Overview of Routing Between Virtual Lans: What Is A Virtual Lan?
Overview of Routing Between Virtual Lans: What Is A Virtual Lan?
This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
LAN Segmentation Security Broadcast Control Performance Network Management Communication between VLANs
LAN Segmentation
VLANs allow logical network topologies to overlay the physical switched infrastructure such that any arbitrary collection of LAN ports can be combined into an autonomous user group or community of interest. The technology logically segments the network into separate Layer 2 broadcast domains
Overview of Routing between Virtual LANs XC-31
whereby packets are switched between ports designated to be within the same VLAN. By containing trafc originating on a particular LAN only to other LANs in the same VLAN, switched virtual networks avoid wasting bandwidth, a drawback inherent to traditional bridged and switched networks in which packets are often forwarded to LANs with no need for them. Implementation of VLANs also improves scalability, particularly in LAN environments that support broadcast- or multicast-intensive protocols and applications that ood packets throughout the network. Figure 8 illustrates the difference between traditional physical LAN segmentation and logical VLAN segmentation.
Figure 8
Floor 3
Floor 2
Router
Floor 1
Security
VLANs also improve security by isolating groups. High-security users can be grouped into a VLAN, possible on the same physical segment, and no users outside that VLAN can communicate with them.
Broadcast Control
Just as switches isolate collision domains for attached hosts and only forward appropriate trafc out a particular port, VLANs provide complete isolation between VLANs. A VLAN is a bridging domain and all broadcast and multicast trafc is contained within it.
S6619
VLAN Colors
Performance
The logical grouping of users allows an accounting group to make intensive use of a networked accounting system assigned to a VLAN that contains just that accounting group and its servers. That groups work will not affect other users. The VLAN conguration improves general network performance by not slowing down other users sharing the network.
Network Management
The logical grouping of users allows easier network management. It is not necessary to pull cables to move a user from one network to another. Adds, moves, and changes are achieved by conguring a port into the appropriate VLAN.
VLAN Colors
VLAN switching is accomplished through frame tagging where trafc originating and contained within a particular virtual topology carries a unique VLAN identier (VLAN ID) as it traverses a common backbone or trunk link. The VLAN ID enables VLAN switching devices to make intelligent forwarding decisions based on the embedded VLAN ID. Each VLAN is differentiated by a color, or VLAN identier. The unique VLAN ID determines the frame coloring for the VLAN. Packets originating and contained within a particular VLAN carry the identier that uniquely denes that VLAN (by the VLAN ID). The VLAN ID allows VLAN switches and routers to selectively forward packets to ports with the same VLAN ID. The switch that receives the frame from the source station inserts the VLAN ID and the packet is switched onto the shared backbone network. When the frame exits the switched LAN, a switch strips header and forwards the frame to interfaces that match the VLAN color. If you are using a Cisco network management product such as VlanDirector, you can actually color code the VLANs and monitor VLAN graphically.
All three of these technologies are based on OSI Layer 2 bridge multiplexing mechanisms.
VLAN Interoperability
VLAN Interoperability
Cisco IOS features bring added benets to the VLAN technology. Enhancements to ISL, IEEE 802.10, and ATM LAN Emulation (LANE) implementations enable routing of all major protocols between VLANs. These enhancements allow users to create more robust networks incorporating VLAN congurations by providing communications capabilities between VLANs.
Inter-VLAN Communications
The Cisco IOS supports full routing of several protocols over ISL and ATM LANE virtual LANs. IP, Novell IPX, and AppleTalk routing are supported over IEEE 802.10 VLANs. Standard routing attributes, such as network advertisements, secondaries, and help addresses are applicable and VLAN routing is fast switched. Table 6 shows protocols supported for each VLAN encapsulation format and corresponding Cisco IOS releases.
Table 6 Protocol IP
Inter-VLAN Routing Protocol Support ISL Release 11.1 Release 11.1 Release 11.3 Release 11.3 Release 11.3 Release 11.3 Release 11.3 ATM LANE Release 10.3 Release 10.3 Release 10.3 Release 10.3 Release 11.0 Release 11.2 Release 11.2 IEEE 802.10 Release 11.1 Release 11.1 Release 11.3
Novell IPX (default encapsulation) Novell IPX (congurable encapsulation) AppleTalk Phase II DECnet Banyan VINES XNS
VLAN Translation
VLAN translation refers to the ability of the Cisco IOS software to translate between different virtual LANs or between VLAN and non-VLAN encapsulating interfaces at Layer 2. Translation is typically used for selective inter-VLAN switching of non-routable protocols and to extend a single VLAN topology across hybrid switching environments. It is also possible to bridge VLANs on the main interface; the VLAN encapsulating header is preserved. Topology changes in one VLAN domain do not affect a different VLAN.
Sharing resources between VLANs Load Balancing Redundant Links Addressing Segmenting Networks with VLANs Segmenting the network into broadcast groups improves network security. Use router access lists based on station addresses, application types, and protocol types. Routers and their Role in Switched Networks In switched networks, routers perform broadcast management, route processing and distribution, and provide communications between VLANs. Routers provide VLAN access to shared resources and connect to other parts of the network that are either logically segmented with the more traditional subnet approach or require access to remote sites across wide-area links.