Chapter 3: Vlans: Routing & Switching
Chapter 3: Vlans: Routing & Switching
Chapter 3: Vlans: Routing & Switching
Presentation_ID
Cisco Confidential
Chapter 3
3.1 VLAN Segmentation
3.2 VLAN Implementation
3.3 VLAN Security and Design
3.4 Summary
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Overview of VLANs
VLAN Definitions
A VLAN is a logical partition of a Layer 2 network.
Multiple partitions can be created, allowing for multiple VLANs to
co-exist.
Each VLAN is a broadcast domain, usually with its own IP network.
VLANs are mutually isolated and packets can only pass between
them via a router.
The partitioning of the Layer 2 network takes place inside a Layer
2 device, usually via a switch.
The hosts grouped within a VLAN are unaware of the VLANs
existence.
Presentation_ID
Cisco Confidential
Overview of VLANs
Presentation_ID
Cisco Confidential
Overview of VLANs
Benefits of VLANs
Security
Cost reduction
Better performance
Shrink broadcast domains
Improved IT staff efficiency
Simpler project and application management
Presentation_ID
Cisco Confidential
Overview of VLANs
Types of VLANs
Data VLAN
Default VLAN
Native VLAN
Management VLAN
Presentation_ID
Cisco Confidential
Overview of VLANs
Presentation_ID
Cisco Confidential
Overview of VLANs
Voice VLANs
VoIP traffic is time-sensitive and requires:
The voice VLAN feature enables access ports to carry IP voice traffic
from an IP phone.
The switch can connect to a Cisco 7960 IP phone and carry IP voice
traffic.
The sound quality of an IP phone call can deteriorate if the data is
unevenly sent; the switch supports quality of service (QoS).
Presentation_ID
Cisco Confidential
Overview of VLANs
Presentation_ID
Cisco Confidential
10
Overview of VLANs
Presentation_ID
Cisco Confidential
11
VLAN Trunks
Presentation_ID
Cisco Confidential
12
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Cisco Confidential
15
Presentation_ID
Cisco Confidential
16
Presentation_ID
Cisco Confidential
17
Presentation_ID
Cisco Confidential
18
Presentation_ID
Cisco Confidential
19
VLAN Assignment
Presentation_ID
Cisco Confidential
20
VLAN Assignment
Creating a VLAN
Presentation_ID
Cisco Confidential
21
VLAN Assignment
Presentation_ID
Cisco Confidential
22
VLAN Assignment
Presentation_ID
Cisco Confidential
23
VLAN Assignment
Presentation_ID
Cisco Confidential
24
VLAN Assignment
Presentation_ID
Cisco Confidential
25
VLAN Assignment
Deleting VLANs
Presentation_ID
Cisco Confidential
26
VLAN Assignment
Presentation_ID
Cisco Confidential
27
VLAN Assignment
Presentation_ID
Cisco Confidential
28
VLAN Assignment
Presentation_ID
Cisco Confidential
29
VLAN Assignment
Presentation_ID
Cisco Confidential
30
VLAN Assignment
Presentation_ID
Cisco Confidential
31
VLAN Assignment
Presentation_ID
Cisco Confidential
32
Introduction to DTP
Switch ports can be manually configured to form trunks.
Switch ports can also be configured to negotiate and establish a
trunk link with a connected peer.
The Dynamic Trunking Protocol (DTP) manages trunk negotiation.
DTP is a Cisco proprietary protocol and is enabled, by default, in
Cisco Catalyst 2960 and 3560 switches.
If the port on the neighbor switch is configured in a trunk mode that
supports DTP, it manages the negotiation.
The default DTP configuration for Cisco Catalyst 2960 and 3560
switches is dynamic auto.
Presentation_ID
Cisco Confidential
33
Presentation_ID
Switchport nonegotiate
Cisco Confidential
34
Presentation_ID
Cisco Confidential
35
Missing VLANs
Presentation_ID
Cisco Confidential
36
Presentation_ID
Cisco Confidential
37
Presentation_ID
Cisco Confidential
38
Presentation_ID
Cisco Confidential
39
Presentation_ID
Cisco Confidential
40
Presentation_ID
Cisco Confidential
41
Attacks on VLANs
Presentation_ID
Cisco Confidential
42
Attacks on VLANs
Double-Tagging Attack
Double-tagging attack takes advantage of the way that hardware on
most switches de-encapsulate 802.1Q tags.
Most switches perform only one level of 802.1Q de-encapsulation,
allowing an attacker to embed a second, unauthorized attack header
in the frame.
After removing the first and legit 802.1Q header, the switch forwards
the frame to the VLAN specified in the unauthorized 802.1Q header.
The best approach to mitigating double-tagging attacks is to ensure
that the native VLAN of the trunk ports is different from the VLAN of
any user ports.
Presentation_ID
Cisco Confidential
43
Attacks on VLANs
Presentation_ID
Cisco Confidential
44
Attacks on VLANs
PVLAN Edge
The Private VLAN (PVLAN) Edge
feature, also known as protected
ports, ensures that there is no
exchange of unicast, broadcast, or
multicast traffic between protected
ports on the switch.
Local relevancy only.
A protected port only exchanges
traffic with unprotected ports.
A protected port does not exchange
traffic with another protected port.
Presentation_ID
Cisco Confidential
45
Presentation_ID
Cisco Confidential
46
Chapter 3: Summary
This chapter:
Introduced VLANs and their types
Described the connection between VLANs and broadcast domains
Discussed IEEE 802.1Q frame tagging and how it enables
differentiation between Ethernet frames associated with distinct
VLANs as they traverse common trunk links.
Examined the configuration, verification, and troubleshooting of
VLANs and trunks using the Cisco IOS CLI and explored basic
security and design considerations.
Presentation_ID
Cisco Confidential
47
Presentation_ID
Cisco Confidential
48