Template:Networking tswos manual vlan

From Teltonika Networks Wiki
Revision as of 11:08, 24 October 2023 by Gytispieze (talk | contribs) (Text replacement - "\{\{Template: Networking_rutos_manual_fw_disclosure (.*) (.*) (.*) (.*) \}\}" to "{{Template: Networking_device_manual_fw_disclosure | series = {{{series}}} | name = {{{name}}} | fw_version ={{Template: Networking_device_manual_latest_fw | series = {{{series}}} | name = {{{name}}} }} }}")

(diff) ← Older revision | Approved revision (diff) | Latest revision (diff) | Newer revision → (diff)

The information in this page is updated in accordance with firmware version .

Summary

A Virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). LAN is the abbreviation for local area network and in this context virtual refers to a physical object recreated and altered by additional logic. VLANs work by applying tags to network packets and handling these tags in networking systems - creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

VLANs allow network administrators to group hosts together even if the hosts are not on the same network switch. This can greatly simplify network design and deployment, because VLAN membership can be configured through software. Without VLANs, grouping hosts according to their resource needs necessitates the labor of relocating nodes or rewiring data links. It also has benefits in allowing networks and devices that must be kept separate to share the same physical cabling without interacting, for reasons of simplicity, security, traffic management, or economy. For example, a VLAN could be used to separate traffic within a business due to users, and due to network administrators, or between types of traffic, so that users or low priority traffic cannot directly affect the rest of the network's functioning. Many Internet hosting services use VLANs to separate their customers' private zones from each other, allowing each customer's servers to be grouped together in a single network segment while being located anywhere in their datacenter. Some precautions are needed to prevent traffic "escaping" from a given VLAN, an exploit known as VLAN hopping.

This chapter is an overview of the VLAN section for {{{name}}} devices.

VLAN Configuration

The VLAN Configuration section allows you to create untagged and tagged VLAN networks.

Untagged ports VLAN allows you to assign different LAN ports to desired LAN networks. The method is pretty simple: first you have to create a VLAN, choose which LAN port(s) will provide addresses for that network and then configure LAN network.

Tagged ports VLAN allows a single router port to carry traffic from multiple VLAN's. Tags containing the respective VLAN identifiers indicating the VLAN to which the frame belongs are attached to the individual Ethernet frames.

By default {{{name}}} automatically have 1 VLAN created for LAN interface. This VLAN instance cannot be deleted.

Field Value Description
VLAN ID [1..4094]; default: 1 Unique VLAN section identifier. Transmitted and received as IEEE 802.1Q tag in an Ethernet frame.
Ports Untagged | Tagged | Off; default: untagged Select which Ethernet ports and how you want to use them with your VLAN.
  • Untagged - used for port-based VLAN.
  • Tagged - used for tag-based VLAN.
  • Off - disables the port.

Field Value Description
VLAN ID [1..4094]; default: 1 VLAN Identification number.
Mark selected ports (0) as Tagged | Untagged | Off; default: none Tagged port passes traffic for multiple VLAN's. Untagged port accepts traffic for only a single VLAN.



[[Category:{{{name}}} Network section]]