D-Link DFL-2500 User Guide - Page 75

Virtual LAN VLAN

Page 75 highlights

56 Chapter 9. Interfaces 9.2 Virtual LAN (VLAN) Virtual Networking is the ability of network appliances to manage the logical network topologies on top of the actual physical connections, allowing arbitrary segments within a network to be combined into a logical group. Since the flexibility and the ease of network control provided by the logical topologies, virtual networking has become one of the major areas in the internetworking. D-Link firewalls are fully compliant with IEEE 802.1Q specification for Virtual LANs, featured by defining virtual interfaces upon the physical Ethernet interface. Each virtual interface is interpreted as a logical interface by the firewall, with the same security policies control and configuration capabilities as regular interfaces. 9.2.1 VLAN Infrastructure A Local Area Network (LAN) is a broadcast domain, that is, a section of the network within whose boundaries any broadcast traffic is delivered to all end-nodes. When the LAN environment grows bigger, the support of broadcast or multicast applications that flood packets throughout the network costs considerable waste of bandwidth, since packets are often forwarded to nodes that do not require them. Virtual LAN (VLAN) allows a single physical LAN to be partitioned into several smaller logical LANs which are different broadcast domains. It limits the size of the broadcast domain for each logical LAN, saves the broadcast cost of the bandwidth to optimize the performance and resource allocation, and also divides larger LANs into several independent security zones to add security control points. Devices located in the same LAN can communicate without the awareness of the devices in other virtual LANs. This is ideal for separating industrial departments from physical topology to different function segments. A simple infrastructure of VLAN is shown in Figure 9.1. In this case, a D-Link firewall is configured to have 2 VLAN interfaces. Now, although the clients and servers are still sharing the same physical media, Client A can only communicate with Server D and the firewall since they are configured D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

56
Chapter 9. Interfaces
9.2
Virtual LAN (VLAN)
Virtual Networking is the ability of network appliances to manage the
logical network topologies on top of the actual physical connections,
allowing arbitrary segments within a network to be combined into a logical
group. Since the flexibility and the ease of network control provided by the
logical topologies, virtual networking has become one of the major areas in
the internetworking.
D-Link firewalls are fully compliant with IEEE 802.1Q specification for
Virtual LANs, featured by defining virtual interfaces upon the physical
Ethernet interface. Each virtual interface is interpreted as a logical
interface by the firewall, with the same security policies control and
configuration capabilities as regular interfaces.
9.2.1
VLAN Infrastructure
A Local Area Network (LAN) is a broadcast domain, that is, a section of
the network within whose boundaries any broadcast traffic is delivered to
all end-nodes. When the LAN environment grows bigger, the support of
broadcast or multicast applications that flood packets throughout the
network costs considerable waste of bandwidth, since packets are often
forwarded to nodes that do not require them.
Virtual LAN (VLAN) allows a single physical LAN to be partitioned into
several smaller logical LANs which are different broadcast domains. It
limits the size of the broadcast domain for each logical LAN, saves the
broadcast cost of the bandwidth to optimize the performance and resource
allocation, and also divides larger LANs into several independent security
zones to add security control points. Devices located in the same LAN can
communicate without the awareness of the devices in other virtual LANs.
This is ideal for separating industrial departments from physical topology
to different function segments.
A simple infrastructure of VLAN is shown in Figure
9.1
. In this case, a
D-Link firewall is configured to have 2 VLAN interfaces. Now, although the
clients and servers are still sharing the same physical media, Client A can
only communicate with Server D and the firewall since they are configured
D-Link Firewalls User’s Guide