ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VLAN confusion

    IT Discussion
    8
    184
    18.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender
      last edited by

      VLANs in most cases aren't needed unless you have a security reason to do so, and must share hardware over these networks, i.e. one set of APs but two wifi networks - corporate and guest.
      Switches perform their job which can easily allow thousands of devices to be on a single flat IP network without the need to break them down into smaller and smaller segments. So if you don't have a security related reason to keep them separate, then your life will be much simpler if you just have a /23 or /22 network instead of the typical /24 (limited to 256 devices).

      Onto your current setup:
      From the sounds of it, your Sonicwall is doing the routing between your VLANs at this point, assuming cross VLAN traffic is happening.

      You mentioned that you made a VLAN for wifi - then you talk about a guest and corporate wifi - Does this mean your corporate wifi is on the default VLAN and the guest is exclusively on the new VLAN? What provides DHCP to the guest network? What provides DNS to the guest network?

      As for your Lab network, you have choices, you can create a completely separate VLAN that only has access to itself and the internet via the sonicwall, or you can enable ACLs that allow the two networks to talk to each other and the Sonicwall will route information between the two.

      coliverC dave247D 2 Replies Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch @coliver
        last edited by

        @coliver said in VLAN confusion:

        So go back to the beginning. Why are you using VLANs. What is the reason for that in your company?

        Because he wants a segregated LAB

        coliverC DashrenderD 2 Replies Last reply Reply Quote 0
        • coliverC
          coliver @JaredBusch
          last edited by

          @jaredbusch said in VLAN confusion:

          @coliver said in VLAN confusion:

          So go back to the beginning. Why are you using VLANs. What is the reason for that in your company?

          Because he wants a segregated LAB

          Ah wow completely missed that thank you for clarifying.

          1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @JaredBusch
            last edited by

            @jaredbusch said in VLAN confusion:

            @coliver said in VLAN confusion:

            So go back to the beginning. Why are you using VLANs. What is the reason for that in your company?

            Because he wants a segregated LAB

            That doesn't explain why he or someone created a VLAN for the wifi.

            JaredBuschJ 1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch
              last edited by

              Your router will should be the only point that connects traffic from one VLAN to another.

              At a very basic level:

              You will want to have rules in your router's firewall that allows new/established/related connections from the company LAN to the Lab LAN. But from the Lab LAN to the company LAN it should only allow established.

              This will allow you to connect in and have the Lab thing respond but the Lab thing cannot initiate a connection to the company LAN.

              dave247D 1 Reply Last reply Reply Quote 3
              • coliverC
                coliver @Dashrender
                last edited by

                @dashrender said in VLAN confusion:

                As for your Lab network, you have choices, you can create a completely separate VLAN that only has access to itself and the internet via the sonicwall, or you can enable ACLs that allow the two networks to talk to each other and the Sonicwall will route information between the two.

                He could setup an ACL that only allows the Lab VLAN to contact the internet, and his workstation. What kind of lab is this going to be though? You could easily do this virtually on a desktop with Hyper-v or KVM.

                dave247D 1 Reply Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @Dashrender
                  last edited by

                  @dashrender said in VLAN confusion:

                  @jaredbusch said in VLAN confusion:

                  @coliver said in VLAN confusion:

                  So go back to the beginning. Why are you using VLANs. What is the reason for that in your company?

                  Because he wants a segregated LAB

                  That doesn't explain why he or someone created a VLAN for the wifi.

                  You are in the weeds. This is not part of this conversation. We are not here to dissect the existing setup.

                  1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    The easy way to visualize VLANs is creating completely separate network stacks, but cheaper. VLANs are all about "I wanted separate switches for this, but that was expensive and I can live with the VLAN limitations." So VLANs exist for security and management reasons, but not for performance ones.

                    So, if you had separate switch stacks, you need a router to talk between them. This creates a bottleneck, but it is your security control point. That's the core functionality of the VLANs: to keep everything completely separate. If you want VLANs to openly talk to each other, then you don't want VLANs at all. VLANs create bottlenecks in exchange for offering LAN based security mechanisms.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @dave247
                      last edited by

                      @dave247 said in VLAN confusion:

                      Like in a case where I have a VoIP set up, with phones on one VLAN and computers on another. The computers and VoIP systems should normally never need to communicate with each other (I assume) unless there is like some VoIP related application installed on a user's workstation. In that case, I assume that at some point, data is crossing over between the two networks, through the two VLAN's.

                      That would make VLANing crazy in that instance. If you want the networks to be able to talk, what's the purpose of the VLAN? Phones, specifically, are a really bad place to normally have VLANs.

                      DashrenderD 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @dave247
                        last edited by

                        @dave247 said in VLAN confusion:

                        Also, my main reason for asking this: I am trying to set up a LAB network that will reside on it's own VLAN, completely separate from my company's production systems. But if it's 100% segregated, then I'm not going to be able to access it from my work pc, so I'll have to set up a separate computer that is connected to the lab VLAN. That is, unless I implement some kind of ACL..

                        Right, just like a LAN somewhere remote on the Internet. You'll need a pinhole for management and/or a PC that sits on that network and not on the company one.

                        1 Reply Last reply Reply Quote 1
                        • DashrenderD
                          Dashrender @scottalanmiller
                          last edited by

                          @scottalanmiller said in VLAN confusion:

                          @dave247 said in VLAN confusion:

                          Like in a case where I have a VoIP set up, with phones on one VLAN and computers on another. The computers and VoIP systems should normally never need to communicate with each other (I assume) unless there is like some VoIP related application installed on a user's workstation. In that case, I assume that at some point, data is crossing over between the two networks, through the two VLAN's.

                          That would make VLANing crazy in that instance. If you want the networks to be able to talk, what's the purpose of the VLAN? Phones, specifically, are a really bad place to normally have VLANs.

                          The idea of VLANing phones comes from a misunderstanding of tech at worst and old days of hubs at best. As long as a switch port isn't at 100% utilization, the QoS rules don't apply - the switch will just keeping everything moving. If you have 100% utilization, you probably have other issues you need to resolve before you worry about QoS for phone calls, but phones would definitely feel this pinch faster than other things.

                          scottalanmillerS dave247D 2 Replies Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Dashrender
                            last edited by

                            @dashrender said in VLAN confusion:

                            @scottalanmiller said in VLAN confusion:

                            @dave247 said in VLAN confusion:

                            Like in a case where I have a VoIP set up, with phones on one VLAN and computers on another. The computers and VoIP systems should normally never need to communicate with each other (I assume) unless there is like some VoIP related application installed on a user's workstation. In that case, I assume that at some point, data is crossing over between the two networks, through the two VLAN's.

                            That would make VLANing crazy in that instance. If you want the networks to be able to talk, what's the purpose of the VLAN? Phones, specifically, are a really bad place to normally have VLANs.

                            The idea of VLANing phones comes from a misunderstanding of tech at worst and old days of hubs at best. As long as a switch port isn't at 100% utilization, the QoS rules don't apply - the switch will just keeping everything moving. If you have 100% utilization, you probably have other issues you need to resolve before you worry about QoS for phone calls, but phones would definitely feel this pinch faster than other things.

                            Which is a weird thought process, given that hubs didn't have QoS capabilities. So QoS only existed in the world where VLANing for QoS didn't make sense.

                            1 Reply Last reply Reply Quote 0
                            • dave247D
                              dave247 @Dashrender
                              last edited by

                              @dashrender said in VLAN confusion:

                              VLANs in most cases aren't needed unless you have a security reason to do so, and must share hardware over these networks, i.e. one set of APs but two wifi networks - corporate and guest.
                              Switches perform their job which can easily allow thousands of devices to be on a single flat IP network without the need to break them down into smaller and smaller segments. So if you don't have a security related reason to keep them separate, then your life will be much simpler if you just have a /23 or /22 network instead of the typical /24 (limited to 256 devices).

                              Onto your current setup:
                              From the sounds of it, your Sonicwall is doing the routing between your VLANs at this point, assuming cross VLAN traffic is happening.

                              You mentioned that you made a VLAN for wifi - then you talk about a guest and corporate wifi - Does this mean your corporate wifi is on the default VLAN and the guest is exclusively on the new VLAN? What provides DHCP to the guest network? What provides DNS to the guest network?

                              As for your Lab network, you have choices, you can create a completely separate VLAN that only has access to itself and the internet via the sonicwall, or you can enable ACLs that allow the two networks to talk to each other and the Sonicwall will route information between the two.

                              Ah, I'm an idiot. My brain sucks at recalling information.

                              So I set up two VLAN's: one for corporate wifi and one for guest wifi. Then Sonciwall handles the routing and DHCP for each network, plus the firewall functionality. DNS to corp is our DC and I just used google's DNS for the guest wifi. Guest wifi doesn't touch our internal systems at all.

                              scottalanmillerS 1 Reply Last reply Reply Quote 1
                              • scottalanmillerS
                                scottalanmiller @dave247
                                last edited by

                                @dave247 said in VLAN confusion:

                                @dashrender said in VLAN confusion:

                                VLANs in most cases aren't needed unless you have a security reason to do so, and must share hardware over these networks, i.e. one set of APs but two wifi networks - corporate and guest.
                                Switches perform their job which can easily allow thousands of devices to be on a single flat IP network without the need to break them down into smaller and smaller segments. So if you don't have a security related reason to keep them separate, then your life will be much simpler if you just have a /23 or /22 network instead of the typical /24 (limited to 256 devices).

                                Onto your current setup:
                                From the sounds of it, your Sonicwall is doing the routing between your VLANs at this point, assuming cross VLAN traffic is happening.

                                You mentioned that you made a VLAN for wifi - then you talk about a guest and corporate wifi - Does this mean your corporate wifi is on the default VLAN and the guest is exclusively on the new VLAN? What provides DHCP to the guest network? What provides DNS to the guest network?

                                As for your Lab network, you have choices, you can create a completely separate VLAN that only has access to itself and the internet via the sonicwall, or you can enable ACLs that allow the two networks to talk to each other and the Sonicwall will route information between the two.

                                Ah, I'm an idiot. My brain sucks at recalling information.

                                So I set up two VLAN's: one for corporate wifi and one for guest wifi. Then Sonciwall handles the routing and DHCP for each network, plus the firewall functionality. DNS to corp is our DC and I just used google's DNS for the guest wifi. Guest wifi doesn't touch our internal systems at all.

                                Yes, that's a good use of VLANs, total separation where separation is fully intended.

                                VLANs are often used for DMZs as well.

                                1 Reply Last reply Reply Quote 1
                                • dave247D
                                  dave247 @JaredBusch
                                  last edited by

                                  @jaredbusch said in VLAN confusion:

                                  Your router will should be the only point that connects traffic from one VLAN to another.

                                  At a very basic level:

                                  You will want to have rules in your router's firewall that allows new/established/related connections from the company LAN to the Lab LAN. But from the Lab LAN to the company LAN it should only allow established.

                                  This will allow you to connect in and have the Lab thing respond but the Lab thing cannot initiate a connection to the company LAN.

                                  OOOOH yeah.. ok that seems obvious now. I can just allow myself access to that network through my Sonicwall via the firewall rules..

                                  1 Reply Last reply Reply Quote 1
                                  • dave247D
                                    dave247 @Dashrender
                                    last edited by

                                    @dashrender said in VLAN confusion:

                                    @scottalanmiller said in VLAN confusion:

                                    @dave247 said in VLAN confusion:

                                    Like in a case where I have a VoIP set up, with phones on one VLAN and computers on another. The computers and VoIP systems should normally never need to communicate with each other (I assume) unless there is like some VoIP related application installed on a user's workstation. In that case, I assume that at some point, data is crossing over between the two networks, through the two VLAN's.

                                    That would make VLANing crazy in that instance. If you want the networks to be able to talk, what's the purpose of the VLAN? Phones, specifically, are a really bad place to normally have VLANs.

                                    The idea of VLANing phones comes from a misunderstanding of tech at worst and old days of hubs at best. As long as a switch port isn't at 100% utilization, the QoS rules don't apply - the switch will just keeping everything moving. If you have 100% utilization, you probably have other issues you need to resolve before you worry about QoS for phone calls, but phones would definitely feel this pinch faster than other things.

                                    Well, actually, here's one thing I just thought of. We currently have a /23 network where I work, and our current phone system exists on the same network as our computers and servers. We have a lot of addresses taken up by phones right now, so it would be nice to have the phones on their own separate subnet, and my current understanding is that I would want a separate VLAN to use with that separate subnet. Also, in freeing up IP addresses on our company LAN, I've given myself more IP space for my fail over DHCP server should I ever need it.

                                    scottalanmillerS 3 Replies Last reply Reply Quote 0
                                    • dave247D
                                      dave247 @coliver
                                      last edited by dave247

                                      @coliver said in VLAN confusion:

                                      @dashrender said in VLAN confusion:

                                      As for your Lab network, you have choices, you can create a completely separate VLAN that only has access to itself and the internet via the sonicwall, or you can enable ACLs that allow the two networks to talk to each other and the Sonicwall will route information between the two.

                                      He could setup an ACL that only allows the Lab VLAN to contact the internet, and his workstation. What kind of lab is this going to be though? You could easily do this virtually on a desktop with Hyper-v or KVM.

                                      I have a couple extra servers that I want to set up a Hyper-V lab environment with. That server's in the server room and so I wanted to just have it sitting on it's own VLAN with access to the internet and my workstation only. I could use my local workstation, but what's the fun in that when I have big fat juicy servers I can use?

                                      1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @dave247
                                        last edited by

                                        @dave247 said in VLAN confusion:

                                        Well, actually, here's one thing I just thought of. We currently have a /23 network where I work, and our current phone system exists on the same network as our computers and servers. We have a lot of addresses taken up by phones right now, so it would be nice to have the phones on their own separate subnet, ......

                                        No, it would not. You identified the mistake, but made a bad leap in how to fix it. Let's read that again...

                                        1. We have a /23 network.
                                        2. The /23 is too small for our needs.
                                        3. We should....

                                        Logically the answer is "make a network of the right size for our needs." But instead, you jumped to subnetting.

                                        dave247D 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @dave247
                                          last edited by

                                          @dave247 said in VLAN confusion:

                                          ... and my current understanding is that I would want a separate VLAN to use with that separate subnet.

                                          Also incorrect. VLANs basically require subnetting (or overlaps) but you never use a VLAN for subnetting. Subnets are simple and effective, VLANs are complex. You only use a VLAN for management and security purposes, never performance, subnetting or any other purpose.

                                          dave247D 1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @dave247
                                            last edited by

                                            @dave247 said in VLAN confusion:

                                            Also, in freeing up IP addresses on our company LAN, I've given myself more IP space for my fail over DHCP server should I ever need it.

                                            I don't understand this bit.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 9
                                            • 10
                                            • 1 / 10
                                            • First post
                                              Last post