Professional Documents
Culture Documents
Virtual LAN Configuration Guide PDF
Virtual LAN Configuration Guide PDF
IMPORTANT NOTICE
Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any
products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the
right, without notice to make changes in product design or specifications. Information is subject to change without notice.
USERS LICENSE
The Appliance described in this document is furnished under the terms of Elitecores End User license agreement.
Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be
bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the
unused Appliance and manual (with proof of payment) to the place of purchase for a full refund.
LIMITED WARRANTY
Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on
which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the
Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS.
This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire
liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service centers option, repair,
replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the
customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate
the software without problems or interruptions. Elitecore hereby declares that the anti virus and anti spam modules are
powered by Kaspersky Labs and Commtouch respectively and the performance thereof is under warranty provided by
Kaspersky Labs and by Commtouch. It is specified that Kaspersky Lab does not warrant that the Software identifies all
known viruses, nor that the Software will not occasionally erroneously report a virus in a title not infected by that virus.
Hardware: Elitecore warrants that the Hardware portion of the Elitecore Products excluding power supplies, fans and
electrical components will be free from material defects in workmanship and materials for a period of One (1) year.
Elitecore's sole obligation shall be to repair or replace the defective Hardware at no charge to the original owner. The
replacement Hardware need not be new or of an identical make, model or part; Elitecore may, in its discretion, replace
the defective Hardware (or any part thereof) with any reconditioned product that Elitecore reasonably determines is
substantially equivalent (or superior) in all material respects to the defective Hardware.
DISCLAIMER OF WARRANTY
Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including,
without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising
from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law.
In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect,
consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the
use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such
damages. In the event shall Elitecores or its suppliers liability to the customer, whether in contract, tort (including
negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above
stated warranty fails of its essential purpose.
In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages,
including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual,
even if Elitecore or its suppliers have been advised of the possibility of such damages.
RESTRICTED RIGHTS
Copyright 1999-2009 Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of
Elitecore Technologies Ltd.
CORPORATE HEADQUARTERS
Elitecore Technologies Ltd.
904 Silicon Tower, Off. C.G. Road,
Ahmedabad 380015, INDIA
Phone: +91-79-66065606
Fax: +91-79-26407640
Web site: www.elitecore.com , www.cyberoam.com
2
Virtual LAN Configuration Guide
Contents
3
Virtual LAN Configuration Guide
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your
registration status, or similar issues to Customer care/service department at the following address:
Corporate Office
eLitecore Technologies Ltd.
904, Silicon Tower
Off C.G. Road
Ahmedabad 380015
Gujarat, India.
Phone: +91-79-66065606
Fax: +91-79-26407640
Web site: www.elitecore.com
Cyberoam contact:
Technical support (Corporate Office): +91-79-26400707
Email: support@cyberoam.com
Web site: www.cyberoam.com
4
Virtual LAN Configuration Guide
Typographic Conventions
Report
shaded font
typefaces
Introduction
typefaces
Name of a Lowercase Enter policy name, replace policy name with the specific
particular italic type name of a policy
parameter / Or
field / command Click Name to select where Name denotes command button
button text text which is to be clicked
Cross Hyperlink in refer to Customizing User database Clicking on the link will
references different color open the particular topic
5
Virtual LAN Configuration Guide
Introduction
Local area network consists of the devices in the same broadcast domain. Routers stop
broadcasts while switches just forward them.
Virtual LAN (VLAN) is a broadcast domain configured on switch on a port-by- port basis.
Generally, router creates the broadcast domain but with VLAN, a switch can also create a
broadcast domain.
VLAN allow you to segment your switched network so that broadcast domains are smaller, leaving
more bandwidth for your end nodes. Devices that are in one VLAN can communicate with each
other but cannot communicate with the devices in another VLAN. The communication among
devices on a VLAN is independent of the physical network.
A VLAN segregates devices by adding 802.1Q VLAN tags to all of the packets sent and received
by the devices in the VLAN. VLAN ID/tags are 4-byte frame extensions that contain a VLAN
identifier as well as other information.
Advantages
Increased Port density
Logical segmentation of Network irrespective of physical placement
Granular security on heterogeneous LANs
Improved Network throughput as VLAN confines broadcast domain
In a typical VLAN configuration, 802.1Q-compliant VLAN layer-2 switches or layer-3 routers add
VLAN IDs to packets. Layer-2 switches can handle packets passing between devices in the same
VLAN. A layer-3 device such as router or layer-3 switch must handle packets passing between
devices in different VLANs.
Cyberoam appliance functions as a layer-3 device to control the flow of packets between VLANs.
Cyberoam can also remove VLAN IDs/tags from incoming VLAN packets and forward untagged
packets to other networks, such as the Internet.
VLAN support on Cyberoam is achieved by means of virtual interface, which are logical interfaces
nested beneath a physical interface/port. Every unique VLAN ID requires its own virtual interface.
You add virtual interfaces to the Cyberoams internal interface that have VLAN IDs that match the
VLAN IDs of packets in the VLAN trunk. Cyberoam then directs packets with VLAN IDs to
interfaces with matching VLAN IDs.
You can also define virtual interfaces on all the Cyberoam interfaces except the external interface
i.e. interface for the WAN zone. Cyberoam can add VLAN IDs to packets leaving a VLAN interface
or remove VLAN IDs from incoming packets and add a different VLAN IDs to outgoing packets.
6
Virtual LAN Configuration Guide
Virtual interface has most of the capabilities and characteristics of a physical interface, including
zone membership, security services, routing, access rule controls, virus, and spam scanning.
Cyberoam supports up to 4093 interfaces.
Using VLANs, a single Cyberoam appliance can provide security services and control connections
between multiple domains. Configure Different VLAN IDs for the traffic of each domain. Cyberoam
recognizes VLAN IDs and applies security policies to secure network between domains. Cyberoam
also applies authentication, various policies, and firewall rule features for network.
Note
VLAN (Virtual LAN) tags will be preserved even when antivirus scanning, spam filtering and web
filtering using Internet Access Policy (IAP) are applied to VLAN tagged traffic in Bridge mode.
You can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that do
not belong to that VLAN do not share the broadcast traffic.
Below given example illustrates a typical deployment of a VLAN with an SME that spans over
multiple floors.
7
Virtual LAN Configuration Guide
In the above given example, Network has Cyberoam and VLAN switch, Web server farm and mail
server (DMZ zone) are also located in the same room while Management workstations and laptops
(LAN zone) are physically distributed.
Switch on first floor provides connectivity to the Engineering department and all the ports of this
switch are assigned to VLAN 100.
Switch on second floor provides connectivity to the Sales & Marketing department and all the ports
of this switch are assigned to VLAN 200.
Switch on third floor provides connectivity to the HR & Admin department and all the ports of this
switch are assigned to VLAN 300.
The external interface connects to the internet and is not configured with virtual subinterfaces.
When the switch receives packets from VLAN 100, VLAN 200, and VLAN 300, it applies VLAN ID
tags and forwards the packets to local ports and across the trunk to the Cyberoam appliance. The
Cyberoam appliance has policies that allow traffic to flow between the VLANs and from the VLANs
to the external network as well as to and from LAN zone.
8
Virtual LAN Configuration Guide
9
Virtual LAN Configuration Guide
If the custom zone is created for Virtual subinterface, two default firewall rules for the zone are
automatically created depending on zone type of the custom zone. For example, if the zone type
for the virtual interface is LAN, two default firewall rules under virtual subinterface to WAN zone
are automatically created based on the default LAN to WAN zone firewall rules.
1. Select System Zone Manage and click the Zone in which the virtual subinterface is
to be included.
2. Click the virtual subinterface to be included from the Available Port(s) list and click to move to
the Member Port(s) list.
3. Specify description
4. Click Save button
Once the virtual interface is defined and is included in a zone, it can be treated exactly same as
the physical interface. Customization of firewall rules that govern the traffic between VLANs and
other interfaces, IDP policies and virus and spam scanning can be performed the same way as
done with the physical interface.
10
Virtual LAN Configuration Guide
VLAN Management
Use to:
Update virtual subinterface details
Change Zone membership
Delete virtual subinterface
1. Select System Configure Network Manage Interface and click the Edit icon
against the Interface whose details is to be updated
2. Displays Interface name which cannot be updated
3. Displays IP address and netmask assigned to the Interface. Modify, if required. Assign static
IP address only and subnet ID should be unique across all the physical/virtual subinterfaces.
4. Click Update button to save the changes.
11
Virtual LAN Configuration Guide
Prerequisite
Vertical subinterface should be the member of any zone
No firewall rule created for the virtual subinterface
Select System Configure Network Manage Interface and click the Delete icon
against the Interface to be deleted
12