Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    When is a LAN a VLAN?

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 7 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N Offline
      NOYB
      last edited by

      @johnpoz:

      You can have physical network, you can have vlans that are not tagged.

      Could you please elaborate on this?  I realize that internally most smart/managed switches tag all traffic.  But if/when it is on the wire as untagged how can it be a vlan?  The ingress/egress device will see it as a "native" LAN.  Regardless of how it is configured to handle it internally.

      Think we may be talking technical semantics here.  But strictly technically speaking, can a VLAN not be tagged?

      1 Reply Last reply Reply Quote 0
      • K Offline
        kpa
        last edited by

        @NOYB:

        @johnpoz:

        You can have physical network, you can have vlans that are not tagged.

        Could you please elaborate on this?  I realize that internally most smart/managed switches tag all traffic.  But if/when it is on the wire as untagged how can it be a vlan?  The ingress/egress device will see it as a "native" LAN.  Regardless of how it is configured to handle it internally.

        Think we may be talking technical semantics here.  But strictly technically speaking, can a VLAN not be tagged?

        If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words) you could call those different subnets as VLANs but most people don't do so.

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          @kpa:

          If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words) you could call those different subnets as VLANs but most people don't do so.

          Most people don't call those VLANs because they are not VLANs.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator
            last edited by

            But if/when it is on the wire as untagged how can it be a vlan?

            To the switch its a vlan is not.. For example on my em2 interface which 192.168.2.0/24 the native vlan or untagged as it leaves the port of the switch is 20 to the switch.  This keeps it sep from the other vlans on the switch.. Now I do have "vlans" also on this interface which are tagged..  So I do have devices on this native "vlan" of 20 to the switch on other ports that are not tagged as this.  Just into pvid of 20..  Now on the uplinks all vlans are tagged.. This allows the other switch to know which traffic is what.

            But if you use multiple uplinks from your switch for each vlan to different interfaces in pfsense - you would create vlan IDs in the switch.. lets call them 100, 200 and 300. To pfsense these might just be em1, em2 and em3 of its interfaces with different networks on them 192.168.1, .2 and .3 lets call them.

            You might just call these "lan" segments or network segments..  But they are clearly marked in the switch as "vlan" because they are to the switch!  You have broken up your switch into multiple virtual layer2 segments.

            Keep in mind even the default vlan is 1..  Still a vlan to the switch ;)  So while I agree just debating semantics here.. You will hear vlan used to just represent a different network segment, but if your troubleshooting a problem you really need to know is it being tagged and that is where the problem is or is native? etc..

            If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words)

            No you could not – The correct technical term for such a thing is BORKED ;)

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07 | Lab VMs 2.8, 25.07

            1 Reply Last reply Reply Quote 0
            • C Offline
              c4bcons
              last edited by

              The important thing that I've grasped here is that I needed to understand what a switch is capable of.  If I run three different LANs - one for normal user traffic, one for management and one for backup traffic, I don't want the backup traffic to impact the performance of the other LANS.  From the conversation above, and what my techie at work said, if the three LANs share a switch, then the backup traffic WILL impact the other two LANs because it's on the same switch, regardless of the fact that they are in disjoint networks i.e 192.168.2 v 192.168.2 v 192.168.3 or whatever.  The fact that they're using the same switch makes them VLANs.  If they were connected to different switches then they'd be LANS.  That's my understanding, anyway.

              1 Reply Last reply Reply Quote 0
              • DerelictD Offline
                Derelict LAYER 8 Netgate
                last edited by

                I guess that depends on what the definition of "impact" is.

                On any decent switch you should be able to run multi-gigabit traffic on one VLAN without "impacting" the other VLANs on the switch in any measurable capacity.

                Again, this depends on how the VLANs are "trunked/tagged" on the physical ports.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • johnpozJ Online
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  "what my techie at work said, if the three LANs share a switch, then the backup traffic WILL impact the other two LANs because it's on the same switch"

                  You might want to find a new techie ;)

                  Pretty much every switch on the market has a backplane fast enough to move packets even if all of their ports were saturated.. Or really really close to it!!

                  So for example the switching cap of my sg300-10 is 20gpbs.. It only has 10 ports..  So yeah it should be able to handle all 10 of those interfaces pegged to hilt..  What switches do you have, look up what the specs are.. Your total switching capacity should exceed what your total number of ports is, etc.  Now not saying that traffic in 1 vlan might not cause you problems..  If you have something sucking up the cpu of the switch then it could hurt all clients on the switch.. Something sending malformed packets or errors, etc. etc.

                  What sounds like he is saying is machine 1 is talking to machine 2 using ports 1 and 2 of the switch.. Their traffic will impact or slow down machines 3 and 4 talking to each other on ports 3 and 4.. Which just isn't true at all..

                  Where you have to be careful is how much traffic you have running on a trunk uplink, or how much intervlan traffic you have.  Since vlan A talking to vlan B via a trunk port to router/firewall..  So while the router/firewall might be easy handle say 1 gbps..  Your physical interface with vlans on it now becomes shared bandwidth..  So if computer in vlan A wants to send traffic to computer in vlan B and those are the same physical interface your traffic is taking a hairpin and you will be limited by the physical speed of the interface shared between all the vlans on that trunk.

                  If this is your case this is when you want multiple uplinks from your switches and spread your vlans across multiple physical interfaces or if possible use an uplink for each vlan so that you don't hairpin traffic.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07 | Lab VMs 2.8, 25.07

                  1 Reply Last reply Reply Quote 0
                  • DerelictD Offline
                    Derelict LAYER 8 Netgate
                    last edited by

                    Sounds like that particular techie shouldn't be allowed anywhere near your Cisco Nexus 9000.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Just looked up nexus 9508.,.. The system switching capacity is 30Tbps – that is a T not a B.. Tera!!

                      http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/solution-brief-c22-730049.html

                      Maximum Fabric Bandwidth per Slot 3.84 Tbps
                      Maximum Fabric Bandwidth per System 30 Tbps

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      1 Reply Last reply Reply Quote 0
                      • C Offline
                        c4bcons
                        last edited by

                        You might want to find a new techie ;)

                        Pretty much every switch on the market has a backplane fast enough to move packets even if all of their ports were saturated.. Or really really close to it!!

                        Ha!  That's what I was looking for! :)  my B.S. detector went on full alert when he started digging his hole …. but I wouldn't just argue for the sake of it if I had nothing to back it up with.  My suspicion is that the switch would be a little cleverer than he was suggesting.  Luckily we've got (so I'm told, because they're "too busy" at the moment) a couple of proper network engineers .... he's one of those people who just like to prove he knows more than you, not matter how little more he knows.

                        1 Reply Last reply Reply Quote 0
                        • N Offline
                          NOYB
                          last edited by

                          Thanks for the clarification John.  Yeah if using the PVID to direct native (untagged) traffic to a VLAN it could be though of as either a native LAN or VLAN depending on the context.  Such as troubleshooting, etc.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.