enable access to the port our visitor is connected to by configuring the port to the fallback VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the visitor's computer is configured to obtain an IP Address automatically, it will do so, once the operating system has booted. When this happens, the visitor's DHCP request will arrive to the 6500 Catalyst switch and its DHCP server will send the requested information, enabling the client (our visitor) to configure itself with all the parameters required to access the VLAN. This will also mean our visitor is now able to access the Internet!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finishing, if the computer is not configured for DHCP, the client must be advised with the correct network settings or asked to enable automatic IP configuration in their network properties.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The past pages could be considered as an 'eye-opener' for people who are new to the VLAN concept, and at the same time a 'quick-overview' for those who are well aware of their existence! We hope all your questions to this point have been answered, if not, they are most likely too advanced and will surely be answered in the pages that follow.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Previous - &lt;a href=&quot;https://www.firewall.cx/networking-topics/vlan-networks/designing-vlans/216-static-vlans.html&quot;&gt;Static VLANs&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/dynamic-vlans-intro.webp&quot; alt=&quot;Introduction to Dynamic VLANs&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/dynamic-vlans-intro.webp&quot; alt=&quot;dynamic vlans intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;dynamic vlans intro&quot; /&gt;Dynamic VLANs were introduced to grant the flexibility and complexity(!) that Static VLANs did not provide. Dynamic VLANs are quite rare because of their requirements and initial administrative overhead. As such, most administrators and network engineers tend to prefer Static VLANs.&lt;/p&gt;
&lt;h2&gt;Dynamic VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Dynamic VLANs, as opposed to Static VLANs, do not require the administrator to individually configure each port, but instead, a central server called the VMPS (VLAN Member Policy Server). The VMPS is used to handle the on-the-spot port configuration of every switch participating on the VLAN network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The VMPS server contains a database of all workstation MAC addresses, along with the associated VLAN the MAC address belongs to. This way, we essentially have a VLAN-to-MAC address mapping:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-1.gif&quot; alt=&quot;vlans-designing-vlans-dynamic-1&quot; width=&quot;454&quot; height=&quot;316&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above diagram works as an aim to help us understand the mapping relationship that exists in the VMPS server. As shown, each MAC address, which translates to a host on the network, is mapped to a VLAN, allowing this host to move inside the network, connecting to any switch that is part of the VMPS network and maintain its VLAN configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can now start to imagine the initial workload involved when configuring a VMPS server for a network of over 300 workstations:)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As one would expect, the above model works very well and also requires the switches to be in constant contact with the VMPS server, requesting configuration information everytime a host connects to a switch participating in the VLAN network. Of course, there is a lot more information we can use to configure the VMPS database, but we won't be covering that just as yet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Like all network services offered, Cisco has cleverly designed this model to be as flexible as our network might require. For example, you are able to connect more than one host on one dynamically configured port, as long as all hosts are part of the same VLAN:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-2.gif&quot; alt=&quot;vlans-designing-vlans-dynamic-2&quot; width=&quot;350&quot; height=&quot;355&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram above shows us a VLAN capable switch that has been configured to support Dynamic VLANs. On port No.5, we have connected a simple switch (not VLAN aware) from which another 4 workstations are connected.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned previously, this type of configuration is valid and therefore supported, but it also has its restrictions and limitations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the restrictions, which by the way can also be considered as a semi-security feature, is that all workstations connected to the same port, must be configured in the VMPS server as part of the same VLAN, otherwise the port is most likely to shut down as a security precaution.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To consider the limitations of this configuration: if the switch detects more than 20 active hosts (20 MAC addresses) on the port, it will once again shut it down, leaving the workstations without any network connection. When this happens, the port that shuts down will return into an isolated state, not belonging to any VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The fact is that Dynamic VLANs are really not suitable for every network, even though they allow a great deal of flexibility and security. If you consider the advantage one single feature of Dynamic VLANs can provide you with, then it might be all you need to implement them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because each host connected to the switch is checked against the VMPS database for its VLAN membership before the port is activated and assigned to a VLAN, this gives the network administrator the ability to ensure no foreign host is able to walk up to a wall socket and simply plug their workstation to access the network, if his MAC address is not stored in the VMPS database. For a large scale network, this could be considered an ACE card under your sleeve.&lt;/p&gt;
&lt;h2&gt;Choosing Correct Switches&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One important factor we haven't yet mentioned is that you cannot run the VMPS server on a Cisco Catalyst 2900 or 3500 series. The Catalyst 4500 and upwards are able to act as a VMPS, and at the time of writing, this switch has reached its end of retail life. For those who have dealt with Cisco Catalyst switches in the past, you would know that a Catalyst 4500 is not the type of switch you would use in a 20 or 50 node network!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Catalyst 4500, 6500 series, are switches designed for enterprise networks, as such, they are built to be modular, easily expandable depending on your needs, and lastly, fully redundant because you can't have your core backbone switch failing when all other switches and network equipment are directly connected to it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We've added a few pictures of the Catalyst 6500 series for you to admire :)&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-3.jpg&quot; alt=&quot;vlans-designing-vlans-dynamic-3&quot; width=&quot;532&quot; height=&quot;194&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can clearly see the slots available that allow the Catalyst switches to expand and grow with your network. In the likely event you require more ports as your network expands, you simply buy a Fastethernet blade (some people call them 'slices') and insert it into an available slot!&lt;/p&gt;
&lt;h2&gt;Dynamic VLANs &amp;amp; FallBack VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another very interesting and smart feature Dynamic VLANs support is the fallback VLAN. This neat feature allows you to automatically configure a port to a VLAN specially created for workstations whose MAC address is not in the VMPS server. Consider company visitors or clients who require specific or restricted access to your network, they can freely connect to the network and have Internet access, alongside with limited rights on public directories.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the event the fallback VLAN has not been configured and the MAC address connected to the switch's port is unknown, the VMPS server will send an 'access-denied' response, blocking access to the network, but the port will remain active. If the VMPS server is running in 'secure-mode', it will proceed and shutdown the port as an additional security measure.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-dynamic-4.gif&quot; alt=&quot;vlans-designing-vlans-dynamic-4&quot; width=&quot;500&quot; height=&quot;438&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above diagram represents a portion of a large scale network using a Cisco 6500 Catalyst as the core switch. The switch has been configured to support Dynamic VLANs, therefore a VMPS server has been configured inside the switch, alongside with a DHCP server for each created VLAN. The administrator has already assigned the 3 workstations MAC addresses to the VLANs shown and also created the fallback VLAN for any MAC address that does not exist in the database.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now consider this interesting scenario: One morning a visitor arrives in the office and requires Internet connection so he can demonstate a new product to the management. As an administrator, you've already configured a fallback VLAN with a DHCP server activated for the VLAN, pushing the necessary settings to the clients so they may obtain Internet access services.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The visitor finds a free RJ-45 socket on the wall, which connects to a Catalyst 3550 switch nearby, and plugs in his laptop. Before the user is allowed to access the network, the Cisco 3550 switch checks the laptop's MAC address and reads 4B:63:3F:A2:3E:F9. At this point, the port is blocked, not allowing the laptop computer to send or receive data. The Cisco 3550 switch sends the MAC address to the 6500 Catalyst switch which is acting as the VMPS server and it checks for an entry that matches the specified MAC address but is unable to find one.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Naturally, it determines that this a visitor, so it creates an entry for that MAC address to the fallback VLAN and sends the information back to the Cisco 3550 switch. The switch will then enable access to the port our visitor is connected to by configuring the port to the fallback VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the visitor's computer is configured to obtain an IP Address automatically, it will do so, once the operating system has booted. When this happens, the visitor's DHCP request will arrive to the 6500 Catalyst switch and its DHCP server will send the requested information, enabling the client (our visitor) to configure itself with all the parameters required to access the VLAN. This will also mean our visitor is now able to access the Internet!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finishing, if the computer is not configured for DHCP, the client must be advised with the correct network settings or asked to enable automatic IP configuration in their network properties.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The past pages could be considered as an 'eye-opener' for people who are new to the VLAN concept, and at the same time a 'quick-overview' for those who are well aware of their existence! We hope all your questions to this point have been answered, if not, they are most likely too advanced and will surely be answered in the pages that follow.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Previous - &lt;a href=&quot;https://www.firewall.cx/networking-topics/vlan-networks/designing-vlans/216-static-vlans.html&quot;&gt;Static VLANs&lt;/a&gt;&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>Static VLANs</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/static-vlans.html"/>
		<published>2011-05-30T02:17:37+10:00</published>
		<updated>2011-05-30T02:17:37+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/static-vlans.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/static-vlans-intro.webp&quot; alt=&quot;Introduction to Static VLANs&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/static-vlans-intro.webp&quot; alt=&quot;Introduction to static vlans&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to static vlans&quot; /&gt;VLANs are usually created by the network administrator, assigning each port of every switch to a VLAN. Depending on the network infrastructure and security policies, the assignment of VLANs can be implemented using two different methods: Static or Dynamic memberships - these two methods are also known as VLAN memberships.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each of these methods have their advantages and disadvantages and we will be analysing them in great depth to help you decide which would best suite your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Depending on the method used to assign the VLAN membership, the switch may require further configuration, but in most cases it's a pretty straight forward process. This page deals with Static VLANs while Dynamic VLANs are covered next.&lt;/p&gt;
&lt;h2&gt;Static VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Static VLAN membership is perhaps the most widely used method because of the relatively small administration overhead and security it provides. With Static VLANs, the administrator will assign each port of the switch to one VLAN. Once this is complete, they can simply connect each device or workstation to the appropriate port.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The picture below depicts an illustration of the above, where 4 ports have been configured for 4 different VLANs:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-static-1.gif&quot; alt=&quot;vlans-designing-vlans-static-1&quot; width=&quot;465&quot; height=&quot;264&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The screenshot above shows a Cisco switch (well, half of it :&amp;gt;) where ports 1, 2, 7 and 10 have been configured and assigned to VLANs 1, 5, 2 and 3 respectively.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point, we should remind you that these 4 VLANs are not able to communicate between each other without the use of a router as they are treated as 4 separate physical networks, regardless of the network addressing scheme used on each of them. However, we won't provide further detail on VLAN routing since it's covered later on.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Static VLANs are certainly more secure than traditional switches while also considerably easy to configure and monitor. As one would expect, all nodes belonging to a VLAN must also be part of the same logical network in order to communicate with one another. For example, on our switch above, if we assigned network 192.168.1.0/24 to VLAN 1, then all nodes connecting to ports assigned to VLAN 1 must use the same network address for them to communicate between each other, just as if this was an ordinary switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, Static VLANs have another strong point - you are able to control where your users move within a large network. By assigning specific ports on your switches throughout your network, you are able to control access and limit the network resources to which your users are able to use.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A good example would be a large network with multiple departments where any network administrator would want to control where the users can physically connect their workstation or laptop and which servers they are able to access.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following diagram shows a VLAN powered network where the switches have been configured with Static VLAN support.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-static-2.gif&quot; alt=&quot;vlans-designing-vlans-static-2&quot; width=&quot;550&quot; height=&quot;460&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The network diagram might look slightly complicated at first, but if you pay close attention to each switch, you will notice that it's quite simple - six switches with 6 VLANs configured- one VLAN per department, as shown. While each VLAN has one logical network assigned to it, the IT department has, in addition, placed one workstation in the following departments for support purposes: Management, R&amp;amp;D, and HR department.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The network administrator has assigned Port 1 (P1) on each department switch to VLAN 5 for the workstation belonging to the IT department, while the rest of the ports are assigned to the appropriate VLAN as shown in the diagram.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This setup allows the administrator to place any employee in the IT department, anywhere on the network, without worrying if the user will be able to connect and access the IT department's resources.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, if a user in any of the above departments e.g the Management department, decided to get smart by attempting to gain access to the IT department's network and resources by plugging his workstation to Port 1 of his department's switch. He surely wouldn't get far because his workstation would be configured for the 192.168.1.0 network (VLAN 1), while Port 1 requires him to use a 192.168.5.0 network address (VLAN 5). Logically, he would have to change his IP address to match the network he is trying to gain access to, and in this case this would be network 192.168.5.0.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To sum up, with Static VLANs, we assign each individual switch port to a VLAN. The network addresses are totally up to us to decide. In our example, the switches do not care what network address is used for each VLAN as they totally ignore this information unless routing is performed (this is covered in the InterVLAN routing page). As far as the switches are concerned, if you have two ports assigned to the same VLAN, then these two ports are able to communicate between each other as it would happen on any normal layer 2 switch.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Previous - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-comparison.html&quot; title=&quot;Comparing Old Flat Networks &amp;amp; VLAN Networks&quot;&gt;Comparing Old Flat Networks &amp;amp; VLAN Networks&lt;/a&gt;&amp;nbsp; Next - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/dynamic-vlans.html&quot; title=&quot;Dynamic VLANs&quot;&gt;Dynamic VLANs&lt;/a&gt;&lt;span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/static-vlans-intro.webp&quot; alt=&quot;Introduction to Static VLANs&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/static-vlans-intro.webp&quot; alt=&quot;Introduction to static vlans&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to static vlans&quot; /&gt;VLANs are usually created by the network administrator, assigning each port of every switch to a VLAN. Depending on the network infrastructure and security policies, the assignment of VLANs can be implemented using two different methods: Static or Dynamic memberships - these two methods are also known as VLAN memberships.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each of these methods have their advantages and disadvantages and we will be analysing them in great depth to help you decide which would best suite your network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Depending on the method used to assign the VLAN membership, the switch may require further configuration, but in most cases it's a pretty straight forward process. This page deals with Static VLANs while Dynamic VLANs are covered next.&lt;/p&gt;
&lt;h2&gt;Static VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Static VLAN membership is perhaps the most widely used method because of the relatively small administration overhead and security it provides. With Static VLANs, the administrator will assign each port of the switch to one VLAN. Once this is complete, they can simply connect each device or workstation to the appropriate port.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The picture below depicts an illustration of the above, where 4 ports have been configured for 4 different VLANs:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-static-1.gif&quot; alt=&quot;vlans-designing-vlans-static-1&quot; width=&quot;465&quot; height=&quot;264&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The screenshot above shows a Cisco switch (well, half of it :&amp;gt;) where ports 1, 2, 7 and 10 have been configured and assigned to VLANs 1, 5, 2 and 3 respectively.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point, we should remind you that these 4 VLANs are not able to communicate between each other without the use of a router as they are treated as 4 separate physical networks, regardless of the network addressing scheme used on each of them. However, we won't provide further detail on VLAN routing since it's covered later on.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Static VLANs are certainly more secure than traditional switches while also considerably easy to configure and monitor. As one would expect, all nodes belonging to a VLAN must also be part of the same logical network in order to communicate with one another. For example, on our switch above, if we assigned network 192.168.1.0/24 to VLAN 1, then all nodes connecting to ports assigned to VLAN 1 must use the same network address for them to communicate between each other, just as if this was an ordinary switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, Static VLANs have another strong point - you are able to control where your users move within a large network. By assigning specific ports on your switches throughout your network, you are able to control access and limit the network resources to which your users are able to use.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A good example would be a large network with multiple departments where any network administrator would want to control where the users can physically connect their workstation or laptop and which servers they are able to access.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following diagram shows a VLAN powered network where the switches have been configured with Static VLAN support.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-vlans-static-2.gif&quot; alt=&quot;vlans-designing-vlans-static-2&quot; width=&quot;550&quot; height=&quot;460&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The network diagram might look slightly complicated at first, but if you pay close attention to each switch, you will notice that it's quite simple - six switches with 6 VLANs configured- one VLAN per department, as shown. While each VLAN has one logical network assigned to it, the IT department has, in addition, placed one workstation in the following departments for support purposes: Management, R&amp;amp;D, and HR department.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The network administrator has assigned Port 1 (P1) on each department switch to VLAN 5 for the workstation belonging to the IT department, while the rest of the ports are assigned to the appropriate VLAN as shown in the diagram.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This setup allows the administrator to place any employee in the IT department, anywhere on the network, without worrying if the user will be able to connect and access the IT department's resources.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, if a user in any of the above departments e.g the Management department, decided to get smart by attempting to gain access to the IT department's network and resources by plugging his workstation to Port 1 of his department's switch. He surely wouldn't get far because his workstation would be configured for the 192.168.1.0 network (VLAN 1), while Port 1 requires him to use a 192.168.5.0 network address (VLAN 5). Logically, he would have to change his IP address to match the network he is trying to gain access to, and in this case this would be network 192.168.5.0.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To sum up, with Static VLANs, we assign each individual switch port to a VLAN. The network addresses are totally up to us to decide. In our example, the switches do not care what network address is used for each VLAN as they totally ignore this information unless routing is performed (this is covered in the InterVLAN routing page). As far as the switches are concerned, if you have two ports assigned to the same VLAN, then these two ports are able to communicate between each other as it would happen on any normal layer 2 switch.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Previous - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-comparison.html&quot; title=&quot;Comparing Old Flat Networks &amp;amp; VLAN Networks&quot;&gt;Comparing Old Flat Networks &amp;amp; VLAN Networks&lt;/a&gt;&amp;nbsp; Next - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/dynamic-vlans.html&quot; title=&quot;Dynamic VLANs&quot;&gt;Dynamic VLANs&lt;/a&gt;&lt;span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>Comparing Traditional Flat &amp; VLAN Networks</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-comparison.html"/>
		<published>2011-05-30T01:37:01+10:00</published>
		<updated>2011-05-30T01:37:01+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-comparison.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-comparison-intro.webp&quot; alt=&quot;Comparing Traditional Flat Networks &amp;amp; VLAN Networks&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-comparison-intro.webp&quot; alt=&quot;Comparing flat and VLAN networks&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Comparing flat and VLAN networks&quot; /&gt;Designing and building a network is not a simple job. VLANs are no exception to this rule, in fact they require a more sophisticated approach because of the variety of protocols used to maintain and administer them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Our aim here is not to tell you how to setup your VLANs and what you should or shouldn't do, this will be covered later on. For now, we would like to show you different physical VLAN layouts to help you recognise the benefits offered when introducing this technology into your network, regardless of its size.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The technology is available and we simply need to figure out how to use it and implement it using the best possible methods, in order to achieve outstanding performance and reliability.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We understand that every network is unique as far as its resources and requirements are concerned, which is another reason why we will take a look at a few different VLAN implementations. However, we will not mention the method used to set them up - this is up to you to decide once you've read the following pages!&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Designing your First VLAN&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most common VLAN setups involve grouping departments together regardless of their physical placement through the network. This allows us to centralise the administration for these departments, while also limiting unwanted incidents of unauthorised access to resources of high importance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As always, we will be using neat examples and diagrams to help you get a visual on what we are talking about.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's consider the following company: Packet Industries&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Packet Industries is a large scale company with over 40 workstations and 5 servers. The company deals with packet analysis and data recovery and has labs to recover data from different media that require special treatment due to their sensitivity. As with every other company, there are quite a few different departments that deal with different aspects of the business and these are:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Management/HR Department&lt;/li&gt;
&lt;li&gt;Accounting Department&lt;/li&gt;
&lt;li&gt;Data Recovery &amp;amp; IT Department&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These five departments are spread throughout 3 floors in the building the company is situated. Because the IT department takes confidentiality of their own and customer's data seriously, they have decided to redesign their network and also take a look at the VLAN solutions available, to see if they are worth the investment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We are going to provide two different scenarios here, the first one will not include VLANs, while the second one will. Comparing the two different solutions will help you see the clear advantages of VLANs and also provide an insight to how you can also apply this wonderful technology with other similar networks you might be working with.&lt;/p&gt;
&lt;h2&gt;Solution 1 - Without VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The IT department decided that the best way to deal with the security issue would be to divide the existing network by partitioning it. Each department would reside in one broadcast domain and access lists would be placed between each network's boundaries to ensure access to and from them are limited according to the access policies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since there are three departments, it is important that three new networks had to be created to accommodate their new design. The budget, as in most cases, had to be controlled so it didn't exceed the amount granted by the Accounting Department.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With all the above in mind, here's the proposal the IT department created:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-intro-1.gif&quot; alt=&quot;vlans-designing-intro-1&quot; width=&quot;550&quot; height=&quot;486&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, each department has been assigned a specific network. Each level has a dedicated switch for every network available. As a result, this will increase the network security since we have separate physical networks and this solution also seems to be the most logical one. These switches are then grouped together via the network backbone which, in its turn, connects to the network's main router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The router here undertakes the complex role of controlling access and routing between the networks and servers with the use of access lists as they have been created by the IT Department. If needed, the router can also be configured to allow certain IP's to be routed between the three networks, should there be such a requirement.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above implementation is quite secure as there are physical and logical restrictions placed at every level. However, it is somewhat restrictive as far as expanding and administering the network since there is no point of central control. Lastly, if you even consider adding full redundancy to the above, essentially doubling the amount of equipment required, the cost would clearly be unreasonable...&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So let's now take a look at the second way we could implement the above, without blowing the budget, without compromising our required security level and also at the same time create a flexible and easily expandable network backbone.&lt;/p&gt;
&lt;h2&gt;Solution 2 - With VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The solution we are about to present here is surely the most preferred and economical. The reasons should be fairly straight forward: We get the same result as the previous solution, at almost half the cost and as a bonus, we get the flexibility and expandability we need for the future growth of our network, which was very limited in our previous example.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By putting the VLAN concept we covered on the previous page into action, you should be able to visualise the new setup:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-intro-2.gif&quot; alt=&quot;vlans-designing-intro-2&quot; width=&quot;550&quot; height=&quot;486&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, the results in this example are a lot neater and the most apparent change would be the presence of a single switch per level, connecting directly to the network backbone. These switches of course are VLAN capable, and have been configured to support the three separate logical and physical networks. The router from the previous solution has been replaced by what we call a 'layer 3 switch'.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These type of switches are very intelligent and understand layer 3 (IP Layer) traffic. With such a switch, you are able to apply access-lists to restrict access between the networks, just like you normally would on a router, but more importantly, route packets from one logical network to another! In simple terms, layer 3 switches are a combination of a powerful switch, with a built-in router :)&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the above example was interesting and provided a insight into the field of VLANs, we can assure you - you haven't seen anything yet. When unleashing the power of VLANs, there are amazing solutions given for any problem or need that your network requires.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It's now time to start looking at the VLAN technology in a bit more detail, that is, how it's configured, the postive and negative areas for each type of VLAN configuration and more much.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The next page analyses Static VLANs which are perhaps the most popular implementation of VLANs around the world. Take a quick break for some fresh air if needed, otherwise, gear up and let's move!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Next - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/static-vlans.html&quot;&gt;Static VLANs&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/vlan-comparison-intro.webp&quot; alt=&quot;Comparing Traditional Flat Networks &amp;amp; VLAN Networks&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlan-comparison-intro.webp&quot; alt=&quot;Comparing flat and VLAN networks&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Comparing flat and VLAN networks&quot; /&gt;Designing and building a network is not a simple job. VLANs are no exception to this rule, in fact they require a more sophisticated approach because of the variety of protocols used to maintain and administer them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Our aim here is not to tell you how to setup your VLANs and what you should or shouldn't do, this will be covered later on. For now, we would like to show you different physical VLAN layouts to help you recognise the benefits offered when introducing this technology into your network, regardless of its size.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The technology is available and we simply need to figure out how to use it and implement it using the best possible methods, in order to achieve outstanding performance and reliability.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We understand that every network is unique as far as its resources and requirements are concerned, which is another reason why we will take a look at a few different VLAN implementations. However, we will not mention the method used to set them up - this is up to you to decide once you've read the following pages!&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Designing your First VLAN&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most common VLAN setups involve grouping departments together regardless of their physical placement through the network. This allows us to centralise the administration for these departments, while also limiting unwanted incidents of unauthorised access to resources of high importance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As always, we will be using neat examples and diagrams to help you get a visual on what we are talking about.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's consider the following company: Packet Industries&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Packet Industries is a large scale company with over 40 workstations and 5 servers. The company deals with packet analysis and data recovery and has labs to recover data from different media that require special treatment due to their sensitivity. As with every other company, there are quite a few different departments that deal with different aspects of the business and these are:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Management/HR Department&lt;/li&gt;
&lt;li&gt;Accounting Department&lt;/li&gt;
&lt;li&gt;Data Recovery &amp;amp; IT Department&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These five departments are spread throughout 3 floors in the building the company is situated. Because the IT department takes confidentiality of their own and customer's data seriously, they have decided to redesign their network and also take a look at the VLAN solutions available, to see if they are worth the investment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We are going to provide two different scenarios here, the first one will not include VLANs, while the second one will. Comparing the two different solutions will help you see the clear advantages of VLANs and also provide an insight to how you can also apply this wonderful technology with other similar networks you might be working with.&lt;/p&gt;
&lt;h2&gt;Solution 1 - Without VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The IT department decided that the best way to deal with the security issue would be to divide the existing network by partitioning it. Each department would reside in one broadcast domain and access lists would be placed between each network's boundaries to ensure access to and from them are limited according to the access policies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since there are three departments, it is important that three new networks had to be created to accommodate their new design. The budget, as in most cases, had to be controlled so it didn't exceed the amount granted by the Accounting Department.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With all the above in mind, here's the proposal the IT department created:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-intro-1.gif&quot; alt=&quot;vlans-designing-intro-1&quot; width=&quot;550&quot; height=&quot;486&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, each department has been assigned a specific network. Each level has a dedicated switch for every network available. As a result, this will increase the network security since we have separate physical networks and this solution also seems to be the most logical one. These switches are then grouped together via the network backbone which, in its turn, connects to the network's main router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The router here undertakes the complex role of controlling access and routing between the networks and servers with the use of access lists as they have been created by the IT Department. If needed, the router can also be configured to allow certain IP's to be routed between the three networks, should there be such a requirement.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above implementation is quite secure as there are physical and logical restrictions placed at every level. However, it is somewhat restrictive as far as expanding and administering the network since there is no point of central control. Lastly, if you even consider adding full redundancy to the above, essentially doubling the amount of equipment required, the cost would clearly be unreasonable...&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So let's now take a look at the second way we could implement the above, without blowing the budget, without compromising our required security level and also at the same time create a flexible and easily expandable network backbone.&lt;/p&gt;
&lt;h2&gt;Solution 2 - With VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The solution we are about to present here is surely the most preferred and economical. The reasons should be fairly straight forward: We get the same result as the previous solution, at almost half the cost and as a bonus, we get the flexibility and expandability we need for the future growth of our network, which was very limited in our previous example.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By putting the VLAN concept we covered on the previous page into action, you should be able to visualise the new setup:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-designing-intro-2.gif&quot; alt=&quot;vlans-designing-intro-2&quot; width=&quot;550&quot; height=&quot;486&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, the results in this example are a lot neater and the most apparent change would be the presence of a single switch per level, connecting directly to the network backbone. These switches of course are VLAN capable, and have been configured to support the three separate logical and physical networks. The router from the previous solution has been replaced by what we call a 'layer 3 switch'.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These type of switches are very intelligent and understand layer 3 (IP Layer) traffic. With such a switch, you are able to apply access-lists to restrict access between the networks, just like you normally would on a router, but more importantly, route packets from one logical network to another! In simple terms, layer 3 switches are a combination of a powerful switch, with a built-in router :)&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the above example was interesting and provided a insight into the field of VLANs, we can assure you - you haven't seen anything yet. When unleashing the power of VLANs, there are amazing solutions given for any problem or need that your network requires.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It's now time to start looking at the VLAN technology in a bit more detail, that is, how it's configured, the postive and negative areas for each type of VLAN configuration and more much.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The next page analyses Static VLANs which are perhaps the most popular implementation of VLANs around the world. Take a quick break for some fresh air if needed, otherwise, gear up and let's move!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Next - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/static-vlans.html&quot;&gt;Static VLANs&lt;/a&gt;&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
	<entry>
		<title>The VLAN Concept - Introduction to VLANs</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/vlan-networks/vlan-concept.html"/>
		<published>2011-05-30T01:20:45+10:00</published>
		<updated>2011-05-30T01:20:45+10:00</updated>
		<id>https://www.firewall.cx/networking/vlan-networks/vlan-concept.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/vlans-concept-intro.webp&quot; alt=&quot;Introduction to VLAN Networks&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-intro.webp&quot; alt=&quot;vlans concept intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vlans concept intro&quot; /&gt;We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Network (LAN) we once knew starts to take a different shape. And yet, for some of us, the concept of what VLANs are and how they work might still be a bit blurry.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help start clearing things up we will define the VLAN concept not only through words, but through the use of our cool diagrams and at the same time, compare VLANs to our standard flat switched network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will start by taking a quick look at a normal switched network, pointing out it's main characteristics and then move on to VLANs.&lt;/p&gt;
&lt;h2&gt;The Traditional Switched Network&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Almost every network today has a switch interconnecting all network nodes, providing a fast and reliable way for the nodes to communicate. Switches today are what hubs were a while back - the most common and necessary equipment in our network, and there is certainly no doubt about that.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While switches might be adequate for most type of networks, they prove inadequate for mid to large sized networks where things are not as simple as plugging a switch into the power outlet and hanging a few Pc's from it!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For those of you who have already read our &quot;switches and bridges&quot; section, you will be well aware that switches are layer 2 devices which create a flat network:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-1.gif&quot; alt=&quot;vlans-concept-1&quot; width=&quot;419&quot; height=&quot;272&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above network diagram illustrates a switch with 3 workstations connected. These workstations are able to communicate with each other and are part of the same broadcast domain, meaning that if one workstation were to send a broadcast, the rest will receive it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a small network multiple broadcast might not be too much of a problem, but as the size of the network increases, so will the broadcasts, up to the point where they start to become a big problem, flooding the network with garbage (most of the times!) and consuming valuable bandwidth.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To visually understand the problem, but also the idea of a large flat network, observe the diagram below:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-2.gif&quot; alt=&quot;vlans-concept-2&quot; width=&quot;482&quot; height=&quot;215&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The problem here starts to become evident as we populate the network with more switches and workstations. Since most workstations tend to be loaded with the Windows operating system, this will result in unavoidable broadcasts being sent occasionaly on the network wire - something we certainly want to avoid.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another major concern is security. In the above network, all users are able to see all devices. In a much larger network containing critical file servers, databases and other confidential information, this would mean that everyone would have network access to these servers and naturally, they would be more susceptible to an attack.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To effectively protect such systems from your network you would need to restrict access at the network level by segmenting the exisiting network or simply placing a firewall in front of each critical system, but the cost and complexity will surely make most administrators think twice about it. Thankfully there is a solution ..... simply keep reading.&lt;/p&gt;
&lt;h2&gt;Introducing VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Welcome to the wonderful world of VLANs!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All the above problems, and a lot more, can be forgotten with the creation of VLANs...well, to some extent at least.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As most of you are already aware, in order to create (and work with) VLANs, you need a layer 2 switch that supports them. A lot of people new to the networking field bring the misconception that it's a matter of simply installing additional software on the clients or switch, in order to &quot;enable&quot; VLANs throughout the network - this is totally incorrect!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because VLANs involve millions of mathematical calculations, they require special hardware which is built into the switch and your switch must therefore support VLANs at the time of purchase, otherwise you will not be able to create VLANs on it!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each VLAN created on a switch is a separate network. This means that a separate broadcast domain is created for each VLAN that exists. Network broadcasts, by default, are filtered from all ports on a switch that are not members of the same VLAN and this is why VLANs are very common in today's large network as they help isolate network segments between each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help create the visual picture on how VLANs differentiate from switches, consider the following diagram:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-3.gif&quot; alt=&quot;vlans-concept-3&quot; width=&quot;509&quot; height=&quot;267&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we have here is a small network with 6 workstations attached to a VLAN capable switch. The switch has been programmed with 2 VLANs, VLAN1 and VLAN2 respectfully, and 3 workstations have been assigned to each VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VLAN Configuration&lt;/strong&gt; for Cisco Layer 3 switches is covered at the following article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;VLANs = Separate Broadcast Domains&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the creation of our VLANs, we have also created 2 broadcast domains. This mean that if any workstation in either VLAN sends a broadcast, it will propagate out the ports which belong to the same VLAN as the workstation that generated the broadcast:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-4.gif&quot; alt=&quot;vlans-concept-4&quot; width=&quot;509&quot; height=&quot;275&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This is clearly illustrated in the diagram above where Workstation 1, belonging to VLAN1, sends a network broadcast (FF:FF:FF:FF:FF:FF). The switch receives this broadcast and forwards it to Workstation 2 and 3, just as it would happen if these three workstations were connected to a normal switch, while the workstations belonging to VLAN2 are totally unaware of the broadcast sent in VLAN1 as they do not receive any packets flowing in that network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To help clear any questions or doubts on how the above setup works, the diagram below shows the logical equivalent setup of our example network:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-5.gif&quot; alt=&quot;vlans-concept-5&quot; width=&quot;482&quot; height=&quot;215&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By this stage, you should begin seeing the clear advantages offered by the use of VLANs within your network. Security, cost and network traffic are reduced as more hosts are added to the network and the number of VLANs are increased.&lt;/p&gt;
&lt;h2&gt;VLANs Help Reduce Networking Costs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To briefly touch upon the financial side of things, let's take an example to see exactly how we are saving money by using VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Consider you're the network administrator for a large company and you have been asked to split the existing network infrastructure into 12 seperate networks, but without the possibility of these new networks to communicate between each other. Since the cabling is already in place, we need to simply group the ports of each network we create to one physical switch and for the 12 network, a total of 12 switches will be required.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By using VLANs, the above task would be possible with one or more VLAN capable switches that will cover the number of hosts we need to connect to them, and the cost would surely be a lot less than that compared to 12 switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During the implementation of the above task, you would connect all workstations to the switch and then assign the appropriate workstations/nodes to their respectful VLAN, creating a total of 12 VLANs. It is worth noting here that most entry level VLAN switches e.g Cisco 2900 series, are capable of handling up to 64 VLANs, so if we were to use these switches, we would still have plently of room to create more.&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 595px; height: 160px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 321px;&quot; bgcolor=&quot;#003300&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Switch Model&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 113px;&quot; bgcolor=&quot;#660000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Maximum VLANs Supported&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 139px;&quot; bgcolor=&quot;#000033&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;VLAN Trunking Supported&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 2912 XL, Catalyst 2924 XL &amp;amp;&lt;br /&gt;Catalyst 2924C XL&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;64&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 2900 LRE XL&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;250&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 2912M and Catalyst 2924M modular&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;250&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 3500 XL, 3550, 3560, 3750, 4500, 6500&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;250&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are a lot more examples one can use to show how these new generation switches are able to solve complex network designs, security issues and at the same time, keep the budget low. Lastly, the best example is one that is able to solve your own requirements, so take a minute to think about it and you will surely agree.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This page introduced the concept of VLANs and indicated the differences existing between them and normal switched networks. We also briefly examined their efficiency in terms of cost, security and implementation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The information here serves as an introduction to the VLAN technology and we will now start diving deeper into the topic, analysing it in greater detail. Having said that, our next page deals with the design of VLANs, showing different logical and physical configurations of VLANs within networks. So, make yourself comfortable and let's continue cause there is still so much to cover!&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Next - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; title=&quot;VLANs - Access &amp;amp; Trunk Links&quot;&gt;VLANs - Access &amp;amp; Trunk Links&lt;/a&gt; or Back to&lt;a href=&quot;https://www.firewall.cx/networking-topics/vlan-networks.html&quot; title=&quot;Back to VLAN Network section&quot;&gt; VLAN Networks&lt;/a&gt; Section&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/vlans-concept-intro.webp&quot; alt=&quot;Introduction to VLAN Networks&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-intro.webp&quot; alt=&quot;vlans concept intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vlans concept intro&quot; /&gt;We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Network (LAN) we once knew starts to take a different shape. And yet, for some of us, the concept of what VLANs are and how they work might still be a bit blurry.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help start clearing things up we will define the VLAN concept not only through words, but through the use of our cool diagrams and at the same time, compare VLANs to our standard flat switched network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will start by taking a quick look at a normal switched network, pointing out it's main characteristics and then move on to VLANs.&lt;/p&gt;
&lt;h2&gt;The Traditional Switched Network&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Almost every network today has a switch interconnecting all network nodes, providing a fast and reliable way for the nodes to communicate. Switches today are what hubs were a while back - the most common and necessary equipment in our network, and there is certainly no doubt about that.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While switches might be adequate for most type of networks, they prove inadequate for mid to large sized networks where things are not as simple as plugging a switch into the power outlet and hanging a few Pc's from it!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For those of you who have already read our &quot;switches and bridges&quot; section, you will be well aware that switches are layer 2 devices which create a flat network:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-1.gif&quot; alt=&quot;vlans-concept-1&quot; width=&quot;419&quot; height=&quot;272&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above network diagram illustrates a switch with 3 workstations connected. These workstations are able to communicate with each other and are part of the same broadcast domain, meaning that if one workstation were to send a broadcast, the rest will receive it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In a small network multiple broadcast might not be too much of a problem, but as the size of the network increases, so will the broadcasts, up to the point where they start to become a big problem, flooding the network with garbage (most of the times!) and consuming valuable bandwidth.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To visually understand the problem, but also the idea of a large flat network, observe the diagram below:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-2.gif&quot; alt=&quot;vlans-concept-2&quot; width=&quot;482&quot; height=&quot;215&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The problem here starts to become evident as we populate the network with more switches and workstations. Since most workstations tend to be loaded with the Windows operating system, this will result in unavoidable broadcasts being sent occasionaly on the network wire - something we certainly want to avoid.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another major concern is security. In the above network, all users are able to see all devices. In a much larger network containing critical file servers, databases and other confidential information, this would mean that everyone would have network access to these servers and naturally, they would be more susceptible to an attack.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To effectively protect such systems from your network you would need to restrict access at the network level by segmenting the exisiting network or simply placing a firewall in front of each critical system, but the cost and complexity will surely make most administrators think twice about it. Thankfully there is a solution ..... simply keep reading.&lt;/p&gt;
&lt;h2&gt;Introducing VLANs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Welcome to the wonderful world of VLANs!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All the above problems, and a lot more, can be forgotten with the creation of VLANs...well, to some extent at least.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As most of you are already aware, in order to create (and work with) VLANs, you need a layer 2 switch that supports them. A lot of people new to the networking field bring the misconception that it's a matter of simply installing additional software on the clients or switch, in order to &quot;enable&quot; VLANs throughout the network - this is totally incorrect!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because VLANs involve millions of mathematical calculations, they require special hardware which is built into the switch and your switch must therefore support VLANs at the time of purchase, otherwise you will not be able to create VLANs on it!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each VLAN created on a switch is a separate network. This means that a separate broadcast domain is created for each VLAN that exists. Network broadcasts, by default, are filtered from all ports on a switch that are not members of the same VLAN and this is why VLANs are very common in today's large network as they help isolate network segments between each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help create the visual picture on how VLANs differentiate from switches, consider the following diagram:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-3.gif&quot; alt=&quot;vlans-concept-3&quot; width=&quot;509&quot; height=&quot;267&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we have here is a small network with 6 workstations attached to a VLAN capable switch. The switch has been programmed with 2 VLANs, VLAN1 and VLAN2 respectfully, and 3 workstations have been assigned to each VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VLAN Configuration&lt;/strong&gt; for Cisco Layer 3 switches is covered at the following article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html&quot; target=&quot;_blank&quot; title=&quot;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&quot;&gt;Basic &amp;amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security – VLAN Hopping, VTP Configuration, Trunk Links, NTP. IOS License Requirements for SVI Routing.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;VLANs = Separate Broadcast Domains&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the creation of our VLANs, we have also created 2 broadcast domains. This mean that if any workstation in either VLAN sends a broadcast, it will propagate out the ports which belong to the same VLAN as the workstation that generated the broadcast:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-4.gif&quot; alt=&quot;vlans-concept-4&quot; width=&quot;509&quot; height=&quot;275&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This is clearly illustrated in the diagram above where Workstation 1, belonging to VLAN1, sends a network broadcast (FF:FF:FF:FF:FF:FF). The switch receives this broadcast and forwards it to Workstation 2 and 3, just as it would happen if these three workstations were connected to a normal switch, while the workstations belonging to VLAN2 are totally unaware of the broadcast sent in VLAN1 as they do not receive any packets flowing in that network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To help clear any questions or doubts on how the above setup works, the diagram below shows the logical equivalent setup of our example network:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/vlans-concept-5.gif&quot; alt=&quot;vlans-concept-5&quot; width=&quot;482&quot; height=&quot;215&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By this stage, you should begin seeing the clear advantages offered by the use of VLANs within your network. Security, cost and network traffic are reduced as more hosts are added to the network and the number of VLANs are increased.&lt;/p&gt;
&lt;h2&gt;VLANs Help Reduce Networking Costs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To briefly touch upon the financial side of things, let's take an example to see exactly how we are saving money by using VLANs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Consider you're the network administrator for a large company and you have been asked to split the existing network infrastructure into 12 seperate networks, but without the possibility of these new networks to communicate between each other. Since the cabling is already in place, we need to simply group the ports of each network we create to one physical switch and for the 12 network, a total of 12 switches will be required.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By using VLANs, the above task would be possible with one or more VLAN capable switches that will cover the number of hosts we need to connect to them, and the cost would surely be a lot less than that compared to 12 switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During the implementation of the above task, you would connect all workstations to the switch and then assign the appropriate workstations/nodes to their respectful VLAN, creating a total of 12 VLANs. It is worth noting here that most entry level VLAN switches e.g Cisco 2900 series, are capable of handling up to 64 VLANs, so if we were to use these switches, we would still have plently of room to create more.&lt;/p&gt;
&lt;table border=&quot;1&quot; style=&quot;width: 595px; height: 160px;&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 321px;&quot; bgcolor=&quot;#003300&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Switch Model&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 113px;&quot; bgcolor=&quot;#660000&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;Maximum VLANs Supported&lt;/span&gt;&lt;/th&gt;&lt;th scope=&quot;col&quot; style=&quot;width: 139px;&quot; bgcolor=&quot;#000033&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;VLAN Trunking Supported&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 2912 XL, Catalyst 2924 XL &amp;amp;&lt;br /&gt;Catalyst 2924C XL&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;64&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 2900 LRE XL&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;250&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 2912M and Catalyst 2924M modular&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;250&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td scope=&quot;row&quot;&gt;Catalyst 3500 XL, 3550, 3560, 3750, 4500, 6500&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;250&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;div align=&quot;center&quot;&gt;yes&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are a lot more examples one can use to show how these new generation switches are able to solve complex network designs, security issues and at the same time, keep the budget low. Lastly, the best example is one that is able to solve your own requirements, so take a minute to think about it and you will surely agree.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This page introduced the concept of VLANs and indicated the differences existing between them and normal switched networks. We also briefly examined their efficiency in terms of cost, security and implementation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The information here serves as an introduction to the VLAN technology and we will now start diving deeper into the topic, analysing it in greater detail. Having said that, our next page deals with the design of VLANs, showing different logical and physical configurations of VLANs within networks. So, make yourself comfortable and let's continue cause there is still so much to cover!&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Next - &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html&quot; title=&quot;VLANs - Access &amp;amp; Trunk Links&quot;&gt;VLANs - Access &amp;amp; Trunk Links&lt;/a&gt; or Back to&lt;a href=&quot;https://www.firewall.cx/networking-topics/vlan-networks.html&quot; title=&quot;Back to VLAN Network section&quot;&gt; VLAN Networks&lt;/a&gt; Section&lt;/p&gt;</content>
		<category term="VLAN Networks" />
	</entry>
</feed>
