06-27-2018 07:12 AM - edited 03-08-2019 03:30 PM
I am going to dive into networking and after reading many guides and watching many videos
I have some questions and I would like you to help me.
Let's say that we have Layer 3 switches and we decided that we will divide the network in 5 different vlans.
IT: vlan2 - 10.10.2.0/22
Workstations: vlan10 - 10.10.10.0/22
Machines: vlan20 - 10.10.20.0/22
WiFi: vlan30 - 10.10.30.0/22
Voice: vlan40 - 10.10.40.0/22
1. Will there be communication between vlans or it will be blocked because of the separation and I have to configure intervlan routing?
The reason that I need communication is because many users from vlan10 have to connect to
server on vlan2 via RDP (Remote Desktop Connection).
2. In case I won't have communication do I have to set the ports as trunk and allow the vlans
that each port (connected) end device has to have connection with?
3. On the trunk port which will be for the communication between the switches do I have to set
a vlan as untagged or should I leave them all tagged?
Thank you!
06-27-2018 07:31 AM - edited 06-27-2018 07:32 AM
For VLANs to communicate you would need SVI/logical interfaces with IP address on them. For communication between VLAN 10 and 2 you would need an SVI for both VLANs.
Packets within the switch/fabric are identified to belong to a certain VLAN because of the tag on them. No tag means no VLAN.
Switch ports connecting to end devices are usually placed in access mode...meaning an untagged frame will enter switch port and will be tagged with the vlan you specify alongwith access mode configuration.
HTH.
06-27-2018 07:40 AM
Hello,
By default in a L3 switch if you have "ip routing" enabled in the device all the vlans will have communication between them, if you want to add security you have to create ACLs in the interfaces vlan. How many switches do you have and where you will configure the gateways of the vlans?
On the other hand you have to leave the vlans tagged, you can define the vlans you want to permit in the trunk interface by configuring "switchport trunk allowed vlan {list of vlans separated by comma}
Please do not forget to rate useful post.
Best Regards,
06-27-2018 12:37 PM
06-27-2018 03:11 PM - edited 06-27-2018 03:13 PM
The original post asks 3 questions, of which the first is the most important. Here are my responses to the 3 questions.
1) will there be communication between the vlans? On a layer 3 switch the default is that ip routing is not enabled. In this case there will not be any communication between the vlans. If you want communication between the vlans you either need to enable ip routing on the switch, or you need to connect the switch to a router using a trunk port where the router has sub interfaces configured matching each of the vlans.
2) is a somewhat confused question but seems to be asking if configuring trunk ports would enable the vlans to communicate. The answer is that no, enabling trunk ports will not facilitate communication between the vlans.
3) asks about trunk ports and tagged vs untagged vlans. The answer here is that one vlan on the trunk port (identified as the native vlan) will be untagged and that all other vlans will be tagged. A common practice is to maintain the default native vlan being vlan 1, but not to assign ports to vlan 1, to assign ports to the other vlans, each of which would be tagged on the trunk port. Note that having a trunk does not facilitate communication betweens vlans and it does not matter whether the vlans are tagged or untagged.
HTH
Rick
06-27-2018 04:10 PM
06-28-2018 09:00 AM
I generalized when I made my statement that by default ip routing is not enabled on layer 3 switches. Joseph correctly points out that what I should have said is that for most layer 3 switches ip routing is not enabled by default. Perhaps the original poster can clarify which model of layer 3 switch is used and then we will know if it is like the 6500 where ip routing is enabled by default or some other layer 3 switch.
The main point remains that if ip routing is enabled then there can be communication between the vlans and if ip routing is not enabled then the vlans will not communicate.
HTH
Rick
06-28-2018 11:21 AM - edited 06-28-2018 11:22 AM
As Rick notes, he is generalizing, but that also includes his recent statement "The main point remains that if ip routing is enabled then there can be communication between the vlans and if ip routing is not enabled then the vlans will not communicate."
Even when IP routing is enabled, on switches that support VRF and/or virtual routing, multiple VLANs might not route between themselves (because they aren't in the same routing topology). Such a configuration would be on the advanced/complex side, but one should be aware what Rick is describing might have exceptions.
Conversely, even when an individual L3 switch has IP routing disabled (effectively making it a L2 switch), another L3 device might route between the VLANs it hosts. I.e. to clarify what Rick is describing, he means that with IP routing disabled, that switch (effectively operating as a L2 switch) won't route between its VLANs, but again, the VLANs might be able to intercommunicate (route) due to other reasons.
As before, I really don't want to confuse, but also understand if you're have multiple L3 switches, there might be a bit more you need to "get right" to route between your VLANs. For instance, with an L3 switch, if you had 10 VLANs, but only had SVIs for 5 VLANs, you might route (on that switch) between those 5 VLANs, but not route (on that switch) between those VLANs without SVIs.
To IP route to/from networks, the L3 switch, besides needing IP routing enabled, will also need an interface with an IP on those networks.
07-02-2018 02:47 AM
Thank you all for the replies!
I will activate IP routing and will not configure ACL from the beginning as users in the network
needs to access sql/database servers.
How many switches do you have
7x48port Access switches + 1x 24port for 5 buildings, 4 in the main building and one on every other building, all the switches will be L3 except from 2 switches that will be L2.
You need tags so one L2 device can identify different VLANs with other. On Cisco devices you can only have one VLAN untagged. Each device should be configured to "know" which (normally the same) VLAN is using untagged frames.
Is there any reason to have IT Management VLAN untagged on the trunk ports between switches or I should have every vlan tagged?
The answer here is that one vlan on the trunk port (identified as the native vlan) will be untagged and that all other vlans will be tagged. A common practice is to maintain the default native vlan being vlan 1, but not to assign ports to vlan 1, to assign ports to the other vlans, each of which would be tagged on the trunk port.
So on a trunk port that I need to pass Data and Voice I configure data vlan as native to pass the traffic as untagged and Voice as tagged?
BTW: on L3 switches, it's generally a good practice not to pass VLANs between devices, rather you route networks between them. I.e. you might want to have many more VLANs/networks.
It is a good practice indeed but I will pass the vlans between the switches.
In case of using some L2 switches, the vlans will be able to pass but not communicate each other
because of the lack of routing capabilities of the device right? So each port can be assigned only on one vlan?
07-02-2018 04:21 AM
07-04-2018 07:10 AM
The switches are some HPE 1950 and 3810.
On the uplink trunk port between switches which vlan would you suggest to leave untagged?
In case of connecting on a port a switch which is unaware of vlans like "LinkSys LGS108P" will it connect to the assigned vlan of the port and lease an IP from the according range or it will connect to the untagged vlan?
07-05-2018 08:11 AM
07-08-2018 02:52 PM
I agree with Joseph that if you connect the switch which is not aware of vlans to an access port of the switch that is aware of vlans, then the switch which is not aware of vlans will participate in the assigned vlan and will lease addresses from the assigned range. It will not connect to the untagged vlan (unless the vlan of the port of the other switch happens to be the native vlan of that switch).
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide