What are the methods for dividing vlan?
Vlan division methods include: 1. Division based on port; 2. Division based on MAC address; 3. Division based on network layer protocol; 4. Division based on IP multicast; 5. Division based on policy; 6. Division based on user Definition, non-user authorization division.
#The operating environment of this article: Windows 7 system, Dell G3 computer.
Vlan division methods are:
1. VLAN based on port division
This is the most commonly used VLAN division method, and the application is also It is the most widespread and effective. Currently, most VLAN protocol switches provide this VLAN configuration method. This method of dividing VLAN is based on the switching ports of the Ethernet switch. It divides the physical ports on the VLAN switch and the PVC (permanent virtual circuit) ports inside the VLAN switch into several groups, and each group forms a virtual network, equivalent to an independent VLAN switch.
When different departments need to visit each other, they can be forwarded through routers and combined with port filtering based on MAC addresses. Set a passable MAC address set on the corresponding port of the switch, routing switch or router closest to the site on the access path to the site. This prevents illegal intruders from stealing IP addresses from within and intruding from other accessible points.
We can see from this division method itself that the advantage of this division method is that it is very simple to define VLAN members, as long as all ports are defined as corresponding VLAN groups. Suitable for any size network. Its disadvantage is that if a user leaves the original port and arrives at a certain port of a new switch, it must be redefined.
2. VLAN division based on MAC address
This method of dividing VLAN is based on the MAC address of each host, that is, each host with a MAC address is configured with which group it belongs to. , the mechanism it implements is that each network card corresponds to a unique MAC address, and the VLAN switch tracks the address belonging to the VLAN MAC. This type of VLAN allows network users to automatically retain their membership in the VLAN as they move from one physical location to another.
It can be seen from this division mechanism that the biggest advantage of this VLAN division method is that when the user's physical location moves, that is, when changing from one switch to another switch, the VLAN does not need to be reconfigured, because It is user based, not switch port based. The disadvantage of this method is that all users must be configured during initialization. If there are hundreds or even thousands of users, the configuration is very tiring, so this division method is usually suitable for small LANs. Moreover, this method of division also leads to a reduction in the efficiency of the switch, because there may be many members of the VLAN group on each switch port, and the MAC addresses of many users are stored, making it difficult to query. In addition, for users who use laptop computers, their network cards may be changed frequently, so VLAN must be configured frequently.
3. VLAN classification based on network layer protocols
VLANs are divided according to network layer protocols and can be divided into VLAN networks such as IP, IPX, DECnet, AppleTalk, and Banyan. This VLAN composed of network layer protocols enables the broadcast domain to span multiple VLAN switches. This is very attractive for network administrators who want to organize users for specific applications and services. Furthermore, users can move freely within the network but their VLAN membership remains unchanged.
The advantage of this method is that when the user's physical location changes, there is no need to reconfigure the VLAN to which it belongs, and VLANs can be divided according to protocol types, which is very important for network managers. Also, this This method does not require additional frame tags to identify VLANs, which can reduce network traffic. The disadvantage of this method is low efficiency, because checking the network layer address of each data packet requires processing time (compared to the previous two methods). General switch chips can automatically check the Ethernet frame of data packets on the network. header, but allowing the chip to check the IP frame header requires higher technology and is more time-consuming. Of course, this is related to the implementation methods of each manufacturer.
4. Divide VLANs based on IP multicast
IP multicast is actually a definition of VLAN, that is, an IP multicast group is considered to be a VLAN. This method of division extends the VLAN to the WAN, so this method has greater flexibility and is easy to expand through routers. It is mainly suitable for LAN users who are not in the same geographical range to form a VLAN. It is not suitable for LAN. It's not efficient.
5. Divide VLANs based on policies
VLANs based on policies can implement a variety of allocation methods, including VLAN switch ports, MAC addresses, IP addresses, network layer protocols, etc. Network managers can decide which type of VLAN to choose based on their own management mode and the needs of their unit.
6. Divide VLAN based on user definition and non-user authorization
Dividing VLAN based on user definition and non-user authorization means that in order to adapt to special VLAN networks, it is based on the special needs of specific network users. It is required to define and design VLAN, and allows non-VLAN group users to access the VLAN, but they need to provide the user password and can join a VLAN only after being authenticated by the VLAN management.
Related video recommendations: PHP programming from entry to proficiency
The above is the detailed content of What are the methods for dividing vlan?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The domestic AI dark horse DeepSeek has risen strongly, shocking the global AI industry! This Chinese artificial intelligence company, which has only been established for a year and a half, has won wide praise from global users for its free and open source mockups, DeepSeek-V3 and DeepSeek-R1. DeepSeek-R1 is now fully launched, with performance comparable to the official version of OpenAIo1! You can experience its powerful functions on the web page, APP and API interface. Download method: Supports iOS and Android systems, users can download it through the app store; the web version has also been officially opened! DeepSeek web version official entrance: ht

At the beginning of 2025, domestic AI "deepseek" made a stunning debut! This free and open source AI model has a performance comparable to the official version of OpenAI's o1, and has been fully launched on the web side, APP and API, supporting multi-terminal use of iOS, Android and web versions. In-depth search of deepseek official website and usage guide: official website address: https://www.deepseek.com/Using steps for web version: Click the link above to enter deepseek official website. Click the "Start Conversation" button on the homepage. For the first use, you need to log in with your mobile phone verification code. After logging in, you can enter the dialogue interface. deepseek is powerful, can write code, read file, and create code

DeepSeek: How to deal with the popular AI that is congested with servers? As a hot AI in 2025, DeepSeek is free and open source and has a performance comparable to the official version of OpenAIo1, which shows its popularity. However, high concurrency also brings the problem of server busyness. This article will analyze the reasons and provide coping strategies. DeepSeek web version entrance: https://www.deepseek.com/DeepSeek server busy reason: High concurrent access: DeepSeek's free and powerful features attract a large number of users to use at the same time, resulting in excessive server load. Cyber Attack: It is reported that DeepSeek has an impact on the US financial industry.