Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    When is a LAN a VLAN?

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 7 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      c4bcons
      last edited by

      Just had a discussion with a techie at work.  We're renewing our backup systems (100TB) … We would like a separate LAN for the backup traffic, to ensure that it does not impact other network traffic.  This will use ports on Nexus 9000 switches, the switches also have other LANS for management and user traffic.  The techie stated that if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN. i.e. If it's a separate LAN then the connections have to separate switches.  This begs the question in the subject ...

      1 Reply Last reply Reply Quote 0
      • N Offline
        Nullity
        last edited by

        @c4bcons:

        Just had a discussion with a techie at work.  We're renewing our backup systems (100TB) … We would like a separate LAN for the backup traffic, to ensure that it does not impact other network traffic.  This will use ports on Nexus 9000 switches, the switches also have other LANS for management and user traffic.  The techie stated that if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN. i.e. If it's a separate LAN then the connections have to separate switches.  This begs the question in the subject ...

        I remember when I started learning about networking VLANs confused me. I think I understand them better now…

        "LAN" is pretty generic term which usually means "ethernet broadcast domain", which can either be virtual or physical. VLANs are pretty specific (https://en.m.wikipedia.org/wiki/IEEE_802.1Q) and explicit since extra headers are actually added to ethernet frames (VLAN tagging).

        A VLAN is a LAN, but an abitrary LAN is not automatically a VLAN. Some switches do automatic VLAN trunking (and other stuff?) though, so that may be what the tech meant by "if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN."

        Please correct any obvious misinformation in my posts.
        -Not a professional; an arrogant ignoramous.

        1 Reply Last reply Reply Quote 0
        • C Offline
          c4bcons
          last edited by

          "if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN."

          So is that assertion always correct?

          1 Reply Last reply Reply Quote 0
          • H Offline
            hda
            last edited by

            @c4bcons:

            "if the LAN is attached to the same switch as other LANS then it's actually a VLAN, not a LAN."

            So is that assertion always correct?

            As in "a VLAN piggybacks onto a LAN physical pipe" ?

            1 Reply Last reply Reply Quote 0
            • DerelictD Offline
              Derelict LAYER 8 Netgate
              last edited by

              On your Nexus 9000 every "LAN" is going to be a VLAN.

              What it sounds like you are getting confused by in your case is whether or not there are multiple VLANs on the same switch port (or trunk port). When you do that all VLANs there are in competition for the same 1G or 10G physical capabilities of that port.

              Your Nexus will be internally capable of switching many VLANs at very close to wire speed. Look at the overall switching bandwidth of the switch itself.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • C Offline
                c4bcons
                last edited by

                thank you all, not so much confusion as I just didn't know.  I've grasped the concept now.

                1 Reply Last reply Reply Quote 0
                • johnpozJ Online
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  It's like

                  All Bourbons are Whiskeys, but not all Whiskeys are Bourbons ;)

                  You can have physical network, you can have vlans that are not tagged.  But once its tagged then its for sure a vlan.  Once you run more than 1 network on a switch to be honest they can all be called vlans.  As long as your isolating them.  Running multiple layer 3 over the same layer 2 does not make them vlans..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • N Offline
                    NOYB
                    last edited by

                    @johnpoz:

                    You can have physical network, you can have vlans that are not tagged.

                    Could you please elaborate on this?  I realize that internally most smart/managed switches tag all traffic.  But if/when it is on the wire as untagged how can it be a vlan?  The ingress/egress device will see it as a "native" LAN.  Regardless of how it is configured to handle it internally.

                    Think we may be talking technical semantics here.  But strictly technically speaking, can a VLAN not be tagged?

                    1 Reply Last reply Reply Quote 0
                    • K Offline
                      kpa
                      last edited by

                      @NOYB:

                      @johnpoz:

                      You can have physical network, you can have vlans that are not tagged.

                      Could you please elaborate on this?  I realize that internally most smart/managed switches tag all traffic.  But if/when it is on the wire as untagged how can it be a vlan?  The ingress/egress device will see it as a "native" LAN.  Regardless of how it is configured to handle it internally.

                      Think we may be talking technical semantics here.  But strictly technically speaking, can a VLAN not be tagged?

                      If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words) you could call those different subnets as VLANs but most people don't do so.

                      1 Reply Last reply Reply Quote 0
                      • DerelictD Offline
                        Derelict LAYER 8 Netgate
                        last edited by

                        @kpa:

                        If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words) you could call those different subnets as VLANs but most people don't do so.

                        Most people don't call those VLANs because they are not VLANs.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Online
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          But if/when it is on the wire as untagged how can it be a vlan?

                          To the switch its a vlan is not.. For example on my em2 interface which 192.168.2.0/24 the native vlan or untagged as it leaves the port of the switch is 20 to the switch.  This keeps it sep from the other vlans on the switch.. Now I do have "vlans" also on this interface which are tagged..  So I do have devices on this native "vlan" of 20 to the switch on other ports that are not tagged as this.  Just into pvid of 20..  Now on the uplinks all vlans are tagged.. This allows the other switch to know which traffic is what.

                          But if you use multiple uplinks from your switch for each vlan to different interfaces in pfsense - you would create vlan IDs in the switch.. lets call them 100, 200 and 300. To pfsense these might just be em1, em2 and em3 of its interfaces with different networks on them 192.168.1, .2 and .3 lets call them.

                          You might just call these "lan" segments or network segments..  But they are clearly marked in the switch as "vlan" because they are to the switch!  You have broken up your switch into multiple virtual layer2 segments.

                          Keep in mind even the default vlan is 1..  Still a vlan to the switch ;)  So while I agree just debating semantics here.. You will hear vlan used to just represent a different network segment, but if your troubleshooting a problem you really need to know is it being tagged and that is where the problem is or is native? etc..

                          If you have multiple separate subnets on the same logical network segment (or a broadcast domain in other words)

                          No you could not – The correct technical term for such a thing is BORKED ;)

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • C Offline
                            c4bcons
                            last edited by

                            The important thing that I've grasped here is that I needed to understand what a switch is capable of.  If I run three different LANs - one for normal user traffic, one for management and one for backup traffic, I don't want the backup traffic to impact the performance of the other LANS.  From the conversation above, and what my techie at work said, if the three LANs share a switch, then the backup traffic WILL impact the other two LANs because it's on the same switch, regardless of the fact that they are in disjoint networks i.e 192.168.2 v 192.168.2 v 192.168.3 or whatever.  The fact that they're using the same switch makes them VLANs.  If they were connected to different switches then they'd be LANS.  That's my understanding, anyway.

                            1 Reply Last reply Reply Quote 0
                            • DerelictD Offline
                              Derelict LAYER 8 Netgate
                              last edited by

                              I guess that depends on what the definition of "impact" is.

                              On any decent switch you should be able to run multi-gigabit traffic on one VLAN without "impacting" the other VLANs on the switch in any measurable capacity.

                              Again, this depends on how the VLANs are "trunked/tagged" on the physical ports.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ Online
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                "what my techie at work said, if the three LANs share a switch, then the backup traffic WILL impact the other two LANs because it's on the same switch"

                                You might want to find a new techie ;)

                                Pretty much every switch on the market has a backplane fast enough to move packets even if all of their ports were saturated.. Or really really close to it!!

                                So for example the switching cap of my sg300-10 is 20gpbs.. It only has 10 ports..  So yeah it should be able to handle all 10 of those interfaces pegged to hilt..  What switches do you have, look up what the specs are.. Your total switching capacity should exceed what your total number of ports is, etc.  Now not saying that traffic in 1 vlan might not cause you problems..  If you have something sucking up the cpu of the switch then it could hurt all clients on the switch.. Something sending malformed packets or errors, etc. etc.

                                What sounds like he is saying is machine 1 is talking to machine 2 using ports 1 and 2 of the switch.. Their traffic will impact or slow down machines 3 and 4 talking to each other on ports 3 and 4.. Which just isn't true at all..

                                Where you have to be careful is how much traffic you have running on a trunk uplink, or how much intervlan traffic you have.  Since vlan A talking to vlan B via a trunk port to router/firewall..  So while the router/firewall might be easy handle say 1 gbps..  Your physical interface with vlans on it now becomes shared bandwidth..  So if computer in vlan A wants to send traffic to computer in vlan B and those are the same physical interface your traffic is taking a hairpin and you will be limited by the physical speed of the interface shared between all the vlans on that trunk.

                                If this is your case this is when you want multiple uplinks from your switches and spread your vlans across multiple physical interfaces or if possible use an uplink for each vlan so that you don't hairpin traffic.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • DerelictD Offline
                                  Derelict LAYER 8 Netgate
                                  last edited by

                                  Sounds like that particular techie shouldn't be allowed anywhere near your Cisco Nexus 9000.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ Online
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    Just looked up nexus 9508.,.. The system switching capacity is 30Tbps – that is a T not a B.. Tera!!

                                    http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/solution-brief-c22-730049.html

                                    Maximum Fabric Bandwidth per Slot 3.84 Tbps
                                    Maximum Fabric Bandwidth per System 30 Tbps

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • C Offline
                                      c4bcons
                                      last edited by

                                      You might want to find a new techie ;)

                                      Pretty much every switch on the market has a backplane fast enough to move packets even if all of their ports were saturated.. Or really really close to it!!

                                      Ha!  That's what I was looking for! :)  my B.S. detector went on full alert when he started digging his hole …. but I wouldn't just argue for the sake of it if I had nothing to back it up with.  My suspicion is that the switch would be a little cleverer than he was suggesting.  Luckily we've got (so I'm told, because they're "too busy" at the moment) a couple of proper network engineers .... he's one of those people who just like to prove he knows more than you, not matter how little more he knows.

                                      1 Reply Last reply Reply Quote 0
                                      • N Offline
                                        NOYB
                                        last edited by

                                        Thanks for the clarification John.  Yeah if using the PVID to direct native (untagged) traffic to a VLAN it could be though of as either a native LAN or VLAN depending on the context.  Such as troubleshooting, etc.

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.