• Home
  • Products
      • Back
      • Sports Bars
          • Back
          • Control System
          • Sports Bar Info
              • Back
              • Packages
              • Project Process
              • Competition
              • Video Integration
              • Audio Integration
          • Audio Streamer
      • Residential
          • Back
          • Home Automation
      • Digital Signage
          • Back
          • Overview
          • Mosaic Video Wall
      • Drivers
      • Installations
      • SmartRemote
          • Back
          • Introduction
      • Products
      • SmartScreen
      • RV / Marine
          • Back
          • Shelly Relays - RV Slide Control
  • Shop
  • Support
      • Back
      • Documentation
          • Back
          • Downloads
      • Dealers
      • Forum
      • Contact Us
  • About
  • Login
 

Product Documentation

Documentation
Hardware
SmartRemote1
SmartRemote Screen Protector1
myServer 5 Update1
Business Related Info
About Us6
Allonis Hardware and Support1
Become an Integrator1
Copyright notices and licenses for Open Source Software1
License Transfers1
Payment Options and other Ordering FAQ1
Privacy policy1
Streaming TV for my Bar / Restaurant1
System Licensing1
Getting Started
Common Tasks
Audio / Video Integration for Audio1
Audio / Video Integration for Video1
Remote Programming - How it Works1
File Storage FAQ1
Music Streamers1
myButton: Play an audio file upon pressing a Panic button1
Sending SMS messages from myServer1
Television Control1
Troubleshooting
Network Management1
Networking FAQ1
Setting a Static IP address1
Networking - Connect to a Device Default IP address1
Accessing myServer from the Internet1
myServer 6 Router1
myFirewall Installation1
Network Switches1
Network 24 and 48 Port 10G L3 Managed Switch (Rack)1
Network Security - myFirewall21
Network Security - myFirewall41
WiFi Router Configuration1
QR Code support via myServer 61
VLAN Network Setup1
VLAN Allonis L3 Switch Network Setup1
VLAN Support on myServer 6 Controllers - Raspberry Pi41
myServer 61
myServer Setup
Installation2
myServer Startup2
myServer Configuration1
myServer Configuration - 21
Sports Bar Project Process1
myServer 6 Controller Installation1
Adding Rooms to myServer1
Adding Lighting1
myServer 6 - Master Image Installation1
Find.myServer.fyi1
Flashing Pi CM4 using the IO Board1
Migrating to myServer 6 From Previous Versions1
MultiZone Audio Design - Commercial1
myServer 6 Installation on Mint OS1
myServer 6 Installation on Windows OS1
myServer 6 USB Installation1
Networking Basics1
Creating a Bootable Image on SDMicro and USB1
myServer Virtual Environment Installation1
myServer 6 Automation Events1
myServer 6 Command Syntax1
Macros - Naming Convention1
myServer Backup and Restore1
Core System Capabilities1
MQTT
Broker
Certificate
Discovery
Testing your Setup
Logging
myServer 6 Hardware
myServer 6 1.5U Rack Mount Hardware1
myServer 6 Shelf Mount1
myServer Features1
How To
User Interface Scene Transitions1
Advanced Configuration
Authentication
Remote Access
Master Image Updates1
3rd Party Automation System Integration
Home Automation Overview1
HomeAssistant Gateway Driver1
Homeseer Driver Installation
Node Red - Installation1
Why Automate your Home or Business1
QSC Core Driver1
Applets
TVListings App1
Weather App Installation1
Drivers1
Amplifiers
Audio Matrix
AES67 Audio IP Networking Overview1
Allen and Heath Audio Matrix Driver1
Atlas Atmosphere Audio Driver1
AVPro ACMax24A Audio Matrix1
BSS-100 Driver1
DBX - Driver1
DBX640 - Driver1
MonoPrice Blackbird Driver1
MRC88 Audio Matrix Driver1
QSC Audio Driver1
RTIADx Audio Driver1
Russound Rio Driver1
Russound RNET Audio Driver1
Wiring: Connecting RCA audio jacks to Phoenix Connectors1
DSP444 AES67 Audio over IP Driver1
DSP4428 AES67 Audio over IP Driver1
Audio Video Receivers
Anthem AVR Driver1
Denon Driver1
Integra AV Receiver Driver1
Marantz AudioVideo Receiver Driver1
Onkyo AVR Driver1
Blinds
Lutron Blinds1
Somfy RS485 Blinds1
Somfy Synergy UAI+ Blinds1
Somfy Z-Wave Blinds1
TRO.Y Blinds Controller Driver1
Bond Bridge - Shades1
Camera
BlueIris Camera NVR1
Hikvision IP PTZ Camera Setup1
IP Camera Integration1
IP Camera PTZ Driver1
Lumens Camera Driver1
Ubiquiti IP Camera Setup1
Samsung NVR Driver1
Armcrest IP Cameras1
IPCamera Wyze Integration1
Contact / Motion Sensor
Control Device
Harmony Hub Driver1
MyQ Garage Door Opener1
Tablet Power Solutions1
Infrared Control1
UPS Monitor Driver1
UPS myServer Pi Driver1
VideoStorm irUSB1
Elgato Stream Deck1
Shotbox Driver1
Ratgdo Garage Door Control1
Energy
AccuEnergy Driver1
Fan
Bond Bridge - Fans
Intercom
Keypad
Lighting
DMX Lighting1
Lutron Caseta Driver1
Lutron Driver1
Phillips Hue Driver1
Lighting Sim Driver1
Powerline DMX Pool Lighting1
Shelly Automation Device Driver1
Media Player
AndroidTV Driver1
AppleTV control1
Blu100 Driver1
BluRay Player IR Control1
Cable TV - IR1
DLNA Media Player Driver Installation1
Emby Media Server Configuration1
eStream4K Device Using IR1
FireTV 4K Installation1
HEOS Driver1
Kodi Application1
Live Streamer Driver1
MediaMTX Streaming Media Driver1
MediaPlayer Audio Amp1
myAudioPlayer1
myMediaPlayer1
Oppo Blu-Ray Player Driver1
Roku Player Control1
Streaming Media Hardware Comparison1
Sony X1000 BluRay Driver1
Tivo Player Driver1
Sonos Driver1
Zidoo Media Players1
Media Service1
Streaming Music for Commercial Implementations1
TuneIn Application
Pool
Jandy Pools1
Projector
Optoma Projector Driver1
PJLink Driver1
BenQ Projector Driver1
Mitsubishi Projector Driver1
NEC Projector Driver1
Sony Projector
Vivitek Projector Driver1
JVC Projector Driver1
Sony VPL Projector Driver1
JVC LX-NZ30 Projector Driver1
Receiver
Relay
Digital Loggers1
Dingtian Relay Driver1
Electronic Salon GPIO Relay1
iMatic Relay Driver1
Satellite
DirecTV Driver1
Dish Network Driver1
Security System
DSC Security System Driver1
ELK Driver Installation and Use1
Security Simulator Driver1
Honeywell Security1
Outdoor Grill Integration
Traeger Grill Integration
Green Mountain Grill Driver
Sensor
1-Wire Temperature Sensor1
GPS Receiver Driver1
Water Tank Level Sensing1
Television / Monitor
Controlling TVs via CEC1
Generic TVIR2
HiSense TV Control1
NoHassle TV Driver1
Insignia TV Control1
LG TV Driver1
LGWebOS Driver1
Samsung BET Driver1
Samsung Signage TV Driver1
Samsung Tizen TV Driver1
Samsung TV Driver1
Sony TV Driver1
Sharp TV Driver1
Sunbrite TV Driver1
Viewsonic TV Driver1
PJLink Driver1
TCL TV Driver1
Peerless TV Driver1
Vizio TV Driver1
Thermostat
Climate Simulator1
EcoBee Thermostat1
Venstar Thermostat Driver1
Tuner
Video Matrix
Video Wall Control1
AVPro QuadView Driver1
AVPro Video Matrix2
ANeuVideo Driver1
Brightlink Video Switcher1
Factor A8 Matrix Switch Driver1
HDTV HDBaseT Driver1
HDTV Video over IP Driver1
AVOIP 4K Driver1
HDMI 36x36 Video Matrix1
HDMI Matrix Basics1
HDTV HDBitT Driver1
HDTV Quad Driver1
Just Add Power Driver1
Knox Video Switcher Driver1
MOiP Video Matrix Driver1
Shinybow Video Driver1
JTech Video Over IP ZTIP3001
Connectivity Technologies
CAN Driver1
Connecting Bluetooth Devices to a Windows PC1
Controlling a Water Valve via Tasmota Relay1
DMX
DMX - PKNight Art-Net controller setup1
Art-Net DMX Driver1
GenericGPIO Relay Driver1
Generic Modbus Driver1
Generic Serial Driver1
GlobalCache Driver1
IFTTT Configuration1
Infrared Control2
Matter1
MQTT Use1
OBD/VIC Driver1
OLA Service Monitor1
Raspberry BLE Device Driver1
Relays - IP controlled1
Sainsmart IP Relay Driver1
Serial to Net for Pi Installation1
Sonoff Devices1
Tasmota1
UPB Lighting Driver1
Waveshare GPIO Relay Driver1
Zigbee Driver1
Z-Wave JSUI Driver1
ZWay Raz Driver1
ESP32 Projects
ESP32 Doorbell Camera
ESP32 - Rotary Encoder1
User Interfaces
myDesigner 6
myDesigner 61
myDesigner 6 Installation1
myDesigner 6 Useage1
Administrator Template1
Modern
Modern Template - Phones1
Modern Template - Tablets1
Moonlight
Moonlight Template Strategy1
Moonlight - SmartRemote1
Moonlight - SmartPhone1
Moonlight - Tablet1
Sheer Template
Sheer Template - Phones1
Sheer Template - Tablets1
SportsBar
SportsBar - Tablet1
SportsBar - SmartPhone1
TV Placement1
Browser Compatibility1
Adding Grafana Charting into your UI1
Device Networking1
iPort Surface Mounts1
Setting up a Tablet for myServer 6 Templates1
Setting up an iPad / iPhone for system access1
Tools and Helpers
Developer Tools
Driver Examples

VLAN Network Setup

Setting up a virtual local area network (VLAN) can be a complicated process, especially if you’re operating a large enterprise network, a network with legacy or hybrid architectures, or a network with specific workloads that require additional security and regulatory compliance safeguards.

Here is an excellent YouTube for learning the basics of VLAN terms and configuration 

Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps — particularly steps five through eight — may be completed simultaneously, in a slightly different order, or even in a more automated fashion if you choose to set up a dynamic VLAN.

Example of a multi media network including Control, Video Over IP, AES67 digital audio VLANs:

DigitalMedia Networking 1

In this example the myServer controller is dually being used for control automation but also for NAT translation so the various downstream devices can access the Internet via the LAN1 (the "Bar's Network").

VLAN 10 is Control that also need access to the Internet (for content or updates)

VLAN 20 is Video Over IP

VLAN 30 is AES67 devices

VLAN 40 is for Control devices that do NOT need access to the Internet - like for TV on / off integration (prevents unauthorized firmware updates)

Each VLAN keeps it's content to it's own network which keeps the content from congesting the other networks.

myServer needs to be a member of all of those networks so it can control the devices on the respective networks.  myServer's ethernet network interface is "tagged" to be a member of all VLANs.

The Control network is for items like:  DirecTV receivers, TVs to control power on / off, streaming devices that not only need to be controlled, but also need access to the Internet for streamed content.

In this example the "16 port" L3 switch manages the different VLANS and particular ports are assigned to the specific VLANs.  VLAN particular downstream switches are then connected to those ports that connect to the VLAN specific device types.

Address reservations via DHCP are managed by either the "16 port switch" or via myServer's built in DHCP server.  All Devices can either be Static IP addressed, or DHCP reserved (so the addresses never change from what is assigned).

 

1. Brainstorm VLAN Groupings

In a traditional local area network with no virtualized barriers, all devices and network components communicate and share information with each other; you’re likely setting up a VLAN in the first place because this foundational setup is too loose for your requirements.  Typical would be for Video Over IP or Audio over IP or Point of Sale or Camera specific networks. But what are the ideal segments that will make your network function optimally and securely?

At this point in VLAN creation and configuration, it’s time to determine what VLAN groupings make the most sense for your network’s strategic complexities. Consider not only how many VLANs you’ll need but also the purpose each VLAN will serve and how they need to be set up to fulfill that purpose. While many organizations stick to more traditional boundaries like physical locations or departments, there may be more effective and secure ways for you to group and set up VLAN rules.

For example, if your company works closely with a third-party professional services firm that needs access to certain HR and security applications and data but not others, you could divide your VLANs based on which ones need looser versus stricter identity and access management controls. From there, determine which users and devices will align with and be assigned to each grouping.

2. Prepare Unique VLAN IDs

Every single VLAN you set up will need a unique VLAN identification number so you can segment network traffic to the appropriate places and keep documentation organized for multiple VLANs simultaneously. VLAN IDs are purely numeric and range from one to 4,095. While you don’t necessarily “need” these VLAN IDs to be operational yet, it’s a good idea to figure them out now so you can use them when labeling your network diagram in the next step.

3. Create a Logical Network Diagram or Map


Before you even begin setting up your VLANs and connecting devices and switches, the best way to ensure a successful VLAN network setup is to map out the specificities and relationships of your network with a network diagram. The labels and connections you illustrate at this stage of VLAN creation will give you the labels and organizational structure you need to keep track of all the devices, switches, routers, and other components necessary to fulfill your architectural plans.

Your team may choose to create this diagram manually or with tools that are already in your portfolio. However, a number of free and low-cost network diagramming tools specifically offer templates and icons that make it easier to illustrate the network you’re setting up, often with low-code/no-code interfaces and tools. If you’re interested in finding a network diagramming tool to make this step more efficient, consider investing in a network diagram software like Vizio.

4. Optional: Purchase Additional Equipment

Based on the VLAN grouping requirements and design(s) you’ve developed in the previous three steps, you should have a clearer picture of any missing hardware or software that you need to purchase. Perhaps you have more VLAN groupings than you expected and need to bring in additional switches and routers. Or maybe your organization is growing quickly, and you want to purchase new switches with more ports for more devices. There’s also the possibility that you are moving from a primarily on-premises network setup to a hybrid or cloud setup that requires new software or third-party relationships.

Regardless of your new requirements, start by creating an inventory list of any networking equipment you currently own, including information about switch and router formats, configurations, port counts, speeds, and other details pertinent to VLAN setup. From there, make a separate list of the networking tools you’re missing, the cost of these missing tools, and any other specialized information that should be considered during the buying process. 

5. Connect Network Devices to Appropriate Switch Ports

You should now connect VLAN servers, end-user devices, and other relevant network devices — as long as their IP addresses are already configured — to the switch ports that have been selected for the corresponding VLAN group. While individual devices, ports, switches, and routers have not yet necessarily been configured in their settings to align with a certain VLAN and function, you should still know which devices and network components have been set aside for which VLANs. If you’re unsure about the switch ports that should be connecting to each device, reference your network diagram (or go back to the network diagramming stage and create a more detailed diagram). 

If you are opting to create a dynamic VLAN instead of a static VLAN, steps five through eight may look a little different for you. For example, you may spend these steps creating or identifying the appropriate rule-based protocols for your devices and setting up automation rules rather than manually connecting ports and devices to VLANs.

6. Configure Switch Ports

Now that your devices are connected to the correct switch ports, it’s time to configure the switch ports so they can perform according to their assigned functions. Many of your ports will simply need to be set up as access ports in the switch’s settings; an access port is a simple connection that allows devices to connect to only one VLAN. Access ports are most appropriate for devices and users that will not be using VLAN tagging or participating in inter-VLAN routing. 

Trunk ports are also configured in a switch’s settings, but they are designed to manage higher bandwidth traffic and can manage traffic for more than one VLAN. Devices should only be connected to trunk ports if they have been authorized and configured for VLAN tagging and inter-VLAN routing. Before moving on to the next step, double-check that devices are connected to the correct type of switch port for their operational needs.

7. Set up VLAN Specifications via Network Switch Settings

All of the prework is done: It’s time to actually create the virtual local area networks you want through network switch settings. You’ll do this by accessing your network switch management interfaces and going to the section where you can create VLANs. Create the number of VLANs you determined were necessary in previous steps and assign them the unique VLAN IDs you selected in step two.

8. Assign Switch Ports to VLANs

Again, keep in mind that steps five through eight may go in a slightly different order, depending on your team and their preferences. So if you have not yet assigned switch ports to the appropriate VLAN, it’s time to do that now. Tagged ports (trunk ports) are likely already associated with the correct VLANs, but you should confirm that they are set up correctly at this time. For untagged ports (access ports), you’ll need to manually connect them to the correct VLAN. Remember, trunk ports can be associated with more than one VLAN, if appropriate.

9. Optional: Add VLAN Tags

VLAN tagging is the process through which VLAN network traffic is further segmented and specialized. When VLAN tags are in use, associated devices and ports automatically interact with devices and ports that share those same tags; however, tags also give network administrators the power to further direct traffic and support case-by-case inter-VLAN routing scenarios. 

VLAN tagging is most appropriate for networks with complex traffic patterns and a diverse range of users, devices, and security permissions. If you choose to set up trunk ports with multiple VLANs running through them, as demonstrated in step six, you’ll need to make sure at least some of your VLANs receive tags so traffic doesn’t get muddled in trunk ports. 

If you’re not sure if your network would benefit from VLAN tags, read this in-depth article on the topic to help you make your decision: Tagged vs. Untagged VLAN: When You Should Use Each.

10. Optional: Configure Inter-VLAN Routing

If your network requires VLAN-to-VLAN communication as a part of its regular operations, you’ll want to use the VLAN tags you set up in the previous step to direct inter-VLAN routing. While it sounds counterintuitive to open traffic flow between VLANs, many organizations choose to do this because the different layer at which routers operate makes it possible for them to still control what types of traffic flow across VLANs and when and how devices and users move from VLAN to VLAN. As part of the inter-VLAN configuration step, you may also need to set up or double-check your VLAN access controls, ensuring only approved users and devices can take advantage of inter-VLAN routing.

11. Quality-Test Your VLAN

Now that everything’s set up, it’s time to test network connectivity and performance. Make sure that all devices within the same VLAN are able to interact with each other and, conversely, that they are not able to reach devices in other VLANs. Ping and traceroute are both effective tools for testing VLAN connectivity and performance, but a number of other network security and management tools may be appropriate as well.

12. Document and Reassess VLAN Performance Periodically

Enterprise networks in particular frequently change as more devices and users, new hardware and software requirements, and new operational and security use cases arise. Network administrators and/or network security team members should maintain an up-to-date network diagram, equipment inventory, changelogs, and other configuration documentation so it’s easy to see what the network looks like now, if and where any vulnerabilities have reared their heads, and if any other changes are necessary to improve network performance. Each time you go through this process, update your documentation so you have a full history of the network and what you’ve done to maintain it.

Should You Use a Static VLAN or Dynamic VLAN?

Static and dynamic VLANs bring different advantages to network administrators, depending on the size, complexity, and requirements of their network. Below, we’ve explained how each type works and when you should use it.

Static VLAN

Static VLANs exist when network administrators manually connect network devices to physical switch ports and those devices receive their VLAN assignment based on that connection. If the device ever needs to be reassigned to a new VLAN, the network administrator would physically connect it to a new switch port that is already associated with that VLAN. In other words, a static VLAN is one in which switch ports are assigned to VLANs and devices are not assigned to VLANs; they receive their orders directly from the switch port they’re connected to.

This type of VLAN is best for smaller networks, or networks that change infrequently and include fewer VLAN segments because network administrators have to manually connect (and sometimes reconnect) devices to the right ports for them to work. With a larger network that’s changing frequently, this task alone could become a full-time job and riddled with errors. Static VLANs are most advantageous for network administrators who need an easy-to-setup VLAN with predictable infrastructure and limited authentication needs.

Dynamic VLAN

A dynamic VLAN is one in which devices are assigned to that VLAN on a dynamic and semi-automated basis. Specialized criteria determine which devices are assigned to which VLANs and when. These criteria may include specialized network access controls and protocols, VLAN membership policy servers (VMPS) and databases, or some other combination of servers and data-driven rules. With a dynamic VLAN, devices are assigned to VLANs while ports frequently are not assigned to particular VLANs; they are simply the conduit through which pre-assigned device traffic flows.

Dynamic VLANs are best for larger and more complex networks that need to maintain frequently changing authentication and usage rules. It’s a much more difficult implementation process when compared to static VLAN, but for more strenuous network rules and requirements, dynamic VLAN ultimately saves network professionals time in the long run, as they can simply update protocols and VMPS entries when new VLAN assignments are needed across multiple devices.

Bottom Line: The Importance of Preparation for Optimal VLAN Performance

While the actual process of setting up a VLAN can be as simple as updating network switch settings and connecting devices to VLAN switch ports, the strategy behind a successful VLAN setup can be much more daunting. You’ll need to consider any specialized security or compliance requirements, the different device types that need access, and the resources and monitoring it will take to set up and sustain an efficient VLAN. 

All the steps listed above are crucial aspects of creating and configuring a sustainable VLAN network. But perhaps the most important step of all is documenting your thought process and your network architecture, especially as they change over time. Maintaining detailed documentation will help your existing network and security team members stay on top of the most pertinent network updates and issues while simultaneously ensuring that any future members of the team receive the foundational training necessary to successfully work in your VLAN ecosystem.

 

 

 

 

Setting up a VLAN (Virtual Local Area Network) is a fundamental network configuration task that allows you to logically segment a network without changing its physical layout. VLANs are used to improve network performance, enhance security, and simplify management by dividing a single physical network into multiple logical networks.

By grouping devices on the same VLAN, even if they’re physically dispersed, you control and isolate network traffic, reduce broadcast traffic, and manage different user groups more efficiently.

VLAN setup is beneficial in various environments, from small offices to large enterprise networks, as it allows better control over network resources, minimizes security risks, and facilitates efficient troubleshooting. Whether segmenting traffic by department, user type, or security level, VLANs are essential for creating a flexible, scalable, and secure network infrastructure.

The process of creating a VLAN typically involves configuring network switches to assign specific ports or devices to a VLAN, assigning each VLAN a unique ID, and setting up IP address ranges for each VLAN. Devices within a VLAN can communicate with each other directly, but traffic between different VLANs requires inter-VLAN routing, typically through a router or Layer 3 switch.

A Layer 3 switch combines switching and routing capabilities, enabling high-speed data forwarding within networks and facilitating inter-VLAN routing, enhancing network performance and management. So, if you’ve got the right equipment, let’s get started with setting it up.

Note: while we have tried to make the whole exercise of setting up a VLAN as simple as possible, it is assumed that you, the reader, have a basic grasp of network configuration. We also assume that you have a working knowledge of the concepts, and purposes, of IP addresses, gateways, switches, and routers. In addition, you also need to know about navigating the interface and sub-interface configuration procedures on computers and networking devices.

Step-by-step – How to set up a VLAN

The best way to learn how to set up a VLAN – apart from going to networking school – is to actually do it in a practical exercise.   Our assumptions are you have an Allonis L3 Network switch that supports VLANs.

Physical and Logical Connections

In this network configuration, our router will have a single physical or logical connection to our network. This router will help bridge the two VLANs – that cannot communicate with one another – by connecting to our switch via a single cable.

Data Packet Journey

Here’s how it works: data packets that are sent out from a computer in the Accounting VLAN – and intended for a computer in the Logistics VLAN – will travel to the switch. The switch, upon recognizing the packets need to cross over to another VLAN, will forward the traffic to the router.

Understanding Sub-Interfaces

The router, meanwhile, will have one physical interface (a network cable, in our example) that has been split into two logical sub-interfaces. The sub-interfaces will each be authorized to access one VLAN.

Packet Forwarding Mechanism

When the data packets arrive at the router, they will be forwarded to the correct VLAN via the authorized sub-interface and then arrive at their intended destination.

Our Router on a Stick VLAN setup, with inter-VLAN capabilities, will look like this:

https://cdn.comparitech.com/wp-content/uploads/2021/02/How-to-Set-Up-a-VLAN-final-design-300x170.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 628px) 100vw, 628px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/How-to-Set-Up-a-VLAN-final-design-300x170.jpg 300w" alt="How to Set Up a VLAN final design" width="628" height="355" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Planning your tasks

The whole task of creating our network architecture will be divided into four main categories where you will:

  • Connect all devices to form the correct architecture
  • Configure interfaces so all the devices can “talk” to one another
  • Create VLANs and assign computers to their respective VLANs
  • Confirm correct configuration by demonstrating the computers cannot communicate beyond their VLAN

So, without further ado, let’s start creating our VLAN. Remember, it will initially have a switch and four computers connected to it. You can bring the router into the design later if you choose to do so.

Connect all devices

Drag and drop a switch, a router, and four computers into the main design board. For our demo, we will be using a 2960 switch and a 2911 router. The switch will connect to four computers (PC0, PC1, PC2, and PC3) using copper straight-through wire connections (you will see the description of the hardware and connection types at the very bottom of the Tracer window).

Next, connect the switch to each computer using the FastEthernet ports.

https://cdn.comparitech.com/wp-content/uploads/2021/02/Connecting-switch-and-computers-1-300x170.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 628px) 100vw, 628px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Connecting-switch-and-computers-1-300x170.jpg 300w" alt="Connecting switch and computers 1" width="628" height="355" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Once all devices are connected you should have all-green traffic flowing between the devices. As the tool tries to emulate devices booting and connecting in the real world, it might take a minute or two. So don’t worry if the data flow indicators remain orange for a few seconds. If your connections and configurations are correct, it will all soon change to green.

https://cdn.comparitech.com/wp-content/uploads/2021/02/Connecting-switch-and-computers-2-300x170.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 628px) 100vw, 628px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Connecting-switch-and-computers-2-300x170.jpg 300w" alt="Connecting switch and computers 2" width="628" height="355" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

To make things easier to grasp, let’s mark the two computers on the left as belonging to the Accounting department (blue) and the other two as belonging to the Logistics departments (red).

https://cdn.comparitech.com/wp-content/uploads/2021/02/ACCT-and-LOGS-VLAN-300x170.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 628px) 100vw, 628px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/ACCT-and-LOGS-VLAN-300x170.jpg 300w" alt="ACCT and LOGS VLAN" width="628" height="355" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Configure interfaces

Now, let’s start assigning IP addresses so our computers can start communicating with one another. The IP assignments will look like this:

  • ACCT PC0 = 192.168.1.10/255.255.255.0
  • ACCT PC1 = 192.168.1.20/255.255.255.0
  • LOGS PC2 = 192.168.2.10/255.255.255.0
  • LOGS PC3 = 192.168.2.20/255.255.255.0

The default gateway for the computers is 192.168.1.1 for the first two in Accounting, and 192.168.2.1 for the last two computers in Logistics. You can access the configuration by going to the Desktop menu and then clicking on the IP Configuration window.

https://cdn.comparitech.com/wp-content/uploads/2021/02/Desktop-configuration-and-IP-configuration-menu-300x170.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 628px) 100vw, 628px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Desktop-configuration-and-IP-configuration-menu-300x170.jpg 300w" alt="Desktop configuration and IP configuration menu" width="628" height="355" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Once you’re there, start filling in the configurations for all the computers:

https://cdn.comparitech.com/wp-content/uploads/2021/02/IP-address-and-Default-Gateway-configuation-300x292.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 563px) 100vw, 563px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/IP-address-and-Default-Gateway-configuation-300x292.jpg 300w" alt="IP address and Default Gateway configuration" width="563" height="548" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

When you are done, we can now move on to the switch. First, though, we need to remember that there will be two types of ports on our switch:

  • Access Ports: these are the ports that will be used to allow everyday devices like computers and servers to connect to it; in our example, these are the FastEthernet 0/1, FastEthernet 1/1, FastEthernet 2/1, and FastEthernet 3/1 – one for each computer.
  • Trunk Ports: these are the ports that allow a switch to communicate with another switch – or in our example a VLAN-to-VLAN communication on the same switch (via the router) – to expand the network; we will use the GigaEthernet0/0 ports on both the connectivity devices.

With that in mind, let’s move on to the fun part – configuring the switch to run our VLANs.

Create VLANs and assign computers

So, let’s create the VLANs first – they will be named ACCT (VLAN 10) and LOGS (VLAN 20).

Go to the switch’s CLI to type in the commands:

Switch#config terminal

Switch(config)#vlan 10

Switch(config-vlan)#name ACCT

Switch(config-vlan)#vlan 20

Switch(config-vlan)#name LOGS

The commands in your CLI should look like this:

https://cdn.comparitech.com/wp-content/uploads/2021/02/Switch-create-VLAN-CLI-300x292.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 563px) 100vw, 563px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Switch-create-VLAN-CLI-300x292.jpg 300w" alt="Switch create VLAN CLI" width="563" height="548" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Or, if you’re not up to it, you can simply use the GUI to create the VLANs (and still see the commands run as they are being executed below). Go to the Config-VLAN Database menu and ADD the VLANs by entering their numbers (10,20) and names (ACCT, LOGS).

https://cdn.comparitech.com/wp-content/uploads/2021/02/Switch-create-VLAN-GUI-300x292.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 563px) 100vw, 563px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Switch-create-VLAN-GUI-300x292.jpg 300w" alt="Switch create VLAN GUI" width="563" height="548" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Next, we need to assign each port, which the switch uses to connect the computers, to their respective VLANs.

You can simply choose the interface and then check the box of the corresponding VLAN from the configuration menu on the right:

https://cdn.comparitech.com/wp-content/uploads/2021/02/Assign-switch-port-to-a-VLAN-300x292.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 563px) 100vw, 563px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Assign-switch-port-to-a-VLAN-300x292.jpg 300w" alt="Assign switch port to a VLAN" width="563" height="548" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

As you can see from the image above, you can alternatively go into the CLI interface of each port and use the command: switchport access vlan 10 to perform the same task.

Don’t worry; there is a shorter way of doing this in case there are a large number of ports to assign. For example, if you had 14 ports, the command would be:

Switch(config-if)#int range fa0/1-14

Switch(config-if-range)#switchport mode access

The second command makes sure that the switch understands the ports are to be ACCESS ports and not TRUNK ports.

Confirm correct configuration

And that’s it; we have created two VLANs on the same switch. To test it, and confirm our configuration is correct, we can try pinging P1 and P3 from P0. The first ping should be fine while the second one should time out and lose all the packets:

https://cdn.comparitech.com/wp-content/uploads/2021/02/VLAN-ping-test-no-router-272x300.jpg.webp 272w" type="image/webp" sizes="auto, (max-width: 584px) 100vw, 584px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/VLAN-ping-test-no-router-272x300.jpg 272w" alt="VLAN ping test - no router" width="584" height="644" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

How to set up an inter-VLAN

Rationale Behind Inter-VLAN

Now, although we have divided the computers into two VLANs – as was required – it makes more sense that the two departments (Accounting and Logistics) would need to communicate with one another. This would be the norm in any real-life business environment. After all, logistics couldn’t be purchased or supplied without financial backing, right?

Objective of Inter-VLAN Setup

So, we need to make sure that ACCT and LOGS are able to communicate – even if they are on separate VLANs. This means we need to create an inter-VLAN communication.

Initial Setup Requirements

Here’s how to go about it!

We will need the help of our router; it will act as a bridge between the two VLANS – so, go ahead and add a router to your design if you haven’t already done so.

Router and Switch Configuration

Jumping into the configuration, we must understand that we will use one port on the router for both VLANs’ communication by “splitting” it into two ports. Meanwhile, the switch will only use one TRUNK port to send and receive all communications to, and from, the router.

Sub-Interface Creation and Configuration

So, going back to our router, we will split the GigabitEthernet0/0 interface into GigabitEthernet0/0.10 (for VLAN10) and GigabitEthernet0/0.20 (for VLAN20). We will then use the IEEE 802.1Q standard protocol for interconnecting switches, routers, and for defining VLAN topologies.

Assigning the Sub-Interfaces

Once done, these “sub-interfaces” – as they called – are then assigned to each VLAN that we want to connect or bridge.

Setting IP Addresses for Sub-Interfaces

Finally, remember the gateways – 192.168.1.1 and 192.168.2.1 – we added to the computers’ configurations earlier? Well, these will be the new IP addresses of the split ports or sub-interfaces on the router.

The CLI commands to create the sub-interfaces under the GigabitEthernet0/0 interface would be:

Router (config)#interface GigabitEthernet0/0.10

Router (config-subif)#encapsulation dot1q 10

Router (config-subif)#ip address 192.168.1.1 255.255.255.0

Repeating it all for the second sub-interface and VLAN we get

Router (config)#interface GigabitEthernet0/0.20

Router (config-subif)#encapsulation dot1q 20

Router (config-subif)#ip address 192.168.2.1 255.255.255.0

Once you close the CLI, you can confirm your configuration is correct by simply moving the mouse over the router to see your work, which should look something like this:

https://cdn.comparitech.com/wp-content/uploads/2021/02/Router-sub-interface-configuration-shortcut-menu-300x170.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 628px) 100vw, 628px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Router-sub-interface-configuration-shortcut-menu-300x170.jpg 300w" alt="Router sub-interface configuration shortcut menu" width="628" height="355" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Now, we know that we can only connect our sub-interfaces (on the router) to our switch via its trunk port – and so, we will need to create it now.

All you need to do is go in the switch’s GigabitEthernet0/0 configuration and run: switchport mode trunk.

And there you have it; you have just created two VLANs that contain two computers each and which can still communicate with one another. You can prove this by pinging the first Logistics computer (PC2) with IP address 192.168.2.10 from the first Accounting computer (PC0) with the IP address 192.168.1.10:

https://cdn.comparitech.com/wp-content/uploads/2021/02/Ping-LOGS-PC-from-ACCT-PC-Success-300x292.jpg.webp 300w" type="image/webp" sizes="auto, (max-width: 563px) 100vw, 563px" style="box-sizing: border-box; font-weight: inherit; outline: 0px;" />https://cdn.comparitech.com/wp-content/uploads/2021/02/Ping-LOGS-PC-from-ACCT-PC-Success-300x292.jpg 300w" alt="Ping LOGS PC from ACCT PC - Success" width="563" height="548" style="box-sizing: border-box; border: 0px; vertical-align: middle; font-weight: inherit; outline: 0px; contain-intrinsic-size: 3000px 1500px; margin: 0px auto; display: block; max-width: 100%; height: auto; border-radius: 6px;" loading="lazy" decoding="async" />

Great Success!

Why set up a VLAN or inter-VLAN

At this point, some of you may be wondering why we would need to go through this exercise and bother with VLANs or inter-VLANs at all. Well, there are many reasons, some of which are:

  • Security Breaking up a network into components ensures that only authorized users and devices can access a sub-network. You wouldn’t want your accountants to interfere with the work of your logistics department or vice versa.
  • Safety In case there is a virus outbreak, only one subnet would be affected as the devices on one subnet wouldn’t be able to communicate – and thus transfer – the virus to another one. This way, clean-up procedures would be focused on that one subnet which also makes it easier to identify the culprit machine a lot faster.
  • Ensures privacy by isolation If someone wanted to find out about your network’s architecture (with the intent of attacking it), they would use a packet sniffer to map out your layout. With isolated sub-networks, the culprits would only be able to get a partial picture of your network thus denying them critical information about your vulnerabilities, for example.
  • Eases network traffic Isolated sub-networks can keep traffic usage down by keeping resource-intensive processes limited to their own scope and not overwhelming the whole network. This means, just because IT is pushing critical updates to the accounting machines, doesn’t mean the logistics department has to face a network slowdown too.
  • Traffic prioritization With businesses that have various types of data traffic the sensitive or resource-hogging packets (VoIP, media, and large data transfers, for example) can be assigned to a VLAN with larger broadband while those that only need the network to send out emails can be assigned to a VLAN with lesser bandwidth.
  • Scalability When a business needs to scale-up the resources available to its computers it can reassign them to new VLANs. Their administrators simply create a new VLAN and then move the computers into them with ease.

As we can see, VLANs help protect a network while also improving the performance of the data packets that travel around it.

Static VLAN vs Dynamic VLAN

We thought it would be worth mentioning that there are two types of VLANs that available for implementation:

Static VLAN

This VLAN design depends on hardware to create the sub-networks. The computers are assigned to a specific port on a switch and plugged right in. If they need to move to another VLAN, the computers are simply unplugged from the old switch and plugged back into the new one.

The problem with this is that anyone can move from one VLAN to another one by simply switching the ports they are connected to. This means administrators would require physical security methods or devices put in place to prevent such unauthorized accesses.

Dynamic VLAN

This is the VLAN we have just created in the exercise we did earlier. In this VLAN architecture, we have software VLANs where the administrators simply use logic to assign specific IP or MAC addresses to their respective VLANs.

This means devices can be moved to any part of the business, and as soon as they connect to the network, they return to their pre-assigned VLANs. There is no need for additional configurations.

If there is one drawback with this scenario, it can only be that the business would need to invest in an intelligent switch – a VLAN Management Policy Switch (VMPS) – which can be on the expensive side when compared to the traditional switch used in static VLANs.

It can also be safely assumed here that businesses with a few computers and a smaller IT budget can choose to implement a static VLAN while those with a large number of devices and a need for more efficiency and security would be wise to invest in a dynamic VLAN.

Conclusion

We hope you have found all the information you needed to learn about how to set up a VLAN. We also hope that the exercise was easy to follow and that you can now go on to build upon the knowledge you have gained. Because, even as you continue to scale upwards, these basic steps remain the same – you simply continue to add hardware and configurations to the basics.

VLAN FAQs

What is a VLAN?

A VLAN is a method that makes networks more efficient by reducing the scope of broadcast transmissions to just a section of the network. A broadcast goes to every part of the network, which can create a lot of traffic all over the system, including to areas that will never need to receive that broadcast or respond to it. Effectively, a VLAN divides up a network into sections.

How is a VLAN different from a LAN?

LAN stands for Local Area Network, which is the common name for a typical network inside an office. The virtual LAN (VLAN) creates sections of that LAN, which seem to be separate systems, even though they are actually all connected together. The segmentation of the LAN into VLANs happens at the Data Link Layer (Layer 2), so it is implemented on switches and bridges.

Routers are at the Network Layer (Layer 3). They operate for the entire network but use software techniques to distinguish between VLAN sections. The router can bridge between these sections with inter-VLAN routing.

What are the types of VLAN?

There are five types of VLAN:

  1. Default VLAN: Switches have settings that can implement VLANs but these are all initially set to VLAN1. As all switches have the same VLAN, there is only one VLAN operating, which effectively means that the technology is disabled.
  2. Data VLAN: Also known as a user VLAN, this strategy creates two groups: one for users and one for devices. This ill only carry data.
  3. Voice VLAN: Meant for the office telephone network and implemented with VoIP, this VLAN carries voice traffic. This traffic gets priority over data traffic to ensure a high quality of service.
  4. Management VLAN: Accesses the management functions of a switch for tasks such as logging, and extracting activity and status data for system monitoring. When other VLANs are set up, the management VLAN should be left as VLAN1.
  5. Native VLAN: Used for trunk ports that handle traffic from all VLANs, creating a common transmission channel that traffic can be split out of for individual VLANs.

 

Constructing a Virtual Local Area Network (VLAN)

In a system that includes other types of networked devices than Dante / AES67 or VideoOverIP, or a large-scale system that comprises of many media devices, you can avoid unnecessary packet transfers between the different types of device and make the network more stable by segmenting it. Ideally, a separate number of switches should be prepared for each network segment, but you can reduce the required number of switches and cables by using VLANs to create network segments. This method can reduce maintenance costs as well.

Network segmentation refers to the creation of virtual local area networks (VLANs) that are distinct from physical connections. When there are different types of networked devices within a system, you can create VLANs so that while the networks may share the same physical switches, they function as separate virtual networks.

Constructing a Virtual Local Area Network (VLAN)

You can provide connections between switches for each VLAN, but you can also use VLAN tagging so that data for various VLANs can be transferred over a single trunk (cable). This enables you to create virtual networks that are separate from the physical wiring.

Here, we will present an example in which two VLANs are created and the switches are connected by a trunk. For example, in a live system using a CL/QL Series console, VLAN 1 (ports 1 and 2) could be used as the control network and VLAN 2 (ports 3 to 8) could be used as the AES67 / Dante or VideoOIP network.  It is recommended to create separate VLANs for each media type ie: AES67 / Dante network vs. VideoOverIP network.

In the above example, it could also be said that VLAN 1 is the 100 Mbps control network while VLAN 2 is the broadband 1 Gbps network for audio transmission (Dante and / or AES67). By segmenting these networks, you can prevent the 1 Gbps network from overburdening the 100 Mbps network (although both networks coexist in the trunk). In the rest of this section, we will configure VLAN settings according to the example network configuration described above.

You can use network segmentation to connect the primary and secondary AES67/Dante lines to the same switch, but we recommend that you avoid doing this, because while connecting the lines to the same switch may provide the redundancy necessary for handling cable problems and other issues, if the switch malfunctions, both lines will be cut off.

Before you perform the following settings, make sure that the PC is connected to VLAN 1, which is the VLAN that you will be configuring first (in this example, the PC should be connected to port 1 or 2). VLAN 1 is a special default VLAN, so you should always connect the PC to a VLAN 1 port when you configure switch settings.

First, create the necessary VLAN. In the default settings, only VLAN 1 exists, so add VLAN 2. In the following page, click “Add”. In the VLAN ID box in the dialog box that appears, type “2”, and click “Apply”. When you are creating multiple VLANs, entering a VLAN name can help you identify each individual VLAN (but you do not have to enter a name).

Next, you will need to set the VLAN mode for each switch port. By default, each port is a trunk port, so you will have to change ports 1 to 8 to access ports. In the following page, select port 1, and then click “Edit”.  Click "VLAN / Port Setting" on Allonis L3 switches.

In the dialog box that appears, select “Access”.

Change ports 2 to 8 to access ports in the same way. To set the ports more quickly, click “Copy Settings” while port 1 is selected, and copy the settings to ports 2 to 8.

Next, assign each port to one of the VLANs. In the following page, you can specify which ports are allowed to access each VLAN.  For Allonis L3 switches, click on "VLAN / Membership". First, make sure that VLAN ID is set to “1” and Interface Type is set to “Port”. Ports 3 to 8 will not be included in VLAN 1, so set them to “Forbidden”. Ports 9 and 10 are the trunk ports, but VLAN 1 includes special default VLAN settings, so leave them set to “Untagged”. Before you switch to the settings for VLAN 2, don’t forget to click “Apply”.

To switch to the settings for VLAN 2, set VLAN ID to “2”, and click “Go”. Ports 1 and 2 will not be included in VLAN 2, so set them to “Forbidden”. Ports 3 to 8 will be included in VLAN 2, so set them to “Untagged”. Ports 9 and 10 are the trunk ports, so set them to “Tagged”.  On Allonis L3 Switches, "VLAN / Membership" you can choose a port and add it to the defined VLANS it should belong to.

The VLANs (VLAN 1 and VLAN 2) have now been successfully created within the switch, and the trunk ports (ports 9 and 10) make it possible for these virtual networks to span across switches. Don’t forget to save the settings after you change them.

 

Text from:

VLAN terms and configuration 

Intro

0:00
VLANs are one of the most complicated concepts to wrap your head around when you're getting started
0:05
with computer networking. Heck, I mean, they're even confusing for experienced network admins.
0:10
So in this video, I'm gonna try to break down the complex concept of VLANs to make them easier
0:15
to understand and therefore easier to use. So if VLANs are a concept that you've been struggling with,
0:22
pay careful attention to this video and hopefully by the end, you'll have a much greater understanding
0:28
of exactly how VLANs work. Okay, we've got a lot to cover, so let's get started.
0:34
VLANs can be difficult to understand.
0:40
So if you need any help configuring VLANs in your own network, the friendly and knowledgeable technicians
0:46
at Rogue Support are here to assist. Whether you wanna set up an isolated guest network or a secure subnet for all of your IoT devices,
0:54
Rogue Support technicians are well versed in VLAN setup and troubleshooting. It's as simple as opening up a ticket,
1:01
receiving bids on your job, and then working with the technician that you select on your schedule.
1:07
And you don't pay anything until your issue is resolved. We're also proud to announce the Rogue Support Referral Program
1:13
that allows you to make some extra cash by referring customers to Rogue Support for all of their computer networking,
1:20
security, and wireless needs. If you're interested in becoming a Rogue Support Referral partner,
1:27
be sure to visit rogue.support.referrals for more info. VLAN stands for Virtual Local Area Network.

LAN Basics

1:35
So let's start with the LAN portion of VLAN to get this video started. A LAN, or local area network,
1:42
in its simplest form is the inside interface of a router. So if you go down to Best Buy
1:47
and you purchase a router off the shelf, you're gonna have a WAN port that you plug your internet connection into,
1:52
as well as one or more LAN ports that you plug your devices into. Devices can be basically anything
1:59
that connects to the network. A computer, a network switch, a wireless access point that then has other wireless devices
2:06
such as your smartphone connecting to the network. When you have a single LAN,
2:12
all of your devices are grouped together in one big subnet. Each device gets its own IP address within that subnet
2:19
so that the devices can all talk to each other, and then they can make requests out to the internet.
2:26
In a simple LAN scenario, the IP addressing for the subnet is typically gonna be something like 192.168.1.0 slash 24.
2:36
This number defines the range of IP addresses that are available to pass out to devices on this network.
2:44
And in this case, the slash 24 at the end means that the network has 254 available IP addresses.
2:51
Those IP addresses range from 192.168.1.1 all the way up to 192.168.1.254.
3:01
The slash 24 determines the size of that subnet.
3:06
It should also be noted that dot zero and dot 255 are also part of the subnet,
3:12
but those two IP addresses are reserved for special functions. Dot zero being the network address
3:17
used to identify the subnet itself, and dot 255 being the broadcast address
3:23
or the address used when a device needs to send information to every other device on the subnet.
3:28
The slash 24 portion of our network is what's known as CIDR or C-I-D-R format.
3:35
But you may see a network defined as 192.168.1.0 with a subnet mask of 255.255.255.0.
3:45
Slash 24 in CIDR notation is the same as a subnet mask of 255.255.255.0.
3:54
And basically this number defines how many available IP addresses
4:00
are contained within that particular network subnet, with slash 24 being one of the most common types.
4:07
Now, this would also not be a comprehensive overview of VLANs and networking if I didn't mention that I'm only talking about IPv4 here.
4:16
IPv6 also exists, but I'm not gonna be covering that in this video. All right, so at this point,
4:22
we should have a basic understanding of what a LAN or local area network is. And we can use CIDR or subnet masking
4:30
to determine the size or the number of IP addresses that are contained within that LAN.

VLAN Fundamentals

4:36
Now, imagine that on that same router or network switch, we have the ability to layer in
4:42
additional local area networks on top of the standard LAN that we just talked about.
4:48
These are known as VLANs or virtual local area networks. A VLAN is formatted with the same type of network subnetting
4:56
as a normal LAN, but the difference is that every ethernet frame that travels across the network in a VLAN
5:04
has an additional bit of information called the VLAN ID. This can sometimes also be referred to as a VLAN tag.
5:12
And you can think of VLAN tags as grouping network devices together in their own network subnet,
5:18
regardless of the actual physical network that they're connected to. So let's give some examples here, right?
5:24
Where do we see VLANs used most often when it comes to home user networks?
5:29
One example would be a guest network. So you have your main secure LAN where most of your devices reside,
5:36
but then you also want to allow guests that are visiting your home to connect to the network and have internet access.
5:43
But you don't want those guests devices to be able to communicate with any of your own devices,
5:48
right? You wanna keep them separated. So in this case, we could create a separate virtual area network or VLAN
5:55
for our guest devices, and then give it a VLAN tag such as VLAN 10.
6:01
So then our main network by default has a tag of one, and we can now create a guest network
6:07
that has a VLAN tag of 10. And maybe we also wanna create a virtual network
6:12
for our IOT devices, right? All of these smart devices, such as wifi controlled light bulbs and RGB strips
6:19
and robot vacuums, surveillance cameras, gaming consoles, television, like all of these little devices that populate our lives.
6:26
These devices often come with some sort of app or cloud connectivity so that they're reaching out of your network
6:33
and communicating with some server out in the world somewhere. These are devices that you might wanna keep
6:38
completely separate from your secure LAN devices. So we'll group all those devices together
6:45
into another virtual LAN subnet, and we're gonna call it VLAN 20.
6:51
So now we have say three different networks available on the same physical networking hardware.
6:57
We have our default LAN, we have a guest network that we've set to VLAN ID 10,
7:03
and we have an IOT network that we've set to VLAN ID 20. What reasons do we have for separating these out, right?
7:11
First and foremost, as I already kind of alluded to is security. So in my two examples of the guest network
7:18
and the IOT network, we can set up firewall rules in the firewall to lock those groups of devices out
7:24
from communicating with the devices in our default LAN. So for example, if you are a restaurant,
7:31
you wouldn't want one of your guests hopping onto your WiFi and then running scans against your servers
7:38
and your point of sale system to try to find vulnerabilities. Likewise, if you have some IOT devices
7:44
that connect out to a cloud service on the internet somewhere and that cloud service gets hacked,
7:49
you wouldn't want hackers to be able to, you know, piggyback down that connection to your IOT device.
7:55
And then from there, see all of the secure computers on your network. Another reason you might want to implement VLANs
8:02
is just for organization of devices. Many businesses, for example, have dedicated VLANs for surveillance cameras
8:09
or voice over IP telephones. Another factor is efficiency and performance.
8:15
So if you're using VLANs, especially in like really large networks that utilize what's known as layer three switching,
8:22
those devices can benefit from having specific traffic routed in specific ways
8:28
to reduce network congestion and unnecessary traffic. Now, we're not gonna get too deep
8:33
into layer three networking in this video, so let's now pivot to a networking analogy.
8:39
So imagine our network as an office building that houses multiple different companies
8:44
inside the building. In our office building, we have a front door, right? Outside of that front door is the general public.
8:52
That's gonna be our WAN or the internet. And then inside the front door is our LAN, right?
8:58
The private area of our office building. The front door functions as our firewall
9:04
because in order to get inside that front door, you're gonna need a key, right? We don't just let anyone in.
9:09
Our front door firewall is the first line of defense against the rest of the world.
9:14
Now, once you're in that front door, you're in the lobby, right? Or a common space. If all of the companies in that office building
9:21
were wide open, it would be absolute chaos. So each company then is partitioned off into different offices aside from that common space.
9:29
VLANs are like the various company offices that we've partitioned off from the common space
9:35
where you create separate rooms or areas for each company, right? It's kind of a way to group all of the employees
9:42
from that company together in that one office space. Now, everything is part of that one big office building,
9:49
but only employees with special access, for example, like a key card that they have to swipe,
9:54
are allowed into the partitioned areas that they have access to. So that key card that an employee has to swipe
10:03
is like a VLAN tag on an ethernet frame. It lets the physical network know which VLAN or partition
10:10
that ethernet frame is supposed to be a part of. All right, so now let's take a step back and talk about some really common VLAN terminology.

Untagged VLANs Explained

10:18
So we already talked about VLAN IDs or tags. You remember, we set up VLAN ID 10 for our guest network
10:25
and we set up VLAN ID 20 for our IoT network. Once those VLANs are created on the network,
10:32
we then need to tell our network switches, right, our physical ethernet ports, which VLANs are allowed.
10:39
And to do this, there are three main terms that we use, untagged or native VLAN, tagged VLAN, and trunk ports.
10:48
So we're gonna talk about these terms as they relate to a single port on a network switch.
10:55
So imagine the RJ45 port or SFP port that you plug a wire into.
11:00
When you set a VLAN as untagged on a network port, this is telling that port what the default VLAN should be
11:08
for any device that is plugged in that does not understand VLANs
11:14
or does not specifically have a VLAN tag that is associated with that device.
11:19
For example, your desktop PC. By default, you are not configuring your desktop PC
11:25
with any VLAN tags, right? So when you plug it into a network switch, it is going to become a member of the network subnet
11:32
that is untagged on the switch port that you plug it into. Now, this doesn't have to be your default physical LAN.
11:40
You can set any of your VLANs as untagged in a network switch port so that a device that's plugged into that port
11:47
that doesn't have a specific VLAN ID will be on your untagged VLAN by default,
11:52
and therefore will be placed into that VLANs network subnet. And that might start to sound confusing,
11:58
but we are going to actually go over some for real examples in a little bit that should make that a little bit clearer.
12:03
But imagine that you're sitting in a waiting room at your doctor's office, and you notice that there's an exposed RJ45 port
12:10
in the wall, right? A hacker could plug a device into that port to try to see what information they can obtain
12:16
about the network it's connected to. So it would probably be a good idea
12:21
to ensure that the untagged VLAN for that specific port in the waiting room
12:27
is perhaps your guest network VLAN, right? So that you are not exposing your secure network
12:33
to just randos that are hanging around waiting for their doctor's appointment. Next, we have the concept of tagged networks
12:39
on a switch port, right? So we talked about untagged, now we're gonna talk about tagged VLANs
12:44
or tagged networks on a switch port. Alongside that untagged VLAN on a network switch port,

Tagged VLANs Overview

12:50
you can also allow specific VLANs as tagged VLANs on that same port.
12:56
So let's say that you created a voiceover IP VLAN for your phone system, and you gave your voiceover IP network a VLAN ID of 30.
13:05
You may have a network switch port where the untagged network subnet is VLAN ID one,
13:11
but you've also allowed on that same port tagged network VLAN ID of 30.
13:18
So your voiceover IP telephone is configured to connect to VLAN 30. So when you plug it into that network switch port,
13:24
it's not gonna take the default untagged VLAN ID one, it's gonna say, hey there,
13:30
you know, I'm supposed to be on VLAN 30. And since that switch port that I plugged the phone into is configured with tagged VLAN 30,
13:38
everyone's happy and your voiceover IP phone is configured into the voiceover IP network
13:44
running on VLAN ID 30. Going back to our shared office space analogy,
13:50
say two people walk into the front door. One of those people has no idea where they're supposed to go, right?
13:55
So they're allowed into the lobby and they sit down and wait. But the other person knows exactly
14:01
where they're supposed to go, right? They're trying to get to the doctor's office because they have an appointment. So imagine if that front door was the switch port,
14:08
in this analogy, the person who doesn't know where they're supposed to go has no VLAN tag, right?
14:13
So they get the default. They're told to go sit in the lobby. Whereas the second person knows where they're supposed to go
14:21
they need to go to the doctor's office. So they have a VLAN tag that gets them into that partitioned area
14:27
of the office building and they are allowed into that location. Another term you'll hear a lot when you're dealing with the basics of VLANs

Trunk Ports Introduction

14:34
is a trunk port. When you configure a network switch port as a trunk port,
14:39
this just means that your default LAN is typically the untagged network on that port,
14:44
but it also has all of your other VLANs allowed as well. But those VLANs are tagged on that port.
14:52
So in our example, VLAN ID one would be the untagged network on that port.
14:57
But if a device has a VLAN tag associated with it, such as the voice of RIP telephone, that switch port can pass traffic
15:04
for any of the other VLANs in the network, such as the guest network on VLAN 10, the IOT network on VLAN 20,
15:10
or the VoIP network on VLAN 30. What's the difference then between a trunk port
15:16
that has the default LAN and all of your VLANs attached to it versus manually configuring a switch port
15:23
with VLAN ID one as untagged and VLANs 10, 20 and 30 as tagged.
15:29
Actually, there's no difference in terms of functionality, but the difference comes in administration.
15:35
If you manually configure your switch ports and then later add another VLAN,
15:40
say VLAN 40 for surveillance cameras or something, you then have to go back in
15:45
and remember to manually add VLAN 40 to your switch ports, whereas a trunk port is going to have
15:52
that added automatically, since it always carries all of your VLANs.
15:58
Now, typically we see trunk ports being used to interconnect network switches together to ensure that all of our VLANs
16:04
are visible to all of our network switches. All right, so now that we've got a basic understanding

VLAN Real-World Examples

16:10
of how VLANs work and some of the terminology in use, let's take a look at how you might be able
16:15
to actually configure VLANs in various types of equipment. I'm gonna start by showing you a few VLAN examples
16:22
that may be used in everyday life. One of the first things I should mention is that not all routers are going to be VLAN capable.
16:31
So for example, if you just go down to your local big box store and pick up some,
16:36
you know, Netgear something just right off the shelf, it might have like guest network capabilities,
16:43
but you're not able to add your own VLANs because they try to make these things as simple as possible.
16:49
So if you're in your router and you're looking for like, where are the VLAN settings and you're not finding them,
16:55
you might need to upgrade to some, you know, more prosumer or higher level of equipment.

Trunk Port Practical Example

17:02
So now let's look at a few different diagrams to help explain VLANs, both the untagged VLANs
17:09
and tagged VLANs, as well as trunk ports. We're gonna start with that trunk port. So what I have here is on the left-hand side,
17:17
we have our router. And in the router, again, this is just generic router, a generic router that has the ability to add VLANs
17:26
or separate VLAN subnets to the network. And here we can see that I have VLAN ID one,
17:32
that's gonna be our default VLAN or native VLAN, it's sometimes called. Then I added a guest network in green,
17:39
an IoT network in blue, and a VoIP or voice over IP network in red.
17:45
And what you can see here is that I have all of these networks traveling from the router
17:51
over to the switch, we can see all four colors. So I'm denoting each VLAN as its own color.
17:58
Now the switch has a trunk port. So the trunk port is receiving all VLANs that are sent to it.
18:04
So in this example here, with a trunk port that has the LAN untagged,
18:10
so the native default network is our LAN and it's untagged. And then we do have the capability of seeing the VLAN 10,
18:18
VLAN 20, VLAN 30 on that same network port. If I just plug in a PC, in this case,
18:25
it's like a Mac mini on the diagram, right? But if I just plug in a regular desktop PC that doesn't understand VLANs or like an IoT device
18:32
that doesn't understand VLANs, it's going to get an IP address in the default subnet, right?
18:39
Because it's not specifically looking for one of the tagged VLANs that's traveling along with that port.
18:46
However, if we see here, I have a voiceover IP telephone, that voiceover IP phone is configured to look for VLAN 30.
18:56
And since it finds VLAN 30 as one of the tagged VLAN port options on that port,
19:02
it's gonna configure itself into VLAN 30. It basically says, hey, here I am, I'm looking for VLAN 30.
19:07
And that port goes, oh, I know about VLAN 30. Here is your IP addressing information
19:13
for the VLAN 30 subnet, which in this case is 192.168.30.0.24.
19:20
Now I should mention that in this example, I am setting the VLAN ID equal to the third octet
19:27
in the slash 24 subnet for each of these different networks. You don't have to do that.
19:32
I just think that, you know, when I'm setting up networks, like logically, it makes sense to me to kind of make sure that the VLAN
19:38
is part of the network subnet that devices will get IP addresses from in that VLAN,

Untagged VLAN Real-Life Application

19:44
if that makes sense. All right, here's another example. So now we still have that trunk port that's carrying all VLANs over to the switch,
19:51
but I've now configured a different port for IoT devices. Right, so if I have some sort of wired IoT device,
19:59
like in this case, I have a Raspberry Pi, right? And say that Raspberry Pi is running something, you know, home assistant or something like that,
20:06
and I am physically plugging it into the network switch, but I don't want it to be in the default network.
20:13
I don't want it to be on my secure LAN. I want it to go into that IoT network that we set up.
20:19
So since that Raspberry Pi has not been configured to specifically look for a VLAN ID,
20:26
I'm gonna configure a switch port where the untag, the default network
20:32
when you plug something in that doesn't know about VLANs, the untag network is the IoT network.
20:38
Now I'm also on this same port, still carrying across tagged VLAN ID 30
20:45
for a voice over IP telephones. What that means is if I plug in an IoT device or any device that doesn't know about VLANs,
20:52
it's gonna get an IP address in the IoT subnet because that is the untagged or default VLAN for that port.
21:00
However, if I plug my phone in, which does understand VLANs, it's gonna say, hey, I'm here, I'm looking for VLAN 30.
21:06
And in this case, yes, we do see VLAN 30. So it gets an IP address in VLAN 30.

Enhancing Security with VLANs

21:13
All right, let's look at another example. So this is an example where all we want, anything plugged into the port
21:19
is going to be on the guest network, right? So remember our example from earlier in the video,
21:24
where you walk into a doctor's waiting room and you happen to see an exposed RJ45 ethernet port
21:29
just sitting there on the wall. If someone comes in, a hacker comes in and they plug something into that port,
21:36
we don't want them to have access to any of our secure doctor stuff, right? So depending on the secure doctor network,
21:41
we want them to only have a guest network as if they were connecting to the guest wifi.
21:47
Now it's guests only as untagged. So anything that's plugged in there
21:52
is going to get an IP address in the VLAN 10 network. But in this example, if I take my phone,
22:00
which is looking specifically for VLAN 30, and I plug it into that port
22:05
and if it only has untagged guest network on VLAN 10,
22:10
it is not going to get an IP address at all. Because it's going to say, hey, I'm a voice over IP phone,
22:16
I'm looking for VLAN 30. And the port's going to say, I don't know nothing about no VLAN 30, I'm so sorry.
22:24
You know, kick rocks. So this is how you can start to get really granular
22:29
with your security and basically say, look, if I've got an exposed port in a public area of my office,
22:36
I don't want to have any secure access available through that exposed ethernet port.
22:42
All right, last example. And then we are actually going to show you how to configure some of this stuff in different types of network equipment.
22:49
All right, so same concept here. We've got our four VLANs, all four are trunked across to this switch.

VLANs in Wireless Networks

22:55
And in this case, we're gonna set up a wireless access point and what wireless SSIDs are going to broadcast
23:04
from that access point? Well, we're gonna have one, we set up an SSID for the secure LAN,
23:10
we set up an SSID for our guests, and we set up an SSID for IoT devices
23:15
that need wireless access. And again, all of these networks, I'm not showing it in this video, but they should be firewalled off from each other
23:23
so that for example, the guest network can only see the internet, but it can't see any of the other networks.
23:28
The IoT network can only see the internet, but it can't see the other networks. And then our secure network, you know, if you want,
23:34
can have access to all of the other networks because that's your secure, your sort of main network. So in this case, what we do is we plug in our access point
23:43
and we tell the switch, look, we're gonna plug an access point into this port. I want the untagged VLAN for this access point
23:51
to be our secure VLAN, VLAN one, and it's gonna have an SSID of LAN.
23:56
Then we also want to have tagged VLANs of 10 and 20 because we also have wireless SSIDs for VLAN ID 10,
24:06
our guest network, and VLAN ID 20, our IoT network. Now, in this case, we only have hardwired voice over IP phones,
24:14
so I don't need to put the voice over IP VLAN tag into the access point
24:20
because it's never gonna get used. So now, if a PC or Mac that doesn't know about VLANs
24:26
connects up to the LAN SSID, it's gonna get an IP address in that network.
24:32
In fact, any of these devices, we're basically not dealing with devices
24:37
that know about VLANs at all for the purposes of this setup. It's just you're put on the correct VLAN
24:44
based on the wireless SSID that you actually connect to, and since we are pushing those VLANs into the access point,
24:52
it knows about the guest network, it knows about the IoT network, and it knows about our secure network. So whichever one of those SSIDs you connect to,
24:59
that's the network that you're getting placed into, and you'll get an IP address from the DHCP server.

UniFi VLAN Configuration

25:06
Okay, clear as mud, I'm sure. So let's now look at Unifi. So anyone who's a fan of this channel
25:12
knows that I am a fan of the Unifi ecosystem of products, and the way that VLANs work in Unifi is two steps.
25:21
In fact, this is kind of the same way that it works in any networking equipment. You've got the creation of the VLAN networks themselves,
25:29
and then you have which untagged and tagged VLANs
25:34
are traveling to each switch port in your entire network. All right, so from within Unifi,
25:40
if we come over here to settings, and then we click on networks, here you can see that I have set up my four different VLANs.
25:47
We've got the default VLAN, guest on VLAN ID 10, IoT on 20, and VoIP on 30.
25:53
So let's click into one of these, and you can see how I set these up. So basically, I unchecked sort of the autoscale network.
26:00
I don't like using that, so I can actually set the size of the subnet. If we scroll down a little bit further,
26:06
I set advanced to manual, and then that lets me enter in a VLAN ID.
26:11
Now, not related to actual VLAN functionality, but something that's super important for this type of setup
26:18
is the next setting right here, which is network isolation. So in the case of a guest wireless network, for example,
26:25
you're gonna have guests like at a restaurant or at a hotel that are connecting to that guest wireless, and you don't want those guests
26:31
to be able to see other devices on that same guest wireless network. So we enable client isolation,
26:39
which means that device that connected to that network can only see the internet. It cannot see other devices in that network.
26:46
However, if I pop over to my IoT network and we scroll down, notice that I don't have client isolation
26:53
on the IoT network. And why is that? Because in the IoT network,
26:58
we might want devices to talk to each other, right? So imagine the example of taking your smartphone
27:04
and streaming video over to a smart television or like an Apple AirPlay type of situation.
27:10
In that case, those devices within the IoT network do need to talk to each other.
27:15
Or for example, if you have some sort of smart light bulb setup where you've got like a Phillips Hue, for example,
27:21
has their little base station which connects to the network and it controls all of the light bulbs and whatnot
27:27
on that same network. So we do want devices within the IoT network to be able to communicate with each other.
27:33
We just wanna firewall those off so that they can't touch the guest network or the phone network or the secure network.
27:40
So once you've set up your VLAN with a specific VLAN ID, then in UniFi, they have what's called the port manager.
27:48
So if we come over here to the port manager and we click on VLANs, this gives us a graphical representation
27:55
of the untagged and tagged ports for every single one of our switch ports
28:00
in the UniFi ecosystem, right? We can pick which switch we're working with up here in the corner, and then these are all the ports associated
28:07
with that particular switch. So here we have port one, okay? So let's look at this.
28:13
In UniFi speak, blue means our default switch port,
28:19
our native network for that port. So if you plug a device in that doesn't understand VLANs,
28:24
this is the network it's gonna get put into. But then we have green, which is the tagged VLANs also as part of that port.
28:33
So port one is our trunk port, right? So we have default is untagged,
28:39
and then VLAN 10, VLAN 20, VLAN 30 are all tagged as part of that port.
28:45
If we now go back to our IoT port example, we can see that in our IoT network,
28:52
we want untagged VLAN 20 and tagged VLAN 30, because IoT devices that plug into that port
28:58
should get an IP address in the IoT network. But if we happen to plug a voice over IP phone that understands VLAN 30,
29:04
we want it to receive an IP address in VLAN 30. And here we can see that on port two.
29:10
So port two, VLAN 20 is blue, meaning that it is the native or untagged VLAN
29:18
for port number two on this switch. And then we also have VLAN ID 30 as tagged,
29:25
meaning it's riding along. If you know about VLAN 30, great, you can connect to it. Otherwise, you're gonna get the blue IoT VLAN 20.
29:33
Let's look at our next example, the guest port only example, right? Where you've got the doctor's waiting room
29:38
and you have an exposed network port in that waiting room. Anyone that plugs into that should get on the guest network.
29:43
In Unifi, that's gonna be our port three right here. So port three, notice that it's gray for default,
29:50
it's blue for the guest network, because that is our native or untagged VLAN for that port.
29:57
And then we are not carrying across any other tagged VLANs. So VLAN 20 is gray, VLAN 30 is gray.
30:04
So if you plug anything into port three, the only option is the guest network VLAN.
30:10
And if you have a device that understands VLAN tagging, like this phone that has VLAN 30 associated,
30:16
it's just not gonna work. And then finally, let's look at our access point example where we have the untagged default VLAN ID one,
30:24
and then we have tagged VLAN 10 for guests and tagged VLAN 20 for IoT devices.
30:30
In that case, it's gonna be port four. So there we have blue is our default VLAN ID one as untagged
30:37
and then we have green untagged VLAN ID 10 for guests and green untagged VLAN ID 20 for IoT devices.
30:45
Now, one of the things about Unifi is you could go through here and manually configure
30:51
every single one of your switch ports, but they also have a switch port manager or port profiles,
30:57
where if I knew that I was gonna have a bunch of ports that were that guest network only configuration
31:03
or the access point configuration, all these different sort of scenarios that I've been throwing out here,
31:09
you can set all of those up as port profiles, and then just assign the port profile to all of the ports
31:16
as opposed to doing it manually. So it just saves you a little bit of time by actually grouping the VLANs that you want together
31:23
and then assigning those to multiple ports simultaneously. Now let's look at the same exact VLAN setup,

Mixed Equipment VLAN Setup

31:31
but this time we're gonna be doing it with like a mishmash of equipment and I'm actually gonna be plugging stuff in
31:36
so that you can see IP addresses change and whatnot. So in this case, I have this Synology RT6600AX,
31:46
and this is kind of like a prosumer home router, one with all the thousands of antennas on it and whatnot.
31:52
And then I have this more like enterprise level Aruba 24 port switch with PoE.
32:01
So you can do VLANs with a mix of equipment, assuming that all of the equipment
32:06
that you're working with understands VLANs. VLANs are a standard, right? They're gonna be the same across anything,
32:12
like the nomenclature might be a little bit different, the buttons you have to press and the menu items you have to surf around to might be different
32:19
from equipment to equipment, but it's all generally gonna be the same concepts.
32:25
So I'm logged into the Synology router and I opened up the network setting and I clicked on local network here,
32:32
and this is where we can add additional VLANs. Now, interesting thing about this Synology router
32:37
is that while we can actually add different VLANs, here you can see I've got primary network, guest network,
32:44
IOT network and VoIP network. And if I click into any one of these and hit edit,
32:50
we can see the VLAN ID is assigned right there, as well as all of the networking information up above.
32:56
But the interesting thing about this Synology router is if I click on VLAN tag,
33:02
you unfortunately only have two options for VLAN tagging. You can make each of the ports in the back of the Synology
33:08
of which there are four, you can make those ports trunk ports, meaning that the primary network is the untagged VLAN
33:17
and any other VLANs you set up are traveling alongside as tagged VLANs,
33:23
or you can set up a single VLAN only. So like if you look at ports one, two and three here,
33:29
I've got my primary network untagged across all of those, and then I've got the guest VoIP and IOT network
33:36
tagged across all of those. But port four, I called VoIP, and I just did an untagged VLAN 30,
33:44
which is my VoIP network for that fourth port. So anything you plug into that fourth port is just gonna go straight onto VLAN 30.
33:51
Connected over to this Aruba is port one, right? So the trunk port that goes over to the Aruba
33:58
and in the Aruba, I have both ports one and two configured as trunk ports. So let's take a look at that next.

Synology RT2600ac VLAN Setup

34:05
So I set up all of the VLANs in the Synology RT6600AX.
34:10
And then when I first logged into this Aruba switch, I also have to tell this Aruba switch about VLANs, right?

Aruba 1930 VLAN Setup

34:18
So it doesn't know about any of those VLANs by default, I actually have to tell it about those VLANs. That's one of the disadvantages
34:24
with working with a mishmash of equipment. Typically, you have to configure each different piece of equipment
34:29
to understand the VLANs that you're feeding into it. Whereas with something like Unifi, you just set it up in that one console
34:36
and your routers and switches and access points, they're all gonna know about your VLANs because they're all sort of configured in the same place.
34:42
So if I come over here to VLAN and VLAN configuration, this top section here is where I can add VLANs.
34:48
It's as simple as just clicking Add, and then you give it the VLAN ID and you give it a friendly name.
34:54
It can be anything you want. And so I did that three times to create VLAN ID 10 for guest,
35:01
VLAN ID 20 for IoT and VLAN ID 30 for VoIP. So we've now told it about all of our VLANs.
35:07
And of course, the VLAN ID one is the default or native VLAN by default.
35:12
And if we scroll down here, we can see VLAN membership by interface.
35:17
And once again, just like Unifi, where we had the blue for untagged and green for tagged,
35:24
we don't have colors here, but we can see untagged VLANs here, and we can see tagged VLANs over here.
35:31
Remember, I said the first two ports on this switch are essentially trunk ports, right? So we have untagged VLAN one,
35:38
and then I have 10, 20, 30 as the tagged VLANs. Now, if I wanna edit this, I can just select one or more ports and then say Edit.
35:47
And it basically shows me what to do, right? What is the untagged VLAN? I can select one and then I can say,
35:53
what are the tagged VLANs? And it gives me the sort of syntax of tagged VLANs down below.
35:58
Now, going back to our IoT example, where we have untagged VLAN ID 20,
36:04
but tagged VLAN ID 30, in case we wanna plug a phone into that port, you set it up like this.
36:12
Edit, untagged VLAN is 20, that's our IoT network,
36:17
tagged VLANs 30 only, right? So now, no native VLAN access
36:24
and no guest network access on this particular port. So let's test that out.

VLAN Testing

36:29
Right now, my PC here is plugged into port one, meaning that it doesn't know about VLANs,
36:36
so it should have an IP address in the default network of 192.168.1.x.
36:42
Let's double check that. If we run ipconfig here, we can see 192.168.1.192 is the IP address of this computer.
36:52
Now, if I unplug this computer from port one and plug it into port three, which is our IoT setup,
37:01
once it gets its IP address, if we now run ipconfig again, look at that.
37:07
Now the IP address is 192.168.20.192.
37:13
However, if I unplug my computer, plug it back into port one, and then I take my voice over IP phone here
37:21
and I unplug it and I unplug this into, or I plug the voice over IP phone into that same port.
37:28
Remember, this is the port where I just plugged in my computer and I got 192.168.20.192.
37:34
I have now plugged in the voice over IP phone and once this boots up, we'll take a look at the IP address.
37:40
This, by the way, is the Crosstalk 280. It's absolutely a gorgeous phone and it's Android-based
37:46
and it has a camera built right in, so you could do Zoom calls and Google Hangouts, as well as just phone-to-phone video conferencing,
37:54
plus it still has all the tactile buttons down below. I love this phone. Okay, so it just connected and it is registered,
38:00
so I know that this phone can see the internet, no problem, and if we come over here to settings and network
38:06
and click on IPv4, the phone's IP address is 192.168.30.125.
38:13
Let me grab some video of that because I know it's gonna be impossible to see. There you go. The IP address, 192.168.30.125.
38:22
So that is successful, right? My computer that doesn't know about VLANs plugged in and it got an IP address in the untagged VLAN for that port
38:30
and then my phone, which does know about VLANs, I plugged in and it got an IP address
38:35
in the VLAN that was tagged on that port because this phone knows about it and specifically asked for an IP address
38:43
in that other voice over IP, VLAN. All right, now we have our guest port example, right?
38:48
So in our guest port, we only have untagged VLAN 10 on the port and nothing else.
38:54
So I set that up as port four. Let's take a look at it. So port four here we can see, untagged VLAN 10
39:01
and no tagged VLANs at all riding across that port. Let's go ahead and unplug our laptop
39:06
and we're gonna plug it into port four and the network is connected. Let's do ipconfig and the IP address is 192.168.10.192.
39:16
because it's in the guest network only. Now, if I plug my phone into that port, it's not gonna get an IP address at all
39:23
because it's asking for VLAN 30 and that port doesn't carry VLAN 30 as untagged or tagged.
39:29
So that's it. And now let's look at our final example where we have our access point plugged into a port
39:36
and that port has the LAN network, the secure LAN untagged,
39:42
the guest network tagged as VLAN 10 and the IOT network tagged as VLAN 20. All three of those networks are traveling across here.
39:50
And then this is broadcasting out three different SSIDs. Each SSID is associated with a different VLAN.
39:58
So when you connect on whichever SSID, that's the IP address you're gonna get. You're gonna be placed into that specific network subnet.

Conclusion

40:05
So there's VLANs made easy and hopefully this video helped to demystify VLANs
40:11
and you can now be confident enough to start playing around with them in your own networks.
40:17
And remember, if you get stuck on any VLAN configuration or if you just want to have us
40:22
do a complete network design for you, open up a ticket at Rogue Support and we'll make sure that you're well taken care of.
40:30
If anything is still unclear or if you have questions about VLANs, pop those down into the comments below
40:36
and I will do my best to get them answered. And if you'd like to keep this party going, I have hand selected a couple of videos on the right here
40:44
for you to watch next. The top video is my recent review of the Starlink Gen 3 Dish and Internet Service.
40:50
And the bottom video is my unboxing of the new Pro Max network switches from Ubiquiti,
40:56
which feature RGB ether lighting. You can actually configure those switches to show you VLANs in different colors
41:03
right through the switch ports. Really cool.
English
 
 
 
 

Contact Us

We are always open for a quick chat! Give us a call or email us any time and we will respond shortly.

  (248)918-0123
  info@allonis.com