The document discusses configuring a company's network using virtual LANs (VLANs) to separate its three departments logically. It will create three VLANs - one each for the Administration, Development, and Production departments. This will prevent the Development department from accessing sensitive information in the other departments, even though they are on the same physical network. VLANs act as separate logical networks that require a router to communicate between them, enhancing network security.
The document discusses configuring a company's network using virtual LANs (VLANs) to separate its three departments logically. It will create three VLANs - one each for the Administration, Development, and Production departments. This will prevent the Development department from accessing sensitive information in the other departments, even though they are on the same physical network. VLANs act as separate logical networks that require a router to communicate between them, enhancing network security.
The document discusses configuring a company's network using virtual LANs (VLANs) to separate its three departments logically. It will create three VLANs - one each for the Administration, Development, and Production departments. This will prevent the Development department from accessing sensitive information in the other departments, even though they are on the same physical network. VLANs act as separate logical networks that require a router to communicate between them, enhancing network security.
The document discusses configuring a company's network using virtual LANs (VLANs) to separate its three departments logically. It will create three VLANs - one each for the Administration, Development, and Production departments. This will prevent the Development department from accessing sensitive information in the other departments, even though they are on the same physical network. VLANs act as separate logical networks that require a router to communicate between them, enhancing network security.
• Company has three floors. • Three departments ( Production, Development and Admin ) • Administration and production department have sensitive information and need to be separate from development department. • With default configuration, all computers share same broadcast domain. Development department can access the administration or production department resources.
SWITCH 1 SWITCH 2 SWITCH 3
DEV 1 DEV 2 PROD 1 ADMIN 1 PROD 3 ADMIN 3
DEV 3 DEV 4 PROD 2 ADMIN 2 DEV 5 DEV 6 Virtual LANs • A virtual LAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain. • Logical grouping of network devices. • Same as two different subnets cannot communicate with each other without router, different VLANs also requires router to communicate. With VLAN we could create logical boundaries over the physical network. Assume that we created three VLANs for our network and assigned them to the related computers.
• VLAN Admin for Administration department
• VLAN Dev for Development department • VLAN Pro for Production department
SWITCH 1 SWITCH 2 SWITCH 3
DEV 1 DEV 2 PROD 1 ADMIN 1 PROD 3 ADMIN 3
DEV 3 DEV 4 PROD 2 ADMIN 2 DEV 5 DEV 6 Logically our network looks like following diagram.
Router
SWITCH 1 SWITCH 2 SWITCH 3
DEV 3 DEV 4 DEV
DEV66 PROD 1
VLAN Admin VLAN Dev VLAN Pro
• With the help of VLAN, we have separated our single network in three small networks. • Now Development department cannot access the Administration and Production department directly. • Different VLAN can communicate only via Router where we can configure wild range of security options. VLAN Connections Switch supports two types of VLAN connection • Access link The access links are part of only one VLAN and carry traffic to only the end devices connected to that particular VLAN • Trunk link This is used to connect switches to other switches and can carry traffic from multiple VLANs. PC PC PC PC PC PC VLAN 1