- Aug 17, 2005
- 790
- 0
- 0
Hi there, I have a research project to do abotu VLANS and I am having trouble about what it exactly is. Can someone please explain to me wha tone is and how it works? Thanks much.
Originally posted by: melthemoose
tagging and untagging is used to determine the priority of traffic.
Hypothetical: 2 (VLAN #1 and VLAN #2) network streams arrive at 1 port simultaneously, which one goes 1st? with tagging, the IT folks can say that VLAN #2 traffic is more latency sensitive and should go 1st to avoid disrupting the enduser experience (ie voice or video traffic or the CEO download of porn). this is very common in high traffic networks with mission critical applications (voice is the most common) competing with "regular" traffic. Voice goes 1st otherwise you have some issues with your phones.
Tagging can occur on both layer 2 (ethernet) and layer 3 (IP) headers. So with L2 tagging, you can tag traffic from mac address A to go ahead of mac address B and with layer 3 "aware" switches they can peak into the IP header and see the tag and act on just the tag, but nothing else.
Confused yet?
Originally posted by: jlazzaro
You can assign multiple vlans to a single port (up to 250 or 64 depending on the model). However, you cannot configure multiple vlans to a port when trunking is configured because multi-vlan ports are not encapsulated.
!
Say you have three VLANs: VLAN1, VLAN2, VLAN3.Originally posted by: Brazen
Just out of curiosity, when would you use this?Originally posted by: jlazzaro
You can assign multiple vlans to a single port (up to 250 or 64 depending on the model). However, you cannot configure multiple vlans to a port when trunking is configured because multi-vlan ports are not encapsulated.
!
Originally posted by: her209
Say you have three VLANs: VLAN1, VLAN2, VLAN3.Originally posted by: Brazen
Just out of curiosity, when would you use this?Originally posted by: jlazzaro
You can assign multiple vlans to a single port (up to 250 or 64 depending on the model). However, you cannot configure multiple vlans to a port when trunking is configured because multi-vlan ports are not encapsulated.
!
Your servers are in VLAN3. You don't want VLAN1 and VLAN2 to be able to communicate to each other directly, but both need access to the same servers. You would make every port that is in VLAN3 also a member of VLAN1 and VLAN2.
Yeah, I know, I'm just grasping for straws. I need to figure something out and I don't want to have to run extra cable just for that one computer.Originally posted by: spidey07
Brazen,
That can't be done.
A LAN is a broadcast domain. A router by very definition is the boundary of a broadcast domain. You can't trunk through a router without some very sophisticated features and knowledge (QinQ trunking)
So you can't pass your tagged traffic through a router. To do what you're trying to do (make the router act like a switch) then you need to have the router do bridging. But at that point it isn't really a router, it is a bridge.
Originally posted by: randal
VPN! It is designed to allow a host to become a member of a routed/disparate/remote LAN. Well, sorta. But a VPN will allow a host on Segment#2 to be on Segment#1 without any recabling.
Originally posted by: Brazen
Originally posted by: randal
VPN! It is designed to allow a host to become a member of a routed/disparate/remote LAN. Well, sorta. But a VPN will allow a host on Segment#2 to be on Segment#1 without any recabling.
I thought about that, but there are 2 problems: 1) I need to make sure the computer on Switch2 can not access any of the other computers on switch2, and 2) This isn't a "computer" in the standard sense - It's an HVAC controller.
I think I've figured out a solution:
Reading around, I've found I can create a virtual interface on the linux router that can be attached to a VLAN. So for instance I can create a virtual interface on VLAN2 and set up switch2 to put that one computer on VLAN2. Then I'll just assign that computer it's own subnet and it will act like it's attached to a competely seperate interface on the router and on it's own switch, thanks to VLANs, without adding any additional equipment clutter!