ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Getting computers and phones on the correct VLAN regardless of switch port?

    IT Discussion
    6
    27
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @dave247
      last edited by

      @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

      @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

      @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

      @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

      Why are you segregating voice and data traffic?

      ? The question is about how to get the devices onto their intended VLAN.

      Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

      But, if we go a bit further. What kind of switches do you have?

      Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

      No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

      dave247D 1 Reply Last reply Reply Quote 0
      • dave247D
        dave247 @travisdh1
        last edited by dave247

        @travisdh1 said in Getting computers and phones on the correct VLAN regardless of switch port?:

        @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

        @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

        @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

        Why are you segregating voice and data traffic?

        ? The question is about how to get the devices onto their intended VLAN.

        Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

        VLAN isn't about security. A malicious actor only needs to guess the other VLAN id in order to access the other network quite often.

        lol. I continually hear people saying conflicting things like this. VLANs are used for security and management purposes.

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @travisdh1
          last edited by

          @travisdh1 said in Getting computers and phones on the correct VLAN regardless of switch port?:

          @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

          @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

          @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

          Why are you segregating voice and data traffic?

          ? The question is about how to get the devices onto their intended VLAN.

          Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

          VLAN isn't about security. A malicious actor only needs to guess the other VLAN id in order to access the other network quite often.

          It can be, VLANs can aid in security under the right conditions. In this example, if he moved from tagged to assigned port VLANs, and then added port security to make sure unassigned devices could not be added to the ports, then it could provide some separation security.

          All based around LAN security, though, which is inherently insecure, so better to secure the traffic than to use VLANs. But short of going LANless, there are cases where you can make VLANs add a little security.

          1 Reply Last reply Reply Quote 0
          • dave247D
            dave247 @scottalanmiller
            last edited by

            @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

            @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

            @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

            @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

            @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

            Why are you segregating voice and data traffic?

            ? The question is about how to get the devices onto their intended VLAN.

            Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

            But, if we go a bit further. What kind of switches do you have?

            Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

            No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

            I don't quite understand what you mean here by port controlled VLAN, or the rest of your reply.

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @dave247
              last edited by

              @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

              @travisdh1 said in Getting computers and phones on the correct VLAN regardless of switch port?:

              @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

              @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

              @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

              Why are you segregating voice and data traffic?

              ? The question is about how to get the devices onto their intended VLAN.

              Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

              VLAN isn't about security. A malicious actor only needs to guess the other VLAN id in order to access the other network quite often.

              lol. I continually hear people saying conflicting things like this. VLANs are used for security and management purposes.

              VLANs CAN be used for that. The most common reason is "error", at least in these examples.

              VLANs when used for things like guest networks, that's security for sure, and very effective. Easy to enforce, clear separation of traffic.

              When it comes to VoIP, VLANs aren't for security or management, not really. They don't affect security in any meaningful way, and they make management way harder.

              dave247D 1 Reply Last reply Reply Quote 0
              • dbeatoD
                dbeato
                last edited by

                If you want the phones and computers to get the correct VLAN, you need to then tag every single port on the switches involved and then configure either by DHCP option or manually on each device to get the VLAN assigned to the device. That means a lot of manual work besides using the DHCP option on your DHCP server for the phones at least.

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @dave247
                  last edited by

                  @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                  @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                  @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                  @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                  @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                  @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                  Why are you segregating voice and data traffic?

                  ? The question is about how to get the devices onto their intended VLAN.

                  Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                  But, if we go a bit further. What kind of switches do you have?

                  Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

                  No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

                  I don't quite understand what you mean here by port controlled VLAN, or the rest of your reply.

                  VLANs aren't a singular thing, just a general concept. They can be created in multiple ways. One of which is tagging, which is required for how you are using it here with the phones on shared "trunk" ports with the PCs.

                  But you can do port based VLAN as well, which has no protocol. This is a "Layer 1" VLAN where the port (on the switch) that is used determines the VLAN instead of a tag. With port based, you can use physical security to enforce the VLAN traffic and devices on the network can't violate the VLAN security to get around it.

                  dave247D 1 Reply Last reply Reply Quote 1
                  • dave247D
                    dave247 @scottalanmiller
                    last edited by

                    @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                    Why are you segregating voice and data traffic?

                    ? The question is about how to get the devices onto their intended VLAN.

                    Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                    But, if we go a bit further. What kind of switches do you have?

                    Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

                    No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

                    I don't quite understand what you mean here by port controlled VLAN, or the rest of your reply.

                    VLANs aren't a singular thing, just a general concept. They can be created in multiple ways. One of which is tagging, which is required for how you are using it here with the phones on shared "trunk" ports with the PCs.

                    But you can do port based VLAN as well, which has no protocol. This is a "Layer 1" VLAN where the port (on the switch) that is used determines the VLAN instead of a tag. With port based, you can use physical security to enforce the VLAN traffic and devices on the network can't violate the VLAN security to get around it.

                    So you mean like, put ports 1 - 10 on VLAN 5 thus forcing any devices plugged into those ports to be on that VLAN?

                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @dave247
                      last edited by

                      @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                      Why are you segregating voice and data traffic?

                      ? The question is about how to get the devices onto their intended VLAN.

                      Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                      But, if we go a bit further. What kind of switches do you have?

                      Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

                      No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

                      I don't quite understand what you mean here by port controlled VLAN, or the rest of your reply.

                      VLANs aren't a singular thing, just a general concept. They can be created in multiple ways. One of which is tagging, which is required for how you are using it here with the phones on shared "trunk" ports with the PCs.

                      But you can do port based VLAN as well, which has no protocol. This is a "Layer 1" VLAN where the port (on the switch) that is used determines the VLAN instead of a tag. With port based, you can use physical security to enforce the VLAN traffic and devices on the network can't violate the VLAN security to get around it.

                      So you mean like, put ports 1 - 10 on VLAN 5 thus forcing any devices plugged into those ports to be on that VLAN?

                      Right. Ports 1-10 on VLAN 5, 11-24 on VLAN 0. As long as you control what gets plugged into them, the VLANs are essentially air tight.

                      dave247D 1 Reply Last reply Reply Quote 1
                      • scottalanmillerS
                        scottalanmiller
                        last edited by

                        This port ID system is great, too, if you want to be able to move equipment around quickly. Make white wall ports for PCs, yellow for phones. Yeah, it takes twice as many wall ports, but it is SO easy to set up.

                        1 Reply Last reply Reply Quote 1
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          Also, port enforced VLANs mimic physical LANs better which allows you to transparently move back and forth between VLAN and LAN where it makes sense.

                          1 Reply Last reply Reply Quote 1
                          • dave247D
                            dave247 @scottalanmiller
                            last edited by

                            @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                            Why are you segregating voice and data traffic?

                            ? The question is about how to get the devices onto their intended VLAN.

                            Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                            But, if we go a bit further. What kind of switches do you have?

                            Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

                            No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

                            I don't quite understand what you mean here by port controlled VLAN, or the rest of your reply.

                            VLANs aren't a singular thing, just a general concept. They can be created in multiple ways. One of which is tagging, which is required for how you are using it here with the phones on shared "trunk" ports with the PCs.

                            But you can do port based VLAN as well, which has no protocol. This is a "Layer 1" VLAN where the port (on the switch) that is used determines the VLAN instead of a tag. With port based, you can use physical security to enforce the VLAN traffic and devices on the network can't violate the VLAN security to get around it.

                            So you mean like, put ports 1 - 10 on VLAN 5 thus forcing any devices plugged into those ports to be on that VLAN?

                            Right. Ports 1-10 on VLAN 5, 11-24 on VLAN 0. As long as you control what gets plugged into them, the VLANs are essentially air tight.

                            Well what about a situation where you have computers that plug into phone sets, and then those phone sets connect to the network port on the wall? You'd need those phones to be tagged and the network traffic from the pc to be untagged, at least in my situation.

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • dave247D
                              dave247 @scottalanmiller
                              last edited by dave247

                              @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                              @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                              @travisdh1 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                              @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                              @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                              @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                              Why are you segregating voice and data traffic?

                              ? The question is about how to get the devices onto their intended VLAN.

                              Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                              VLAN isn't about security. A malicious actor only needs to guess the other VLAN id in order to access the other network quite often.

                              lol. I continually hear people saying conflicting things like this. VLANs are used for security and management purposes.

                              VLANs CAN be used for that. The most common reason is "error", at least in these examples.

                              VLANs when used for things like guest networks, that's security for sure, and very effective. Easy to enforce, clear separation of traffic.

                              When it comes to VoIP, VLANs aren't for security or management, not really. They don't affect security in any meaningful way, and they make management way harder.

                              Well, wouldn't one security measure count, such as preventing someone on the data network from sniffing voice traffic? I know it's not the primary solution but it's one additional measure.

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @dave247
                                last edited by

                                @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                Why are you segregating voice and data traffic?

                                ? The question is about how to get the devices onto their intended VLAN.

                                Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                                But, if we go a bit further. What kind of switches do you have?

                                Security requirement mainly. Switches are Dell PowerConnect N3000 and 5500

                                No security if done this way. You'd need to switch to port controlled VLAN in order to introduce any secure. If you do tagged like you have to here, the devices see all the VLANs at once and choose what traffic to send and receive - same as without a VLAN.

                                I don't quite understand what you mean here by port controlled VLAN, or the rest of your reply.

                                VLANs aren't a singular thing, just a general concept. They can be created in multiple ways. One of which is tagging, which is required for how you are using it here with the phones on shared "trunk" ports with the PCs.

                                But you can do port based VLAN as well, which has no protocol. This is a "Layer 1" VLAN where the port (on the switch) that is used determines the VLAN instead of a tag. With port based, you can use physical security to enforce the VLAN traffic and devices on the network can't violate the VLAN security to get around it.

                                So you mean like, put ports 1 - 10 on VLAN 5 thus forcing any devices plugged into those ports to be on that VLAN?

                                Right. Ports 1-10 on VLAN 5, 11-24 on VLAN 0. As long as you control what gets plugged into them, the VLANs are essentially air tight.

                                Well what about a situation where you have computers that plug into phone sets, and then those phone sets connect to the network port on the wall? You'd need those phones to be tagged and the network traffic from the pc to be untagged, at least in my situation.

                                Correct, that's what was being pointed out above means that your devices (the phone and the PC) can bypass the VLAN security to get to whatever they want as they control the tags. Tagging means that management, but not security, will continue to work. Because if the computer is hacked, for example, the hacker would just tell it to grab the other VLANs' traffic as well, if that is what they wanted.

                                1 Reply Last reply Reply Quote 3
                                • scottalanmillerS
                                  scottalanmiller @dave247
                                  last edited by

                                  @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  @scottalanmiller said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  @travisdh1 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  @dave247 said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  @coliver said in Getting computers and phones on the correct VLAN regardless of switch port?:

                                  Why are you segregating voice and data traffic?

                                  ? The question is about how to get the devices onto their intended VLAN.

                                  Sure, and my question is why? How does this benefit the business? Is there a security reason to separating out voice and data traffic?

                                  VLAN isn't about security. A malicious actor only needs to guess the other VLAN id in order to access the other network quite often.

                                  lol. I continually hear people saying conflicting things like this. VLANs are used for security and management purposes.

                                  VLANs CAN be used for that. The most common reason is "error", at least in these examples.

                                  VLANs when used for things like guest networks, that's security for sure, and very effective. Easy to enforce, clear separation of traffic.

                                  When it comes to VoIP, VLANs aren't for security or management, not really. They don't affect security in any meaningful way, and they make management way harder.

                                  Well, wouldn't one security measure count, such as preventing someone on the data network from sniffing voice traffic? I know it's not the primary solution but it's one additional measure.

                                  Sort of, but your switch already does that by the nature of being a switch. So the VLAN isn't providing an additional feature in this case.

                                  The ability to sniff traffic on the switch would require the same level of access that bypasses the VLAN. So the switch and VLAN segregations would be breached together as a singular attack.

                                  So VLANs in the port enforced sense, yes. But in this example case, no.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller
                                    last edited by

                                    ANd before someone forgets and says "well if you didn't have a switch, but had VLANs".... hubs don't support VLANing. A switch is needed for VLANs to exist. 🙂

                                    1 Reply Last reply Reply Quote 2
                                    • dave247D
                                      dave247
                                      last edited by

                                      Turns out the thing I was looking for was LLDP protocol.

                                      Sometimes, it's all in how you ask the question -_-

                                      1 Reply Last reply Reply Quote 1
                                      • 1
                                      • 2
                                      • 1 / 2
                                      • First post
                                        Last post