cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
827
Views
15
Helpful
8
Replies

VLAN

Hi all,

Trying to setup a new system with DHCP controller/firewall, new switch L2/L3 48 ports and wondering generally what is the best approach in designing VLANs, when do you normally need/recommended to create them and when to avoid unnecessary complications.

Should you create a VLAN for exemple for your APs, one for your AV, one for your PC/Laptops etc and one for the guest? or what should be the criteria in general?

And should you set VLANs etc at the DHCP controller/firewall level or at the switch (if L3) level?

In a standard situation ideally what should be configured at the DHCP/firewall level and what left on the switch?

thank you!

thank you so much!

8 Replies 8

Hi VLANs, using for many purposes. first you need to understand where to use VLANs and not. normally VLANs using to segment broadcast domains in same physical broadcast domain. you can create separate VLANs for department, functionality or floor locations. this is depends on business requirement. DHCP for each vlan can configure at gateway device or server and use helper address to point server. you can check below guides to get understanding about VLAN designing and architecture.

https://www.cisco.com/c/en/us/support/docs/smb/routers/cisco-rv-series-small-business-routers/1778-tz-VLAN-Best-Practices-and-Security-Tips-for-Cisco-Business-Routers.html

https://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=11

Please rate this and mark as solution/answer, if this resolved your issue
Good luck
KB

Thank you @Kasun Bandara !

And generally is there a best order to proceed with? setup new DHCP controller/firewall etc first, then the switch or viceversa? Will have a good read through your links, thanks!

first identify your business requirement to use VLANs. for ex. you can create different VLANs for different departments. then create VLAN plan (vlan name, ip address subnet, DHCP range, etc) . after theat you can create those VLAN gateways on firewall/router and configure switches with VLANs. then map relevant switch ports to required VLANs.

Please rate this and mark as solution/answer, if this resolved your issue
Good luck
KB

You need to spend sometime and prepare or planning before you deploy

when you plan you need to plan how your network you looking to deploy what what is the future growth, so that will have VLAN information and IP Segment

So Make a Design how your network - Once that is approved - then plan WAN Router - since it requirement internet is must for you to test.

Then LAN Switches, DHCP Scopes, Firewall with default rules what need to go outof network.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Thank you!

Are there Cisco or general templates to use that help drafting a plan in a clear/not missing anything way?

this gives good insights to check and tables to plan

https://mail.employees.org/univercd/Feb-1998/cc/td/doc/product/rtrmgmt/sw_ntman/cwsimain/cwsi_1/cwsi1_ug/vldug/design.htm

Please rate this and mark as solution/answer, if this resolved your issue
Good luck
KB

You can find many check on google.com

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Joseph W. Doherty
Hall of Fame
Hall of Fame

Other posters' posts have much more detail, but in short we use VLAN/subnets for network scalability and/or for some kind of access control.

If you only have a single 48 port switch and/or similar number of wireless clients, you shouldn't have scalability issues.

When you mention "guests", wireless or wired, for those you may very much want them in their own L2/L3 segment where you control access to/from that segment.

L2/L3 separation of users from servers often is used, but not really needed, so much, for "tiny" networks (again, assuming, you don't want to add specific access control between users and servers).

As you mention a FW, if you create a DMZ, that too is often its own L2/L3 segment.

Oh, and you're quite correct in using multiple VLANs often adds additional complications, or as I like to call it, "care and feeding" needs.