Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    When is a LAN a VLAN?

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 7 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      c4bcons
      last edited by

      "if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN."

      So is that assertion always correct?

      1 Reply Last reply Reply Quote 0
      • H Offline
        hda
        last edited by

        @c4bcons:

        "if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN."

        So is that assertion always correct?

        As in "a VLAN piggybacks onto a LAN physical pipe" ?

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          On your Nexus 9000 every "LAN" is going to be a VLAN.

          What it sounds like you are getting confused by in your case is whether or not there are multiple VLANs on the same switch port (or trunk port). When you do that all VLANs there are in competition for the same 1G or 10G physical capabilities of that port.

          Your Nexus will be internally capable of switching many VLANs at very close to wire speed. Look at the overall switching bandwidth of the switch itself.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • C Offline
            c4bcons
            last edited by

            thank you all, not so much confusion as I just didn't know.  I've grasped the concept now.

            1 Reply Last reply Reply Quote 0
            • johnpozJ Online
              johnpoz LAYER 8 Global Moderator
              last edited by

              It's like

              All Bourbons are Whiskeys, but not all Whiskeys are Bourbons ;)

              You can have physical network, you can have vlans that are not tagged.  But once its tagged then its for sure a vlan.  Once you run more than 1 network on a switch to be honest they can all be called vlans.  As long as your isolating them.  Running multiple layer 3 over the same layer 2 does not make them vlans..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07 | Lab VMs 2.8, 25.07

              1 Reply Last reply Reply Quote 0
              • N Offline
                NOYB
                last edited by

                @johnpoz:

                You can have physical network, you can have vlans that are not tagged.

                Could you please elaborate on this?  I realize that internally most smart/managed switches tag all traffic.  But if/when it is on the wire as untagged how can it be a vlan?  The ingress/egress device will see it as a "native" LAN.  Regardless of how it is configured to handle it internally.

                Think we may be talking technical semantics here.  But strictly technically speaking, can a VLAN not be tagged?

                1 Reply Last reply Reply Quote 0
                • K Offline
                  kpa
                  last edited by

                  @NOYB:

                  @johnpoz:

                  You can have physical network, you can have vlans that are not tagged.

                  Could you please elaborate on this?  I realize that internally most smart/managed switches tag all traffic.  But if/when it is on the wire as untagged how can it be a vlan?  The ingress/egress device will see it as a "native" LAN.  Regardless of how it is configured to handle it internally.

                  Think we may be talking technical semantics here.  But strictly technically speaking, can a VLAN not be tagged?

                  If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words) you could call those different subnets as VLANs but most people don't do so.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD Offline
                    Derelict LAYER 8 Netgate
                    last edited by

                    @kpa:

                    If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words) you could call those different subnets as VLANs but most people don't do so.

                    Most people don't call those VLANs because they are not VLANs.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      But if/when it is on the wire as untagged how can it be a vlan?

                      To the switch its a vlan is not.. For example on my em2 interface which 192.168.2.0/24 the native vlan or untagged as it leaves the port of the switch is 20 to the switch.  This keeps it sep from the other vlans on the switch.. Now I do have "vlans" also on this interface which are tagged..  So I do have devices on this native "vlan" of 20 to the switch on other ports that are not tagged as this.  Just into pvid of 20..  Now on the uplinks all vlans are tagged.. This allows the other switch to know which traffic is what.

                      But if you use multiple uplinks from your switch for each vlan to different interfaces in pfsense - you would create vlan IDs in the switch.. lets call them 100, 200 and 300. To pfsense these might just be em1, em2 and em3 of its interfaces with different networks on them 192.168.1, .2 and .3 lets call them.

                      You might just call these "lan" segments or network segments..  But they are clearly marked in the switch as "vlan" because they are to the switch!  You have broken up your switch into multiple virtual layer2 segments.

                      Keep in mind even the default vlan is 1..  Still a vlan to the switch ;)  So while I agree just debating semantics here.. You will hear vlan used to just represent a different network segment, but if your troubleshooting a problem you really need to know is it being tagged and that is where the problem is or is native? etc..

                      If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words)

                      No you could not – The correct technical term for such a thing is BORKED ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      1 Reply Last reply Reply Quote 0
                      • C Offline
                        c4bcons
                        last edited by

                        The important thing that I've grasped here is that I needed to understand what a switch is capable of.  If I run three different LANs - one for normal user traffic, one for management and one for backup traffic, I don't want the backup traffic to impact the performance of the other LANS.  From the conversation above, and what my techie at work said, if the three LANs share a switch, then the backup traffic WILL impact the other two LANs because it's on the same switch, regardless of the fact that they are in disjoint networks i.e 192.168.2 v 192.168.2 v 192.168.3 or whatever.  The fact that they're using the same switch makes them VLANs.  If they were connected to different switches then they'd be LANS.  That's my understanding, anyway.

                        1 Reply Last reply Reply Quote 0
                        • DerelictD Offline
                          Derelict LAYER 8 Netgate
                          last edited by

                          I guess that depends on what the definition of "impact" is.

                          On any decent switch you should be able to run multi-gigabit traffic on one VLAN without "impacting" the other VLANs on the switch in any measurable capacity.

                          Again, this depends on how the VLANs are "trunked/tagged" on the physical ports.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ Online
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            "what my techie at work said, if the three LANs share a switch, then the backup traffic WILL impact the other two LANs because it's on the same switch"

                            You might want to find a new techie ;)

                            Pretty much every switch on the market has a backplane fast enough to move packets even if all of their ports were saturated.. Or really really close to it!!

                            So for example the switching cap of my sg300-10 is 20gpbs.. It only has 10 ports..  So yeah it should be able to handle all 10 of those interfaces pegged to hilt..  What switches do you have, look up what the specs are.. Your total switching capacity should exceed what your total number of ports is, etc.  Now not saying that traffic in 1 vlan might not cause you problems..  If you have something sucking up the cpu of the switch then it could hurt all clients on the switch.. Something sending malformed packets or errors, etc. etc.

                            What sounds like he is saying is machine 1 is talking to machine 2 using ports 1 and 2 of the switch.. Their traffic will impact or slow down machines 3 and 4 talking to each other on ports 3 and 4.. Which just isn't true at all..

                            Where you have to be careful is how much traffic you have running on a trunk uplink, or how much intervlan traffic you have.  Since vlan A talking to vlan B via a trunk port to router/firewall..  So while the router/firewall might be easy handle say 1 gbps..  Your physical interface with vlans on it now becomes shared bandwidth..  So if computer in vlan A wants to send traffic to computer in vlan B and those are the same physical interface your traffic is taking a hairpin and you will be limited by the physical speed of the interface shared between all the vlans on that trunk.

                            If this is your case this is when you want multiple uplinks from your switches and spread your vlans across multiple physical interfaces or if possible use an uplink for each vlan so that you don't hairpin traffic.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 25.07 | Lab VMs 2.8, 25.07

                            1 Reply Last reply Reply Quote 0
                            • DerelictD Offline
                              Derelict LAYER 8 Netgate
                              last edited by

                              Sounds like that particular techie shouldn't be allowed anywhere near your Cisco Nexus 9000.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ Online
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                Just looked up nexus 9508.,.. The system switching capacity is 30Tbps – that is a T not a B.. Tera!!

                                http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/solution-brief-c22-730049.html

                                Maximum Fabric Bandwidth per Slot 3.84 Tbps
                                Maximum Fabric Bandwidth per System 30 Tbps

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 25.07 | Lab VMs 2.8, 25.07

                                1 Reply Last reply Reply Quote 0
                                • C Offline
                                  c4bcons
                                  last edited by

                                  You might want to find a new techie ;)

                                  Pretty much every switch on the market has a backplane fast enough to move packets even if all of their ports were saturated.. Or really really close to it!!

                                  Ha!  That's what I was looking for! :)  my B.S. detector went on full alert when he started digging his hole …. but I wouldn't just argue for the sake of it if I had nothing to back it up with.  My suspicion is that the switch would be a little cleverer than he was suggesting.  Luckily we've got (so I'm told, because they're "too busy" at the moment) a couple of proper network engineers .... he's one of those people who just like to prove he knows more than you, not matter how little more he knows.

                                  1 Reply Last reply Reply Quote 0
                                  • N Offline
                                    NOYB
                                    last edited by

                                    Thanks for the clarification John.  Yeah if using the PVID to direct native (untagged) traffic to a VLAN it could be though of as either a native LAN or VLAN depending on the context.  Such as troubleshooting, etc.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.