Virtual LAN for Beginners

Virtual LAN(VLAN) & It’s Concepts
VLAN- Virtual LAN is being used for virtually or logically segregating or separating the local LAN according to the requirement.
Reasons behind the creation of multiple VLANs or what we will achieve by creating different VLANs.
  1. We can separate the Broadcast domain according to the dept./floor or any other parameter, which will reduce the broadcast propagation to a limited number of users. This will reduce the network and processing overhead of the switching device.
  1. We can apply security policies i.e access control rules as per each VLAN requirement and have different rules or policies for different VLAN.
  2. Creating Multiple VLANs will increase the scalability of the network and make the troubleshooting easy.
  3. Even, we can use different QoS Policies in different VLANs for classification or marking of different VLANs.
How many types of ports are there in a VLAN:

Types of L2 Port:

  1. Access Port- This can allow only one VLAN and used to connect a Laptop or Desktop.
  2. Trunk Port(Called as Tagged Port in Non-cisco environment) – This can allow multiple VLANs and generally used to connect a different network device or a Server which hosts VMs from multiple VLANs.
  3. Voice VLAN Port- This is a type of access port but in this type of port two VLANs can be allowed i.e one access VLAN and one Voice VLAN. These types of ports are being used for the laptops or desktops to be connected via IP Phone.
Types of L3 Port:
  1. Switch Virtual Interface(SVI) – A virtual L3 Interface associated with a VLAN in a switching device.
  2. Bridge Virtual Interface(BVI) – A virtual L3 Interface associated with a Bridge Group in a routing device.
How many types of  ports are available based on DTP(Dynamic Trunking Protocol):
  1. Access- No trunking, will not send DTP, only access to a single VLAN
  2. Trunk- Trunk is On, will still send DTP for negotiation
  3. Dynamic Auto- Allowed to receive DTP but will not send DTP, If receives DTP then will form trunk otherwise access
  4. Dynamic Desirable- Will send DTP but negotiation depends on what receives.
  5. Non-negotiate – does not send DTP, will only form trunk based on Hard coding.
Formation of the trunk can be possible in below way:
  1. Trunk-Trunk –> will form the trunk
  2. Trunk-Auto –> will form the trunk
  3. Trunk-Desirable –> will form the trunk
  4. Desirable-Desirable –> will form the trunk
  5. Desirable-Auto –> will form the trunk
  6. Desirable-Non-Negotiate –> will not form the trunk
  7. Auto-Non-negotiate –> will not form the trunk
  8. Trunk-Non-negotiate –> will form the trunk if Non-negotiate end configured as a trunk
  9. Non-Negotiate-Non-negotiate –>  will form the trunk if both Non-negotiate ends configured as a trunk
  10. Auto-Auto –> will not form the trunk
What is a Native VLAN?
Native VLAN is a concept available in 802.1q. The concept of native VLAN is if a trunk port receives a frame which is not tagged then it will allow that packet to traverse in a specific VLAN, by default VLAN1 is the Native VLAN in Cisco Switches.
Native VLAN can be a security vulnerability if it is not properly configured in your network.

In the case of Access port, frames are always untagged. So, if you connect two Cisco switches over access ports and one end is in one Access VLAN and the other end is in another Access VLAN then you can leak the traffic from one VLAN to another but if your CDP is enabled then you will receive a message of Native VLAN mismatch.

I hope this helps you guys. If you like it then do not forget to hit the like button and share it with your friends and family.

All the best Guys.

Cheers,
Maddy

Architect/Consultant in IT/Telecom/Networking Support Industry with over 13+ years of Experience. Mainly working with Cisco Products other than Cisco worked with VMware NSX/Juniper/Riverbed/Meraki & Citrix Products, and worked with various clients like PSU Banks, Petroleum Corporations, different government sector clients, BPO Sector, Telecom NOC and ISP. Global Certifications: VMware vSphere Foundation 6 CCNA Routing & Switching CCNP Routing & Switching ITIL V3 Foundation RTSA-W RTSS-W RSA RTSA-NPM RTSS-NPM Aspiring Certifications: VCP-NV

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.