当前位置:网站首页>What is a private VLAN? Eight part essay with pictures and texts.
What is a private VLAN? Eight part essay with pictures and texts.
2022-06-24 02:03:00 【Network technology alliance station】
special VLAN Technology has been coming out for a long time , But sometimes they are relatively complicated to configure .
this paper , I will show you about private VLAN The concept of .
In daily work , The computers of colleagues in an office do not communicate with each other , Or there is no interaction between the computer inside the office and the external server , Generally, all traffic will pass through the gateway outside the intranet , By it .
The following example shows communication through the gateway server ( Whether deployed internally or outside the organization ) Several scenarios , These servers host the services we intend to use :
These figures show that the traffic reaches the target host through the uplink connection instead of directly , This indicates that the ability to communicate directly with hosts on the same subnet is usually not necessary , But a burden .
Broadcast area
The first 2 Layer switches allow devices connected to their ports to communicate directly with each other at the data link layer , in other words , No intermediate devices such as routers or firewalls are required ; therefore , The same VLAN Hosts on are said to share the same broadcast domain .
This also means that their traffic is not usually analyzed , It will not be blocked when a device is threatened , under these circumstances , The infected host can freely infect or attack other machines on the same network segment .
There are a variety of techniques to prevent or mitigate such behavior , for example NAC、 Inline probe .
Network segmentation
In an organization , Usually, different departments of the company are separated , So that a department ( Finance ) Host with another department ( Namely marketing ) The host is separated .
There are many reasons for this separation :
- Just look at its IP The subnet can easily identify which group the host belongs to
- Besides , When a host leaves its subnet to reach another device outside its network , It needs to pass through an intermediate node , Such as routers or firewalls , This facilitates the introduction of flow restriction rules . Network segmentation
Although this separation applies to different parts of the network , But if we want to stop the same VLAN What about the traffic between hosts in the ? As we can see from the previous example , We usually don't need these hosts to access each other , We would rather avoid this situation .
Due to the characteristics of shared broadcast domain , The host can communicate directly , No intermediate equipment is required , So the solution is to activate Private VLAN To configure , Instructs the underlying switch to modify and restrict specific VLAN The flow inside .
special VLAN
Under normal circumstances , Switches allow traffic to flow from one port to the same port VLAN Any other port in the , As shown in the following example :
If now we will VLAN Configure to PRIVATE, We can see that traffic will no longer flow from one port to another :
Of course, this situation is of little use , We still need a port to receive our traffic ;
Usually, this is the port to which our local gateway is connected , It was named Hybrid port :
Although hybrid ports can be private VLAN All other ports in ( be called Isolation port ) Receive traffic , But these ports will not be able to send traffic to each other :
As mentioned earlier , The same isolated port will continue to send and receive traffic to the hybrid port :
The term :
For a better understanding of dedicated VLAN The operation behind it , Understand the technical terms involved :
Isolation port : Only traffic from these ports is allowed to flow to hybrid ports , No traffic can flow from one isolated port to another , This prevents any attempt to go from one host to the same VLAN To communicate with another host in the , In our chart , We use yellow markers to indicate these ports .
Hybrid port : This is the only port that can send traffic to the isolated port , The isolated ports cannot send traffic to each other , So the only traffic they receive is traffic from that port . In our chart , We indicate this port with a red flag .
Public port : Join the public vlan The ports in are called public ports , In our chart , We use blue markers to indicate these ports .
Example 1, Isolation port :
In the following illustration , We can see the connection to tradition VLAN The host .
Traffic can move freely from one host to another , To the gateway , In order to reach the external subnet .
Once we will VLAN Configure as private , The traffic between hosts will be blocked .
In order to provide to VLAN External connection of the , We configure a port to be promiscuous and connected locally GW:
therefore ,Hosts There is no mutual access at all , But they can only access their VLAN Outside the service .
Example 2:
Now suppose our VLAN There is a group of hosts that still need to communicate with each other , These may be two hosts sharing a local folder , For some reason it cannot be moved to the central server .
Although we still want to protect these hosts from VLAN The impact of other equipment in , But we also need to allow them to access each other directly and to be able to access hybrid ports to leave the subnet .
By configuring the ports connected to these two specific hosts as public ports , Allow traffic flow between these two ports and the hybrid port , There will be no flow from or into the isolation port .
From a switch perspective , It is necessary to distinguish the traffic entering from the hybrid port and the traffic entering through the isolated port .
This is done by defining two different VLAN To obtain the , A master VLAN Traffic entering from the hybrid port will be identified , And auxiliary VLAN Will represent the traffic entering from the isolated port .
The following table helps to summarize this concept :
- Lord VLAN | Mark the traffic entering from the hybrid port
- auxiliary VLAN | Mark the traffic entering from the isolation port
summary
As security becomes an increasingly important factor for every company , private VLAN Provides a fast and simple solution to increase isolation between hosts .
This method can be applied to the visitor network , And most access networks , Even small data centers with physical servers .
By adding multiple masters and slaves to the same switch VLAN, Even by taking private VLAN Extend the concept to other devices to get a distributed concept , This concept can be further enriched .
Now , private VLAN The application of macro segmentation also appears in VXLAN In the network , To support complex security options such as zero trust .
边栏推荐
- Detailed explanation of SSH tunnel and stable intranet penetration using autossh
- Tcapulusdb Jun · industry news collection (November 22)
- 2021-11-14:Fizz Buzz。 I'll give you an integer n and find the number from 1 to n
- 6、 Symbols and commands for numerical calculation of variables
- Stm32g474 infrared receiving based on irtim peripherals
- Gin framework: implementing service end flow limiting Middleware
- Tencent cloud won the first place in the cloud natural language understanding classification task
- Wechat open platform: OpenAPI, cloud development and basic management capability upgrade
- application. Yaml configuring multiple running environments
- What is "data" in data analysis- Cassie Kozyrkov
猜你喜欢
![[SQL injection 12] user agent injection foundation and Practice (based on burpsuite tool and sqli labs LESS18 target machine platform)](/img/c8/f6c2a62b8ab8fa88bd2b3d8f35f592.jpg)
[SQL injection 12] user agent injection foundation and Practice (based on burpsuite tool and sqli labs LESS18 target machine platform)

It's too difficult for me. Ali has had 7 rounds of interviews (5 years of experience and won the offer of P7 post)

How to fill in and register e-mail, and open mass mailing software for free

I, a 27 year old female programmer, feel that life is meaningless, not counting the accumulation fund deposit of 430000

163 mailbox login portal display, enterprise mailbox computer version login portal

BIM model example

Review of AI hotspots this week: the Gan compression method consumes less than 1/9 of the computing power, and the open source generator turns your photos into hand drawn photos
![[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)](/img/b5/a8c4bbaf868dd20b7dc9449d2a4378.jpg)
[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)

application. Yaml configuring multiple running environments

Stm32g474 infrared receiving based on irtim peripherals
随机推荐
[tcapulusdb knowledge base] how to get started with tcapulus SQL driver?
[tcapulusdb knowledge base] common problems of tcapulusdb local deployment
What if the cloud desktop fails to connect to the server? How to use cloud desktop?
Tcapulusdb Jun · industry news collection (November 22)
3、 Shell variable substring
Detailed explanation of SSH tunnel and stable intranet penetration using autossh
What are the categories of code signing certificates? What are the differences between different types of certificates?
Echo framework: implementing service end flow limiting Middleware
If there are enumerations in the entity object, the conversion of enumerations can be carried out with @jsonvalue and @enumvalue annotations
[expense center] demand & problem feedback week is coming! Feedback wins a good gift!
Based on ARM embedded real-time streaming media service development and deployment, easygbs supports arm64 architecture
Global and Chinese alumina nanoparticle market scale and Development Trend Outlook report 2022-2028
Go language core 36 lecture (go language practice and application I) -- learning notes
How to use voice synthesis? Can voice synthesis modify the voice?
4、 Variable assignment method
Talk about 15 tips of SQL optimization
The same set of code returns normally sometimes and reports an error sometimes. Signature error authfailure SignatureFailure
[tcapulusdb knowledge base] how to delete a table in tcapulusdb table management?
Global and Chinese dealox industry development status and demand trend forecast report 2022-2028
How to solve the problem of uncaught (in promise) when easywasmlayer plays a video?