Are VLANs Appropriate Here
-
This is pretty much the bread and butter reasoning that people give for VLANs. Keeping workstations away from the servers to which they need to communicate creates massive bottlenecks. And definitely shows, at the very least, that your networking setup in the other thread is incorrect, for this description, there is no question, if you need these VLANs, it is in the switch, not the firewall, that your routing and ACLs should exist. The switch is a firewall here, just to be clear, but not the SonicWall.
-
Why is corp wifi its own VLAN? Why are servers their own VLAN? Why is VoIP its own VLAN? Those three all appear to be crippling your network and adding cost, without any benefit, certainly not any security because they talk to each other anyway. The firewall between them is a red herring, does nothing of benefit.
If you wanted security from this style of model, the only logical way to handle it is to have every device or port on its own VLAN. It's extreme, but this is how secure shops do it. If you don't go to that level, the VLANs do essentially nothing, but still have loads of overhead.
The guest wifi on its own VLAN (or physical LAN, either way) is generally a good way to go. This is different because it is literally a completely different, unrelated network and never talks to the others, so this is where a VLAN really makes sense for sure.
-
I am in the process of redoing my network. My plan is to just have a single VLAN, just for guest stuff that will not talk to anything else. If you have all those devices on separate VLANs, and they do need to talk to each other, then you may be introducing a unnecessary point of failure, specifically the L3 switch. If they can all be on the same VLAN, or untagged, then you should be able to drop in just about any switch in a pinch and keep the network up when there is an outage. Ask me how I know.
-
@Donahue said in Are VLANs Appropriate Here:
I am in the process of redoing my network. My plan is to just have a single VLAN, just for guest stuff that will not talk to anything else. If you have all those devices on separate VLANs, and they do need to talk to each other, then you may be introducing a unnecessary point of failure, specifically the L3 switch. If they can all be on the same VLAN, or untagged, then you should be able to drop in just about any switch in a pinch and keep the network up when there is an outage. Ask me how I know.
Also a major bottleneck as traffic has to be filtered between each of those networks. It's overhead at exactly the spot where you don't want it. If you were able to VLAN by department that didn't share anything (or essentially anything) you could make an argument for VLANs between, say engineering and finance, assuming that they didn't share any server resources. Then put engineering workstations and engineering servers on on VLAN, and financial workstations and servers on another VLAN.
The easy way to tell if VLANs make sense for security is "do you need to allow traffic between them?" If the answer is yes, the VLAN is smoke and mirrors. If the answer is no, then you need to still see if the VLAN has value, but it means that potentially it does.
-
Not sure if this will muddy up the water but we have 3 VLANS on our network. All wired traffic (Servers, PCs, and VOIP) on VLAN 1, All Secured "corp" wifi on VLAN 2, and all student/guest wifi on VLAN3.
VLAN 3 cannot communicate with VLAN 1 or 2 without ACLs
VLAN1 and 2 can communicate with each other but cannot see anyone on VLAN 3
-
then why do VLAN 1 and 2 need to be on different VLANs?
-
@Donahue said in Are VLANs Appropriate Here:
then why do VLAN 1 and 2 need to be on different VLANs?
Technically they don't but I kept all LAN traffic outside of the WIFI scope
-
@WLS-ITGuy said in Are VLANs Appropriate Here:
@Donahue said in Are VLANs Appropriate Here:
then why do VLAN 1 and 2 need to be on different VLANs?
Technically they don't but I kept all LAN traffic outside of the WIFI scope
I am setting mine up so that all my stuff on the corp network can be switched, not routed. I am coming from a setup where everything was separated, and its was all inefficient. When my router blew up, it took most of my network with it because it all had to be routed.
-
@WLS-ITGuy said in Are VLANs Appropriate Here:
@Donahue said in Are VLANs Appropriate Here:
then why do VLAN 1 and 2 need to be on different VLANs?
Technically they don't but I kept all LAN traffic outside of the WIFI scope
No, if they can talk to each other the their traffic is not kept out of that scope. They are comingled, so what is the purpose of the VLAN?
-
@Donahue said in Are VLANs Appropriate Here:
@WLS-ITGuy said in Are VLANs Appropriate Here:
@Donahue said in Are VLANs Appropriate Here:
then why do VLAN 1 and 2 need to be on different VLANs?
Technically they don't but I kept all LAN traffic outside of the WIFI scope
I am setting mine up so that all my stuff on the corp network can be switched, not routed. I am coming from a setup where everything was separated, and its was all inefficient. When my router blew up, it took most of my network with it because it all had to be routed.
My VLANs are all at the switch level and my wireless controller.
-
@Donahue said in Are VLANs Appropriate Here:
@WLS-ITGuy said in Are VLANs Appropriate Here:
@Donahue said in Are VLANs Appropriate Here:
then why do VLAN 1 and 2 need to be on different VLANs?
Technically they don't but I kept all LAN traffic outside of the WIFI scope
I am setting mine up so that all my stuff on the corp network can be switched, not routed. I am coming from a setup where everything was separated, and its was all inefficient. When my router blew up, it took most of my network with it because it all had to be routed.
That's the boat that the OP is in, he has this massive bottleneck and risk in the router that isn't serving a purpose. Even without removing the VLANs, he could fix that by moving their crossover point to the switch.
-
is this just a DHCP scope thing?
-
@Donahue said in Are VLANs Appropriate Here:
is this just a DHCP scope thing?
Right, DHCP is affected, but not security.
-
@scottalanmiller said in Are VLANs Appropriate Here:
@Donahue said in Are VLANs Appropriate Here:
is this just a DHCP scope thing?
Right, DHCP is affected, but not security.
I can see the argument of having two different DHCP scopes, one for wired and one for wireless. I cannot comment on if that is the best choice though, just that it makes sense.
-
@Donahue said in Are VLANs Appropriate Here:
@scottalanmiller said in Are VLANs Appropriate Here:
@Donahue said in Are VLANs Appropriate Here:
is this just a DHCP scope thing?
Right, DHCP is affected, but not security.
I can see the argument of having two different DHCP scopes, one for wired and one for wireless. I cannot comment on if that is the best choice though, just that it makes sense.
Based on what need? Just the fear that someone will hijack the secure wireless and perform a DHCP exhaustion attack? It's a huge amount of effort for a really trivial attack vector that has no serious impact.
-
no, I am saying that I could see that someone wanted to separate out their devices so each could have its own separate DHCP scope. I am not saying that this was a good idea, or that I would do it, just that I can see how VLAN's could be used to achieve that effect. Again, I am not saying this would be using VLANs correctly