1.17k likes | 1.39k Views
Cabrillo College. CCNP – Multilayer Switching Introduction to VLANs Rick Graziani, Instructor March 27, 2001. VLANs. Switched networks that are logically segmented on an organizational basis by functions, project teams, or applications rather than on a physical or geographical basis.
E N D
Cabrillo College CCNP – Multilayer Switching Introduction to VLANs Rick Graziani, Instructor March 27, 2001
VLANs • Switched networks that are logically segmented on an organizational basis by functions, project teams, or applications rather than on a physical or geographical basis
VLANs • Can be thought of as a broadcast domain that exists within a defined set of switches • Provide the segmentation services traditionally provided by routers • Offer scalability, security, and improved network management • Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management.
VLANs What are the issues if these were only separate subnets and not vlans? To solve this problem, normally the router would only be attached to one subnet and the hosts on physically separate subnets, in order to divide the broadcast domains.
VLANs are secure • Whenever a station transmits in a shared network such as a legacy half-duplex 10BaseT system, all stations attached to the segment receive a copy of the frame, even if they are not the intended recipients. • Anyone with such a network sniffer can capture passwords, sensitive e-mail, and any other traffic on the shared network.
VLANs are secure - Switches • Switches allow for microsegmentation • Each user that connects directly to a switch port is on his or her own segment. • If every device has its own segment (switchport) then only the sender and receiver will “see” unicast traffic, unless the switch has to flood the unicast traffic for that vlan. • More in a moment! • VLANs contain broadcast traffic • Only users on the same VLAN will see broadcasts
Side Note - Transparent Bridging • Transparent bridging (normal switching process) is defined in IEEE 802.1d describing the five bridging processes of: • learning • flooding filtering • forwarding • aging • These will be discussed further in STP
Transparent Bridge Process - Jeff Doyle Receive Packet Learn source address or refresh aging timer Is the destination a broadcast, multicast or unknown unicast? Yes No Flood Packet Are the source and destination on the same interface? No Yes Filter Packet Forward unicast to correct port
Transparent Bridging • Switches will flood unicast traffic out all ports if it does not have the destination MAC address in its source address table. • This can be especially true for large flat networks where switches cannot contain all of the MAC addresses. • MAC address table can be 1,024 (or less) and more than 16,000 addresses depending upon vendor and model • Addresses will also age out of the source address table which means the frames will be flooded. This traffic may include confidential information including passwords. • Cisco and Bay default is 5 minutes (common) • Why so small? Dynamic and current.
Changing and viewing the aging timer • Set-based Switch_1> (enable) set cam agingtime vlan agingtime_in_msec Switch_1> (enable) show cam agingtime VLAN 1 aging time = 300 sec VLAN 2 aging time = 300 sec • IOS-based Switch(config)# mac-address-table aging-time seconds [vlan vlan] Switch# show mac-address-table aging-time 300
Show Mac-Address-Table (Source Address Table) • Set-based Console> (enable) show cam dynamic * = Static Entry. + = Permanent Entry. # = System Entry. R = Router Entry. X = Port Security Entry VLAN Dest MAC/Route Des [CoS] Destination Ports… ---- ------------------ ----- ------------------- 1 00-a0-c9-66-86-94 2/6 [ALL] Total Matching CAM Entries Displayed = 1
Show Mac-Address-Table (Source Address Table) • IOS-based Switch#show mac-address-table dynamic Non-static Address Table: Destination Address Address Type VLAN ... Port ------------------- ------------ ---- ...------ 00a0.c966.8694 Dynamic 1 FastEthernet0/5
VLANs are secure - Switches • VLANs contain broadcast, multicast (later) and unknown unicast traffic to the specific VLAN
VLANs control broadcasts • Broadcast traffic is a necessary evil • Routing protocols and network services typically rely on broadcasts • Multimedia applications may also use broadcast frames/packets • Each VLAN is its own broadcast domain • Traffic of any kind cannot leave a VLAN without L3 services (a router) • Administrators can control the size of a broadcast domain by defining the size of the VLAN
VLANs improve BW utilization • Bandwidth is shared in legacy Ethernet; a switch improves BW utilization by eliminating collisions (microsegmentation). • VLANs further improve BW utilization by confining broadcasts and other traffic • Switches only flood ports that belong to the source port’s VLAN.
VLANs decrease latency If switches and VLANs were used here instead of routers, Accounting users would experience less latency.
Types of VLANs • When scaling VLANs in the switch block, there are two basic methods of defining the VLAN boundaries: • End-to-end VLANs (no longer recommended by Cisco due to management and STP concerns) • Local VLANs
Types of VLANs • Remember: a one-to-one correspondence between VLANs and IP subnets is strongly recommended! • Typically, this results in VLANs of 254 hosts or less. (Depending upon the subnetting scheme used.)
End-to-End VLANs • Users are grouped into VLANs independent of physical location and dependent on group or job function. • All users in a VLAN should have the same 80/20 traffic flow patterns. • As a user moves around the campus, VLAN membership for that user should not change. • Each VLAN has a common set of security requirements for all members.
Local VLANs • As many corporate networks have moved to centralize their resources, end-to-end VLANs became more difficult to maintain. • Users are required to use many different resources, many of which are no longer in their VLAN. • Because of this shift in placement and usage of resources, VLANs are now more frequently being created around geographic boundaries rather than commonality boundaries.
Local VLANs • Can span a geographic location as large as an entire building or as small a one switch • 20/80 rule in effect with 80 percent of the traffic remote to the user and 20 percent of the traffic local to the user • A user must cross a L3 device in order to reach 80 percent of the resources • However, this design allows the network to provide for a deterministic, consistent method of accessing resources.
VLAN Types • The two common approaches to assigning VLAN membership are: • Static VLANs • Dynamic VLANs
Static VLANs • Also referred to as port-based membership • VLAN assignments are created by assigning ports to a VLAN • As a device enters the network, the device automatically assumes the VLAN of the port. • If the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN assignment for the new connection.
Static VLANs • The port is assigned to a specific VLAN independent of the user or system attached to the port. • The port cannot send or receive from devices in another VLAN without the intervention of a L3 device. • The device that is attached to the port likely has no understanding that a VLAN exists. • The device simply knows that it is a member of a subnet. (ip address and subnet mask)
Static VLANs • Switch is responsible for identifying that the information came from a specific VLAN and for ensuring that the information gets to all other members of the VLAN. • The switch is further responsible for ensuring that ports in a different VLAN do not receive the information.
Static VLANs • This approach is quite simple, fast, and easy to manage in that there are no complex lookup tables required for VLAN segmentation. • If port-to-VLAN association is done with an application-specific integrated circuit (ASIC), the performance is very good. • An ASIC allows the port-to-VLAN mapping to be done at the hardware level.
Configuring Static VLANs IOS-Based Switch Switch# vlan database Switch(vlan)# vlan vlan-num name vlan-name Switch(config)#interface fastethernet 0 Switch(config-if)# switchport access vlan vlan-num
Configuring Static VLANs Set-Based Switch Switch(enable) set vlan vlan-num [name name] Switch(enable) set vlan vlan-nummod/num_list Switch(enable) set vlan 10 2/19-24
Dynamic VLANs • Created through the use of software packages such as CiscoWorks 2000 • Allow for membership based on the MAC address of the device • As a device enters the network, the device queries a database for VLAN membership
Dynamic VLANs • With a VLAN Management Policy Server (VMPS), you can assign switch ports to VLANs dynamically, based on the source MAC address of the device connected to the port. • When you move a host from a port on one switch in the network to a port on another switch in the network, the switch assigns the new port to the proper VLAN for that host dynamically.
Dynamic VLANs • When you enable VMPS, a MAC address-to-VLAN mapping database downloads from a Trivial File Transfer Protocol (TFTP) server and VMPS begins to accept client requests. • If you reset or power cycle the Catalyst 5000, 4000, 900, 3500, or 6000 Series Switch, the VMPS database downloads from the TFTP server automatically and VMPS is reenabled.
Dynamic VLANs • VMPS opens a UDP socket to communicate and listen to client Catalyst requests. • When the VMPS server receives a valid request from a client Catalyst, it searches its database for a MAC address-to-VLAN mapping.
Access Links • An access link is a link on the switch that is a member of only one VLAN. • This VLAN is referred to as the native VLAN of the port. • Any device that is attached to the port is completely unaware that a VLAN exists.
Trunk Links • A trunk link is capable of supporting multiple VLANs. • Trunk links are typically used to connect switches to other switches or routers. • Switches support trunk links on both Fast Ethernet and Gigabit Ethernet ports.
Trunk Links Without trunking With trunking
Trunking • A trunk is a point-to-point link that supports several VLANs • A trunk is to saves ports when creating a link between two devices implementing VLANs • Trunking covered in more detail in next section
Trunk Links • A trunk link does not belong to a specific VLAN. • Acts as a conduit for VLANs between switches and routers. • The trunk link can be configured to transport all VLANs or to transport a limited number of VLANs. • A trunk link may, however, have a native VLAN. • The native VLAN of the trunk is the VLAN that the trunk uses if the trunk link fails for any reason.
Trunk Links • In Ethernet, the switch has two methods of identifying the VLAN that a frame belongs to: • ISL– InterSwitch Link • (Cisco proprietary) • IEEE 802.1Q (standards-based) • aka, dot1q
VLAN Identification • ISL - This protocol is a Cisco proprietary encapsulation protocol for interconnecting multiple switches; it is supported in switches as well as routers. • Even though it’s Cisco proprietary, ISL is not natively supported by the Catalyst 4000. • The L3 blade does give the Cat4000s router two ISL-capable ports (Gig 1 and Gig 2).
VLAN Identification • IEEE 802.1Q - This protocol is an IEEE standard method for identifying VLANs by inserting a VLAN identifier into the frame header. • This process is referred to as frame tagging. • Note: In practice, both ISL and dot1q are called frame tagging
VLAN Identification • 802.10 - This standard is a Cisco proprietary method of transporting VLAN information inside the standard 802.10 frame (FDDI). • The VLAN information is written to the security association identifier (SAID) portion of the 802.10 frame. • This method is typically used to transport VLANs across FDDI backbones.
VLAN Identification • LAN Emulation (LANE) - LANE is an ATM Forum standard that can be used for transporting VLANs over Asynchronous Transfer Mode (ATM) networks.