VLAN: Difference between revisions
Tag: section blanking |
|||
(604 intermediate revisions by more than 100 users not shown) | |||
Line 1: | Line 1: | ||
{{Technical|date=May 2024}} |
|||
{{redirect|VLAN|the multimedia player|VLC media player}} |
|||
{{Short description|Network communications domain that is isolated at the data link layer}} |
|||
{{More citations needed|date=January 2014}} |
|||
{{OSI model}} |
|||
A '''virtual local area network''', '''virtual LAN''' or '''VLAN''', is a group of hosts with a common set of requirements that communicate as if they were attached to the same [[broadcast domain]], regardless of their physical location. A VLAN has the same attributes as a physical [[local area network]] (LAN), but it allows for end stations to be grouped together even if they are not located on the same [[network switch]]. LAN membership can be configured through software instead of physically relocating devices or connections. |
|||
[[File:VLAN Concept.svg|thumb|The general concept of virtual LANs.]] |
|||
A '''virtual local area network''' ('''VLAN''') is any [[broadcast domain]] that is [[network segmentation|partitioned]] and isolated in a [[computer network]] at the [[data link layer]] ([[OSI model#Layer 2: Data link layer|OSI layer 2]]).<ref>IEEE 802.1Q-2011, ''1. Overview''</ref><ref name="802.1Q 1.4">IEEE 802.1Q-2011, ''1.4 VLAN aims and benefits''</ref> In this context, [[virtualization|virtual]] refers to a physical object recreated and altered by additional logic, within the [[local area network]]. Basically, a VLAN behaves like a virtual switch or network link that can share the same physical structure with other VLANs while staying logically separate from them. VLANs work by applying tags to network frames and handling these tags in networking systems, in effect creating the appearance and functionality of [[network traffic]] that, while on a single physical network, behaves as if it were split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed. |
|||
To physically replicate the functions of a VLAN, it would be necessary to install a separate, parallel collection of network cables and equipment which are kept separate from the primary network. However unlike a physically separate network, VLANs must share bandwidth; two separate one-gigabit VLANs using a single one-gigabit interconnection can both suffer reduced throughput and congestion. It virtualizes VLAN behaviors (configuring switch ports, tagging frames when entering VLAN, lookup MAC table to switch/flood frames to trunk links, and untagging when exit from VLAN.) |
|||
VLANs allow [[network administrator]]s to group hosts together even if the hosts are not directly connected to the same [[network switch]]. Because VLAN membership can be configured through software, this can greatly simplify [[network design]] and deployment. Without VLANs, grouping hosts according to their resource needs the labor of relocating [[Node (networking)|nodes]] or rewiring [[data link]]s. VLANs allow devices that must be kept separate to share the cabling of a physical network and yet be prevented from directly interacting with one another. This managed sharing yields gains in simplicity, [[network security|security]], [[traffic management]], and economy. For example, a VLAN can be used to separate traffic within a business based on individual users or groups of users or their roles (e.g. network administrators), or based on traffic characteristics (e.g. low-priority traffic prevented from impinging on the rest of the network's functioning). Many [[Internet hosting service]]s use VLANs to separate customers' private zones from one other, allowing each customer's servers to be grouped in a single network segment no matter where the individual servers are located in the [[data center]]. Some precautions are needed to prevent traffic "escaping" from a given VLAN, an exploit known as [[VLAN hopping]]. |
|||
To subdivide a network into VLANs, one configures [[network equipment]]. Simpler equipment might partition only each physical port (if even that), in which case each VLAN runs over a dedicated [[network cable]]. More sophisticated devices can mark [[Frame (networking)|frames]] through [[VLAN tagging]], so that a single interconnect (''[[trunking|trunk]]'') may be used to transport data for multiple VLANs. Since VLANs share bandwidth, a VLAN trunk can use [[link aggregation]], [[quality-of-service]] prioritization, or both to route data efficiently. |
|||
==Uses== |
==Uses== |
||
VLANs address issues such as [[scalability]], security, and network management. Network architects set up VLANs to provide [[network segmentation]]. Routers between VLANs filter [[broadcast traffic]], enhance [[network security]], perform [[Supernetwork|address summarization]], and mitigate [[network congestion]]. |
|||
In a network utilizing broadcasts for [[service discovery]], address [[Dynamic Host Configuration Protocol|assignment]] and [[Address Resolution Protocol|resolution]] and other services, as the number of peers on a network grows, the frequency of broadcasts also increases. VLANs can help manage broadcast traffic by forming multiple [[broadcast domain]]s. Breaking up a large network into smaller independent segments reduces the amount of broadcast traffic each network device and network segment has to bear. Switches may not bridge network traffic between VLANs, as doing so would violate the integrity of the VLAN broadcast domain. |
|||
This is also useful if someone wants to create multiple [[layer 3]] networks on the same [[layer 2]] switch. For example, if a [[Dynamic Host Configuration Protocol|DHCP]] server is plugged into a switch it will serve any host on that switch that is configured to get its IP from a DHCP server. By using VLANs you can easily split the network up so some hosts won't use that DHCP server and will obtain [[link-local address]]es, or obtain an address from a different DHCP server. |
|||
VLANs are layer 2 constructs, |
VLANs can also help create multiple [[layer 3]] networks on a single physical infrastructure. VLANs are [[data link layer]] (OSI layer 2) constructs, analogous to [[Internet Protocol]] (IP) [[subnet]]s, which are [[network layer]] (OSI layer 3) constructs. In an environment employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have multiple subnets on one VLAN. |
||
By using VLANs, one can control traffic patterns and react quickly to relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration. |
Without VLAN capability, users are assigned to networks based on geography and are limited by physical topologies and distances. VLANs can logically group networks to decouple the users' network location from their physical location. By using VLANs, one can control traffic patterns and react quickly to employee or equipment relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration.<ref name="802.1Q 1.4" /> |
||
VLANs can be used to partition a local network into several distinctive segments, for instance:<ref>{{cite journal |last1=Sharma |first1=Komal |last2=Yadav |first2=Meenu |last3=Pundir |first3=Megha |last4=Malhotra |first4=Isha |last5=Singh |first5=Jaskaran |title=VLAN & its implementation over ATM by using IP: a communication |journal=Discovery Engineering |date=Nov 2013 |volume=2 |issue=8 |pages=106–7 |url=http://www.discovery.org.in/discoveryengineering/current_issue/v2/n8/A11.pdf |archive-url=https://web.archive.org/web/20150618172303/http://www.discovery.org.in/discoveryengineering/current_issue/v2/n8/A11.pdf |access-date=6 January 2024 |archive-date=2015-06-18 |publisher=Discovery Publication |location=Tamilnadu, India}}</ref> |
|||
* Production |
|||
* [[Voice over IP]] |
|||
* [[Network management]] |
|||
* [[Storage area network]] (SAN) |
|||
* Guest Internet access |
|||
* [[DMZ (computing)|Demilitarized zone]] (DMZ) |
|||
A common infrastructure shared across VLAN trunks can provide a measure of security with great flexibility for a comparatively low cost. Quality of service schemes can optimize traffic on trunk links for real-time (e.g. [[VoIP]]) or low-latency requirements (e.g. [[storage area network|SAN]]). However, VLANs as a security solution should be implemented with great care as they can be defeated unless implemented carefully.<ref>{{citation |work=SANS Institute InfoSec Reading Room |url=https://www.sans.org/reading-room/whitepapers/networkdevs/virtual-lan-security-weaknesses-countermeasures-1090 |title=Virtual LAN Security: weaknesses and countermeasures |publisher=SANS Institute |access-date=2018-05-18 |archive-date=2017-11-18 |archive-url=https://web.archive.org/web/20171118222202/https://www.sans.org/reading-room/whitepapers/networkdevs/virtual-lan-security-weaknesses-countermeasures-1090 |url-status=live }}</ref> |
|||
In [[cloud computing]] VLANs, IP addresses, and [[MAC address]]es in the cloud are resources that end users can manage. To help mitigate security issues, placing cloud-based virtual machines on VLANs may be preferable to placing them directly on the Internet.<ref>{{citation |author1=Amies A |author2=Wu C F |author3=Wang G C |author4=Criveti M |date=21 June 2012 |title=Networking on the cloud |url=http://www.ibm.com/developerworks/cloud/library/cl-networkingtools/cl-networkingtools-pdf.pdf |archive-url=https://web.archive.org/web/20131101082835/http://www.ibm.com/developerworks/cloud/library/cl-networkingtools/cl-networkingtools-pdf.pdf |archive-date=2013-11-01 |work=IBM developerWorks}}</ref> |
|||
Network technologies with VLAN capabilities include:{{citation needed|date=June 2015}} |
|||
* [[Asynchronous Transfer Mode|Asynchronous Transfer Mode (ATM)]] |
|||
* [[Fiber Distributed Data Interface|Fiber Distributed Data Interface (FDDI)]] |
|||
* [[Ethernet]] |
|||
* [[HiperSocket]] |
|||
* [[InfiniBand]] |
|||
== History == |
== History == |
||
After successful experiments with voice over Ethernet from 1981 to 1984, [[W. David Sincoskie]] joined [[Bellcore]] and began addressing the problem of scaling up Ethernet networks. At 10 Mbit/s, Ethernet was faster than most alternatives at the time. However, Ethernet was a broadcast network and there was no good way of connecting multiple Ethernet networks together. This limited the total bandwidth of an Ethernet network to 10 Mbit/s and the maximum distance between nodes to a few hundred feet. |
|||
By contrast, although the existing telephone network's speed for individual connections was limited to 56 kbit/s (less than one hundredth of Ethernet's speed), the total bandwidth of that network was estimated at 1 Tbit/s{{citation needed|date=June 2018}} (100,000 times greater than Ethernet). |
|||
After successful experiments with voice over Ethernet from 1981 to 1984, Dr. [[W. David Sincoskie]] joined [[Telcordia Technologies|Bellcore]] and turned to the problem of scaling up Ethernet networks. At 10 Mbit/s, Ethernet was faster than most alternatives of the time; however, Ethernet was a broadcast network and there was not a good way of connecting multiple Ethernets together. This limited the total bandwidth of an Ethernet network to 10 Mbit/s and the maximum distance between any two nodes to a few hundred feet. |
|||
Although it was possible to use [[IP routing]] to connect multiple Ethernet networks together, it was expensive and relatively slow. Sincoskie started looking for alternatives that required less processing per packet. In the process, he independently reinvented [[transparent bridging]], the technique used in modern [[Ethernet switch]]es.<ref>Sincoskie, WD (2002) [https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1018008 "Broadband packet switching: a personal perspective."] IEEE Commun 40: 54-66</ref> However, using switches to connect multiple Ethernet networks in a fault-tolerant fashion requires redundant paths through that network, which in turn requires a [[Spanning Tree Protocol|spanning tree]] configuration. This ensures that there is only one ''active'' path from any source node to any destination on the network. This causes centrally located switches to become bottlenecks, limiting scalability as more networks are interconnected. |
|||
By contrast, the existing telephone network's peak speed for individual connections was limited to 56 Kbit/s, less than one hundredth the speed of Ethernet, but the total bandwidth of the network was estimated to be a terabit, capable of moving over a hundred thousand times more information. |
|||
To help alleviate this problem, Sincoskie invented VLANs by adding a tag to each Ethernet frame. These tags could be thought of as colors, say red, green, or blue. In this scheme, each switch could be assigned to handle frames of a single color, and ignore the rest. The networks could be interconnected with three spanning trees, one for each color. By sending a mix of different frame colors, the aggregate bandwidth could be improved. Sincoskie referred to this as a ''multitree bridge''. He and Chase Cotton created and refined the algorithms necessary to make the system feasible.<ref>W. D. Sincoskie and C. J. Cotton, [https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=3233 "Extended Bridge Algorithms for Large Networks"] IEEE Network, Jan. 1988.</ref> This ''color'' is what is now known in the Ethernet frame as the [[IEEE 802.1Q]] header, or the VLAN tag. While VLANs are commonly used in modern Ethernet networks, they are not used in the manner first envisioned here.{{clarify|date=March 2022}} |
|||
[[Internet Protocol|IP]] [[routing]] could be used to connect multiple Ethernet networks together; however, the [[VAX-11/780]] computers commonly used as routers cost $400,000 each and their total throughput was significantly less than Ethernet speeds. Sincoskie started looking for alternatives that required less processing per packet. In the process he independently reinvented the self-learning [[Bridging (networking)|ethernet switch]].<ref>Sincoskie, WD (2002) [http://ieeexplore.ieee.org/iel5/35/21910/01018008.pdf?arnumber=1018008 "Broadband packet switching: a personal perspective."] IEEE Commun 40: 54-66</ref> |
|||
In 1998, Ethernet VLANs were described in the first edition of the [[IEEE 802.1Q]]-1998 standard.<ref>{{Cite book|last=|first=|url=https://standards.ieee.org/ieee/802.1Q/1039/|title=IEEE Std. 802.1Q-1998, Virtual Bridged Local Area Networks|publisher=|year=1998|isbn=|location=|pages=|access-date=2021-01-14|archive-date=2021-01-21|archive-url=https://web.archive.org/web/20210121045507/https://standards.ieee.org/standard/802_1Q-1998.html|url-status=live}}</ref> This was extended with [[IEEE 802.1ad]] to allow nested VLAN tags in service of provider bridging. This mechanism was improved with [[IEEE 802.1ah-2008]]. |
|||
However, using switches to connect multiple Ethernet networks require a [[spanning tree]] configuration. This means that there is exactly one path from any source address to any destination. This causes centrally-located switches to become bottlenecks, which limits scalability as more connections are interconnected. |
|||
==Configuration and design considerations== |
|||
To help alleviate this problem, Sincoskie invented VLANs by adding a tag to each Ethernet packet. These tags could be thought of as colors, say red, green, or blue. Then each switch could be assigned to handle packets of a single color, and ignore the rest. The networks could be interconnected with three different spanning trees: a red spanning tree, a green spanning tree, and a blue spanning tree. By sending a mix of different packet colors, the aggregate bandwidth could be improved. Sincoskie referred to this as a multitree bridge. With the help of Chase Cotton, the two created and refined the algorithms (called the Extended Bridge Algorithms for Large Networks) necessary to make the system feasible.<ref> W. D. Sincoskie and C. J. Cotton, [http://ieeexplore.ieee.org/iel3/65/185/00003233.pdf "Extended Bridge Algorithms for Large Networks"] IEEE Network, Jan. 1988.</ref> |
|||
Early network designers often segmented physical LANs with the aim of reducing the size of the Ethernet [[collision domain]]—thus improving performance. When Ethernet switches made this a non-issue (because each switch port is a collision domain), attention turned to reducing the size of the [[data link layer]] broadcast domain. VLANs were first employed to separate several broadcast domains across one physical medium. A VLAN can also serve to restrict access to network resources without regard to physical topology of the network.{{efn|The strength of VLAN security can be compromised by [[VLAN hopping]]. VLAN hopping can be mitigated with proper switchport configuration.<ref>{{cite web |url=http://rikfarrow.com/Network/net0103.html |archive-url=https://web.archive.org/web/20140421082757/http://rikfarrow.com/Network/net0103.html |archive-date=2014-04-21 |title=VLAN Insecurity |author=Rik Farrow}}</ref>}} |
|||
VLANs operate at the data link layer of the [[OSI model]]. Administrators often configure a VLAN to map directly to an IP network, or subnet, which gives the appearance of involving the [[network layer]]. Generally, VLANs within the same organization will be assigned different non-overlapping [[network address]] ranges. This is not a requirement of VLANs. There is no issue with separate VLANs using identical overlapping address ranges (e.g. two VLANs each use the [[private network]] {{IPaddr|192.168.0.0|16}}). However, it is not possible to [[Router (computing)|route]] data between two networks with overlapping addresses without delicate [[network address translation|IP remapping]], so if the goal of VLANs is segmentation of a larger overall organizational network, non-overlapping addresses must be used in each separate VLAN. |
|||
This "color" is what is now known in the Ethernet frame as the [[802.1Q]] header, or the VLAN tag. While VLANs are commonly used in modern Ethernet, using them for the original purpose would be rather unusual. |
|||
A basic switch that is not configured for VLANs has VLAN functionality disabled or permanently enabled with a ''default VLAN'' that contains all ports on the device as members.<ref name="802.1Q 1.4" /> The default VLAN typically uses VLAN identifier 1. Every device connected to one of its ports can send packets to any of the others. Separating ports by VLAN groups separates their traffic very much like connecting each group using a distinct switch for each group. |
|||
==Implementation== |
|||
A basic switch not configured for VLANs will either have VLAN functionality disabled, or will have it permanently enabled with what is known as a ''default VLAN'' which simply contains all ports on the device as members. |
|||
Remote management of the switch requires that the administrative functions be associated with one or more of the configured VLANs. |
|||
Configuration of the first custom VLAN port group usually involves subtracting ports from the default VLAN, such that the first custom group of VLAN ports is actually the second VLAN on the device, apart from the default VLAN. The default VLAN typically has an ID of 1. |
|||
munications to occur from switch to switch, an uplink port needs to be a tagged member of every VLAN on the switch that uses that uplink port, including the default VLAN. |
|||
In the context of VLANs, the term ''trunk'' denotes a network link carrying multiple VLANs, which are identified by labels (or ''tags'') inserted into their packets. Such trunks must run between ''tagged ports'' of VLAN-aware devices, so they are often switch-to-switch or switch-to-[[router (computing)|router]] links rather than links to hosts. (Note that the term 'trunk' is also used for what Cisco calls "channels" : [[port trunking|Link Aggregation or Port Trunking]]). A router (Layer 3 device) serves as the [[Internet backbone|backbone]] for network traffic going across different VLANs. It is only when the VLAN port group is to extend to another device that tagging is used. Since communications between ports on two different switches travel via the uplink ports of each switch involved, every VLAN containing such ports must also contain the uplink port of each switch involved, and traffic through these ports must be tagged. |
|||
Some switches either allow or require a name be created for the VLAN, but it is only the VLAN group number that is important from one switch to the next. |
|||
Switches typically have no built-in method to indicate VLAN to port associations to someone working in a [[wiring closet]]. It is necessary for a technician to either have administrative access to the device to view its configuration, or for VLAN port assignment charts or diagrams to be kept next to the switches in each wiring closet. |
|||
Where a VLAN group is to simply pass through an intermediate switch via two pass-through ports, only the two ports need to be a member of the VLAN, and are tagged to pass both the required VLAN and the default VLAN on the intermediate switch. |
|||
==Protocols and design== |
|||
Management of the switch requires that the management functions be associated with one of the configured VLANs. If the default VLAN were deleted or renumbered without moving the management to a different VLAN first, it is possible to be locked out of the switch configuration, requiring a forced clearing of the device configuration to regain control. |
|||
The protocol most commonly used today to support VLANs is [[IEEE 802.1Q]]. The [[IEEE 802.1]] working group defined this method of multiplexing VLANs in an effort to provide multivendor VLAN support. Prior to the introduction of the 802.1Q standard, several [[proprietary protocol]]s existed, such as [[Cisco Inter-Switch Link]] (ISL) and [[3Com]]'s Virtual LAN Trunk (VLT). Cisco also implemented VLANs over [[FDDI]] by carrying VLAN information in an [[IEEE 802.10]] frame header, contrary to the purpose of the IEEE 802.10 standard. |
|||
Both ISL and IEEE 802.1Q perform ''explicit tagging'' – the frame itself is tagged with VLAN identifiers. ISL uses an external tagging process that does not modify the Ethernet frame, while 802.1Q uses a frame-internal field for tagging, and therefore does modify the basic Ethernet frame structure. This internal tagging allows IEEE 802.1Q to work on both access and trunk links using standard Ethernet hardware. |
|||
Switches typically have no built-in method to indicate VLAN port members to someone working in a wiring closet. It is necessary for a technician to either have management access to the device to view its configuration, or for VLAN port assignment charts or diagrams to be kept next to the switches in each wiring closet. These charts must be manually updated by the technical staff whenever port membership changes are made to the VLANs. |
|||
===IEEE 802.1Q=== |
|||
Remote configuration of VLANs presents several opportunities for a technician to accidentally cut off communications and lock themselves out of the devices they are attempting to configure. Actions such as subdividing the default VLAN by splitting off the switch uplink ports into a separate new VLAN can suddenly cut off all remote communication, requiring the technician to physically visit the device in the distant location to continue the configuration process. |
|||
{{Main|IEEE 802.1Q}} |
|||
Under IEEE 802.1Q, the maximum number of VLANs on a given Ethernet network is 4,094 (4,096 values provided by the 12-bit {{abbr|VID|VLAN identifier}} field minus reserved values at each end of the range, 0 and 4,095). This does not impose the same limit on the number of IP subnets in such a network since a single VLAN can contain multiple IP subnets. [[IEEE 802.1ad]] extends the number of VLANs supported by adding support for multiple, nested VLAN tags. [[IEEE 802.1aq]] (Shortest Path Bridging) expands the VLAN limit to 16 million. Both improvements have been incorporated into the IEEE 802.1Q standard. |
|||
===Cisco Inter-Switch Link=== |
|||
{{Main|Cisco Inter-Switch Link}} |
|||
Inter-Switch Link (ISL) is a Cisco proprietary protocol used to interconnect switches and maintain VLAN information as traffic travels between switches on trunk links. ISL is provided as an alternative to IEEE 802.1Q. ISL is available only on some Cisco equipment and has been deprecated.<ref>CCNA Exploration LAN Switching and Wireless course, v 4.0, sec 3.2.3</ref> |
|||
===Cisco VLAN Trunking Protocol=== |
|||
{{Main|VLAN Trunking Protocol}} |
|||
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of VLANs on the whole local area network. VTP is available on most of the [[Cisco Catalyst]] Family products. The comparable IEEE standard in use by other manufacturers is [[GARP VLAN Registration Protocol]] (GVRP) or the more recent [[Multiple VLAN Registration Protocol]] (MVRP). |
|||
=== Multiple VLAN Registration Protocol === |
|||
{{main|Multiple Registration Protocol}} |
|||
Multiple VLAN Registration Protocol is an application of Multiple Registration Protocol that allows automatic configuration of VLAN information on network switches. Specifically, it provides a method to dynamically share VLAN information and configure the needed VLANs. |
|||
==Membership== |
|||
VLAN membership can be established either statically or dynamically. |
|||
==Establishing VLAN memberships== |
|||
The two common approaches to assigning VLAN membership are as follows: |
|||
* Static VLANs |
|||
* Dynamic VLANs |
|||
Static VLANs are also referred to as port-based VLANs. Static VLAN assignments are created by assigning ports to a VLAN. As a device enters the network, the device automatically assumes the VLAN of the port. If the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN assignment for the new connection. |
Static VLANs are also referred to as port-based VLANs. Static VLAN assignments are created by assigning ports to a VLAN. As a device enters the network, the device automatically assumes the VLAN of the port. If the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN assignment for the new connection. |
||
Dynamic VLANs are created |
Dynamic VLANs are created using software or by protocol. With a [[VLAN Management Policy Server]] (VMPS), an administrator can assign switch ports to VLANs dynamically based on information such as the source MAC address of the device connected to the port or the username used to log onto that device. As a device enters the network, the switch queries a database for the VLAN membership of the port that device is connected to. Protocol methods include [[Multiple VLAN Registration Protocol]] (MVRP) and the somewhat obsolete [[GARP VLAN Registration Protocol]] (GVRP). |
||
==Protocol |
==Protocol-based VLANs== |
||
In a switch that supports protocol-based VLANs, traffic may be handled on the basis of its protocol. Essentially, this segregates or forwards traffic from a port depending on the particular protocol of that traffic; traffic of any other protocol is not forwarded on the port. This allows, for example, IP and IPX traffic to be automatically segregated by the network. |
|||
In a protocol based VLAN enabled switch, traffic is forwarded through ports based on protocol. |
|||
Essentially, the user tries to segregate or forward a particular protocol traffic from a port using the protocol based VLANs; |
|||
traffic from any other protocol is not forwarded on the port. |
|||
For example, if you have connected a host, pumping ARP traffic on the switch at port 10, connected a Lan pumping IPX traffic to the port 20 of the switch and connected a router pumping IP traffic on port 30, then if you define a protocol based VLAN supporting IP and including all the three ports 10, 20 and 30 then IP packets can be forwarded to the ports 10 and 20 also, but ARP traffic will not get forwarded to the ports 20 and 30, similarly IPX traffic will not get forwarded to ports 10 and 30. |
|||
==VLAN |
==VLAN cross connect== |
||
VLAN |
VLAN cross connect (CC or VLAN-XC) is a mechanism used to create Switched VLANs, VLAN CC uses IEEE 802.1ad frames where the S Tag is used as a Label as in [[MPLS]]. IEEE approves the use of such a mechanism in part 6.11 of [[IEEE 802.1ad-2005]]. |
||
==See also== |
== See also == |
||
* [[HVLAN]], hierarchical VLAN |
|||
* [[IEEE 802.1Q]] |
|||
* |
* [[Multiple VLAN Registration Protocol]], [[GARP VLAN Registration Protocol]] |
||
* [[Network virtualization]] |
|||
* [[Private VLAN]] |
* [[Private VLAN]] |
||
* [[ |
* [[Software-defined networking]] |
||
* [[ |
* [[Switch virtual interface]] |
||
* |
* [[Virtual Extensible LAN]] (VXLAN) |
||
* |
* [[Virtual Private LAN Service]] |
||
* |
* [[Virtual private network]] |
||
* [[VLAN access control list]] |
|||
* [[Wide area network]] |
|||
==Notes== |
|||
{{notelist}} |
|||
==References== |
==References== |
||
{{Reflist}} |
|||
==Further reading== |
|||
* [[Andrew S. Tanenbaum]], 2003, "Computer Networks", Pearson Education International, New Jersey. |
* [[Andrew S. Tanenbaum]], 2003, "Computer Networks", Pearson Education International, New Jersey. |
||
<references/> |
|||
==External links== |
|||
*[http://standards.ieee.org/getieee802/download/802.1Q-1998.pdf IEEE's 802.1Q standard 1998 version] ([http://standards.ieee.org/getieee802/download/802.1Q-2003.pdf 2003 version])([http://standards.ieee.org/getieee802/download/802.1Q-2005.pdf 2005 version]) |
|||
* Cisco Systems |
|||
** [http://www.cisco.com/en/US/tech/tk389/tk689/tsd_technology_support_protocol_home.html Cisco home page for Virtual LANs/VLAN Trunking Protocol (VLANs/VTP)] (discusses DSL, DTP, GVRP, ISL, VTP, 802.1Q) |
|||
**[http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/switch_c/xcvlan.htm Cisco's Overview of Routing between VLANs] |
|||
**[http://www.cisco.com/en/US/docs/ios/12_1t/12_1t3/feature/guide/dtbridge.html Cisco's ''Bridging Between IEEE 802.1Q VLANs'' white paper] |
|||
*[http://net21.ucdavis.edu/newvlan.htm University of California's VLAN Information] |
|||
*[http://oldwiki.openwrt.org/OpenWrtDocs(2f)NetworkInterfaces.html OpenWRT guide to VLANs]: Provides a beginners' guide to VLANs |
|||
*[http://docs.lib.purdue.edu/ecetr/362/ Study of VLAN usage in Purdue University's Campus Network] |
|||
*[http://docs.lib.purdue.edu/ecetr/375/ Towards Systematic Design of Enterprise Networks]: Demonstrates how to systematically produce a VLAN design |
|||
* Some [http://www.zeroshell.net/eng/faq/network/ FAQ] about VLANs |
|||
*[http://pre.visualland.net/view.php?cid=867&protocol=Switch_VLan&title=4.%20VLAN%20basic Interactive VLAN Basics Simulation] |
|||
[[Category:Local area networks]] |
[[Category:Local area networks]] |
||
[[Category:Network protocols]] |
|||
[[ar:لان افتراضية]] |
|||
[[bg:Виртуална локална мрежа]] |
|||
[[cs:VLAN]] |
|||
[[de:Virtual Local Area Network]] |
|||
[[es:VLAN]] |
|||
[[fr:Réseau local virtuel]] |
|||
[[gu:વીલેન]] |
|||
[[hi:VLAN]] |
|||
[[id:VLAN]] |
|||
[[it:VLAN]] |
|||
[[he:רשת מקומית וירטואלית]] |
|||
[[hu:Virtuális helyi hálózat]] |
|||
[[nl:Virtual LAN]] |
|||
[[ja:Virtual Local Area Network]] |
|||
[[no:VLAN]] |
|||
[[pl:Wirtualna sieć lokalna]] |
|||
[[pt:Virtual LAN]] |
|||
[[ru:VLAN]] |
|||
[[sk:VLAN]] |
|||
[[fi:Virtuaalilähiverkko]] |
|||
[[sv:VLAN]] |
|||
[[ta:மெய்நிகர் குறும்பரப்புப் பிணையம்]] |
|||
[[te:VLAN]] |
|||
[[th:แลนเสมือน]] |
|||
[[uk:VLAN]] |
|||
[[vi:Virtual LAN]] |
|||
[[zh:虚拟局域网]] |
Latest revision as of 08:40, 25 December 2024
This article may be too technical for most readers to understand.(May 2024) |
This article needs additional citations for verification. (January 2014) |
OSI model by layer |
---|
A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).[2][3] In this context, virtual refers to a physical object recreated and altered by additional logic, within the local area network. Basically, a VLAN behaves like a virtual switch or network link that can share the same physical structure with other VLANs while staying logically separate from them. VLANs work by applying tags to network frames and handling these tags in networking systems, in effect creating the appearance and functionality of network traffic that, while on a single physical network, behaves as if it were split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.
VLANs allow network administrators to group hosts together even if the hosts are not directly connected to the same network switch. Because VLAN membership can be configured through software, this can greatly simplify network design and deployment. Without VLANs, grouping hosts according to their resource needs the labor of relocating nodes or rewiring data links. VLANs allow devices that must be kept separate to share the cabling of a physical network and yet be prevented from directly interacting with one another. This managed sharing yields gains in simplicity, security, traffic management, and economy. For example, a VLAN can be used to separate traffic within a business based on individual users or groups of users or their roles (e.g. network administrators), or based on traffic characteristics (e.g. low-priority traffic prevented from impinging on the rest of the network's functioning). Many Internet hosting services use VLANs to separate customers' private zones from one other, allowing each customer's servers to be grouped in a single network segment no matter where the individual servers are located in the data center. Some precautions are needed to prevent traffic "escaping" from a given VLAN, an exploit known as VLAN hopping.
To subdivide a network into VLANs, one configures network equipment. Simpler equipment might partition only each physical port (if even that), in which case each VLAN runs over a dedicated network cable. More sophisticated devices can mark frames through VLAN tagging, so that a single interconnect (trunk) may be used to transport data for multiple VLANs. Since VLANs share bandwidth, a VLAN trunk can use link aggregation, quality-of-service prioritization, or both to route data efficiently.
Uses
[edit]VLANs address issues such as scalability, security, and network management. Network architects set up VLANs to provide network segmentation. Routers between VLANs filter broadcast traffic, enhance network security, perform address summarization, and mitigate network congestion.
In a network utilizing broadcasts for service discovery, address assignment and resolution and other services, as the number of peers on a network grows, the frequency of broadcasts also increases. VLANs can help manage broadcast traffic by forming multiple broadcast domains. Breaking up a large network into smaller independent segments reduces the amount of broadcast traffic each network device and network segment has to bear. Switches may not bridge network traffic between VLANs, as doing so would violate the integrity of the VLAN broadcast domain.
VLANs can also help create multiple layer 3 networks on a single physical infrastructure. VLANs are data link layer (OSI layer 2) constructs, analogous to Internet Protocol (IP) subnets, which are network layer (OSI layer 3) constructs. In an environment employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have multiple subnets on one VLAN.
Without VLAN capability, users are assigned to networks based on geography and are limited by physical topologies and distances. VLANs can logically group networks to decouple the users' network location from their physical location. By using VLANs, one can control traffic patterns and react quickly to employee or equipment relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration.[3]
VLANs can be used to partition a local network into several distinctive segments, for instance:[4]
- Production
- Voice over IP
- Network management
- Storage area network (SAN)
- Guest Internet access
- Demilitarized zone (DMZ)
A common infrastructure shared across VLAN trunks can provide a measure of security with great flexibility for a comparatively low cost. Quality of service schemes can optimize traffic on trunk links for real-time (e.g. VoIP) or low-latency requirements (e.g. SAN). However, VLANs as a security solution should be implemented with great care as they can be defeated unless implemented carefully.[5]
In cloud computing VLANs, IP addresses, and MAC addresses in the cloud are resources that end users can manage. To help mitigate security issues, placing cloud-based virtual machines on VLANs may be preferable to placing them directly on the Internet.[6]
Network technologies with VLAN capabilities include:[citation needed]
- Asynchronous Transfer Mode (ATM)
- Fiber Distributed Data Interface (FDDI)
- Ethernet
- HiperSocket
- InfiniBand
History
[edit]After successful experiments with voice over Ethernet from 1981 to 1984, W. David Sincoskie joined Bellcore and began addressing the problem of scaling up Ethernet networks. At 10 Mbit/s, Ethernet was faster than most alternatives at the time. However, Ethernet was a broadcast network and there was no good way of connecting multiple Ethernet networks together. This limited the total bandwidth of an Ethernet network to 10 Mbit/s and the maximum distance between nodes to a few hundred feet.
By contrast, although the existing telephone network's speed for individual connections was limited to 56 kbit/s (less than one hundredth of Ethernet's speed), the total bandwidth of that network was estimated at 1 Tbit/s[citation needed] (100,000 times greater than Ethernet).
Although it was possible to use IP routing to connect multiple Ethernet networks together, it was expensive and relatively slow. Sincoskie started looking for alternatives that required less processing per packet. In the process, he independently reinvented transparent bridging, the technique used in modern Ethernet switches.[7] However, using switches to connect multiple Ethernet networks in a fault-tolerant fashion requires redundant paths through that network, which in turn requires a spanning tree configuration. This ensures that there is only one active path from any source node to any destination on the network. This causes centrally located switches to become bottlenecks, limiting scalability as more networks are interconnected.
To help alleviate this problem, Sincoskie invented VLANs by adding a tag to each Ethernet frame. These tags could be thought of as colors, say red, green, or blue. In this scheme, each switch could be assigned to handle frames of a single color, and ignore the rest. The networks could be interconnected with three spanning trees, one for each color. By sending a mix of different frame colors, the aggregate bandwidth could be improved. Sincoskie referred to this as a multitree bridge. He and Chase Cotton created and refined the algorithms necessary to make the system feasible.[8] This color is what is now known in the Ethernet frame as the IEEE 802.1Q header, or the VLAN tag. While VLANs are commonly used in modern Ethernet networks, they are not used in the manner first envisioned here.[clarification needed]
In 1998, Ethernet VLANs were described in the first edition of the IEEE 802.1Q-1998 standard.[9] This was extended with IEEE 802.1ad to allow nested VLAN tags in service of provider bridging. This mechanism was improved with IEEE 802.1ah-2008.
Configuration and design considerations
[edit]Early network designers often segmented physical LANs with the aim of reducing the size of the Ethernet collision domain—thus improving performance. When Ethernet switches made this a non-issue (because each switch port is a collision domain), attention turned to reducing the size of the data link layer broadcast domain. VLANs were first employed to separate several broadcast domains across one physical medium. A VLAN can also serve to restrict access to network resources without regard to physical topology of the network.[a]
VLANs operate at the data link layer of the OSI model. Administrators often configure a VLAN to map directly to an IP network, or subnet, which gives the appearance of involving the network layer. Generally, VLANs within the same organization will be assigned different non-overlapping network address ranges. This is not a requirement of VLANs. There is no issue with separate VLANs using identical overlapping address ranges (e.g. two VLANs each use the private network 192.168.0.0/16). However, it is not possible to route data between two networks with overlapping addresses without delicate IP remapping, so if the goal of VLANs is segmentation of a larger overall organizational network, non-overlapping addresses must be used in each separate VLAN.
A basic switch that is not configured for VLANs has VLAN functionality disabled or permanently enabled with a default VLAN that contains all ports on the device as members.[3] The default VLAN typically uses VLAN identifier 1. Every device connected to one of its ports can send packets to any of the others. Separating ports by VLAN groups separates their traffic very much like connecting each group using a distinct switch for each group.
Remote management of the switch requires that the administrative functions be associated with one or more of the configured VLANs.
In the context of VLANs, the term trunk denotes a network link carrying multiple VLANs, which are identified by labels (or tags) inserted into their packets. Such trunks must run between tagged ports of VLAN-aware devices, so they are often switch-to-switch or switch-to-router links rather than links to hosts. (Note that the term 'trunk' is also used for what Cisco calls "channels" : Link Aggregation or Port Trunking). A router (Layer 3 device) serves as the backbone for network traffic going across different VLANs. It is only when the VLAN port group is to extend to another device that tagging is used. Since communications between ports on two different switches travel via the uplink ports of each switch involved, every VLAN containing such ports must also contain the uplink port of each switch involved, and traffic through these ports must be tagged.
Switches typically have no built-in method to indicate VLAN to port associations to someone working in a wiring closet. It is necessary for a technician to either have administrative access to the device to view its configuration, or for VLAN port assignment charts or diagrams to be kept next to the switches in each wiring closet.
Protocols and design
[edit]The protocol most commonly used today to support VLANs is IEEE 802.1Q. The IEEE 802.1 working group defined this method of multiplexing VLANs in an effort to provide multivendor VLAN support. Prior to the introduction of the 802.1Q standard, several proprietary protocols existed, such as Cisco Inter-Switch Link (ISL) and 3Com's Virtual LAN Trunk (VLT). Cisco also implemented VLANs over FDDI by carrying VLAN information in an IEEE 802.10 frame header, contrary to the purpose of the IEEE 802.10 standard.
Both ISL and IEEE 802.1Q perform explicit tagging – the frame itself is tagged with VLAN identifiers. ISL uses an external tagging process that does not modify the Ethernet frame, while 802.1Q uses a frame-internal field for tagging, and therefore does modify the basic Ethernet frame structure. This internal tagging allows IEEE 802.1Q to work on both access and trunk links using standard Ethernet hardware.
IEEE 802.1Q
[edit]Under IEEE 802.1Q, the maximum number of VLANs on a given Ethernet network is 4,094 (4,096 values provided by the 12-bit VID field minus reserved values at each end of the range, 0 and 4,095). This does not impose the same limit on the number of IP subnets in such a network since a single VLAN can contain multiple IP subnets. IEEE 802.1ad extends the number of VLANs supported by adding support for multiple, nested VLAN tags. IEEE 802.1aq (Shortest Path Bridging) expands the VLAN limit to 16 million. Both improvements have been incorporated into the IEEE 802.1Q standard.
Cisco Inter-Switch Link
[edit]Inter-Switch Link (ISL) is a Cisco proprietary protocol used to interconnect switches and maintain VLAN information as traffic travels between switches on trunk links. ISL is provided as an alternative to IEEE 802.1Q. ISL is available only on some Cisco equipment and has been deprecated.[11]
Cisco VLAN Trunking Protocol
[edit]VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of VLANs on the whole local area network. VTP is available on most of the Cisco Catalyst Family products. The comparable IEEE standard in use by other manufacturers is GARP VLAN Registration Protocol (GVRP) or the more recent Multiple VLAN Registration Protocol (MVRP).
Multiple VLAN Registration Protocol
[edit]Multiple VLAN Registration Protocol is an application of Multiple Registration Protocol that allows automatic configuration of VLAN information on network switches. Specifically, it provides a method to dynamically share VLAN information and configure the needed VLANs.
Membership
[edit]VLAN membership can be established either statically or dynamically.
Static VLANs are also referred to as port-based VLANs. Static VLAN assignments are created by assigning ports to a VLAN. As a device enters the network, the device automatically assumes the VLAN of the port. If the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN assignment for the new connection.
Dynamic VLANs are created using software or by protocol. With a VLAN Management Policy Server (VMPS), an administrator can assign switch ports to VLANs dynamically based on information such as the source MAC address of the device connected to the port or the username used to log onto that device. As a device enters the network, the switch queries a database for the VLAN membership of the port that device is connected to. Protocol methods include Multiple VLAN Registration Protocol (MVRP) and the somewhat obsolete GARP VLAN Registration Protocol (GVRP).
Protocol-based VLANs
[edit]In a switch that supports protocol-based VLANs, traffic may be handled on the basis of its protocol. Essentially, this segregates or forwards traffic from a port depending on the particular protocol of that traffic; traffic of any other protocol is not forwarded on the port. This allows, for example, IP and IPX traffic to be automatically segregated by the network.
VLAN cross connect
[edit]VLAN cross connect (CC or VLAN-XC) is a mechanism used to create Switched VLANs, VLAN CC uses IEEE 802.1ad frames where the S Tag is used as a Label as in MPLS. IEEE approves the use of such a mechanism in part 6.11 of IEEE 802.1ad-2005.
See also
[edit]- HVLAN, hierarchical VLAN
- Multiple VLAN Registration Protocol, GARP VLAN Registration Protocol
- Network virtualization
- Private VLAN
- Software-defined networking
- Switch virtual interface
- Virtual Extensible LAN (VXLAN)
- Virtual Private LAN Service
- Virtual private network
- VLAN access control list
- Wide area network
Notes
[edit]- ^ The strength of VLAN security can be compromised by VLAN hopping. VLAN hopping can be mitigated with proper switchport configuration.[10]
References
[edit]- ^ "X.225 : Information technology – Open Systems Interconnection – Connection-oriented Session protocol: Protocol specification". Archived from the original on 1 February 2021. Retrieved 10 March 2023.
- ^ IEEE 802.1Q-2011, 1. Overview
- ^ a b c IEEE 802.1Q-2011, 1.4 VLAN aims and benefits
- ^ Sharma, Komal; Yadav, Meenu; Pundir, Megha; Malhotra, Isha; Singh, Jaskaran (Nov 2013). "VLAN & its implementation over ATM by using IP: a communication" (PDF). Discovery Engineering. 2 (8). Tamilnadu, India: Discovery Publication: 106–7. Archived from the original (PDF) on 2015-06-18. Retrieved 6 January 2024.
- ^ "Virtual LAN Security: weaknesses and countermeasures", SANS Institute InfoSec Reading Room, SANS Institute, archived from the original on 2017-11-18, retrieved 2018-05-18
- ^ Amies A; Wu C F; Wang G C; Criveti M (21 June 2012), "Networking on the cloud" (PDF), IBM developerWorks, archived from the original (PDF) on 2013-11-01
- ^ Sincoskie, WD (2002) "Broadband packet switching: a personal perspective." IEEE Commun 40: 54-66
- ^ W. D. Sincoskie and C. J. Cotton, "Extended Bridge Algorithms for Large Networks" IEEE Network, Jan. 1988.
- ^ IEEE Std. 802.1Q-1998, Virtual Bridged Local Area Networks. 1998. Archived from the original on 2021-01-21. Retrieved 2021-01-14.
- ^ Rik Farrow. "VLAN Insecurity". Archived from the original on 2014-04-21.
- ^ CCNA Exploration LAN Switching and Wireless course, v 4.0, sec 3.2.3
Further reading
[edit]- Andrew S. Tanenbaum, 2003, "Computer Networks", Pearson Education International, New Jersey.