Getting to know VLAN in the Network

bardimin pic

Written by Bardimin

On January 4, 2022
Home » Blogs » Network » Getting to know VLAN in the Network

What are VLANs?

Virtual Local Area or better known as “VLAN” is a subnetwork capable of grouping devices on a local area (LAN) that are physically separated into one logical network.

VLANs arise because the complexity of the existing network has exceeded the capacity of the LAN. Initially, LANs connected a group of computers with servers using cables that were in the same physical location. However, in the current development, LAN is also connected via the network and also through wireless devices.

A large organization, of course, needs a solution that allows the network to grow in the future. VLANs, with their virtual nature, allow organizations to grow in terms of size, flexibility, and complexity because VLANs are not limited by device location.

VLANs make it easy for network administrators to group devices connected to a network. VLAN membership can be configured via so that network topology design can be simplified. Without a VLAN, creating a group of devices would require extra effort, cost, and time to build the infrastructure.


Using VLANs helps improve overall network performance by grouping the devices that communicate the most. VLANs also provide security on larger networks by allowing a higher level of control over which devices have access to one another. VLANs are flexible because they are based on logical, not physical connections.


port based

Port-based VLANs group local area networks by port. Each port can be configured manually as a member of a specific VLAN.

In one port, several VLANs can be configured in “” mode. To find out a port as a member of a VLAN which cannot be physically seen on the “switch”, but must look at the configuration on the switch.

MAC based

MAC-based VLAN group's network and VLAN membership are based on the MAC address of each device. Each switch has a MAC Address table for each device along with the assigned VLAN group.

Protocol based

-based VLANs handle traffic based on the . The switch will separate or forward the traffic based on the traffic protocol.

Because VLANs can work at layer 2 (OSI) then the use of protocols (IP and IP Extended) as the basis for VLAN membership can be done.

VLANs can also work on layer 3 protocols, so the subnet addresses can be used as the basis for determining VLAN membership.

By using the 802.1x protocol, VLAN membership can also be determined based on user or device authentication.

VLAN Range

VLAN range table

VLAN 0 , VLAN 4095Backup, which cannot be viewed or used.
VLAN 1Default VLAN of the switch. Cannot be deleted, but can be used.
VLAN 2-1001Normal range of VLANs. Can be created, edited, and deleted.
VLAN 1002-1005Default VLAN used by .
VLAN 1006-4094Extended VLAN range

How VLANs work

VLANs are identified by numbers. The usable range for VLAN IDs is 0-4095.

One port on the switch can be assigned one or more VLANs that allow dividing into logical groups.

Data communication on the switch occurs only on devices connected to ports with the same VLAN ID.

A network will consist of several switches because of the limited number of ports on a switch. To communicate between switches, the ports connected to other switches must be configured. The configuration on that port must allow all created VLANs to pass through that port in “trunk” mode. This configuration is carried out on each port that connects to other switches.

Advantages and Disadvantages of VLANs

Advantages of VLANs

  • VLANs are more cost effective, VLANs offer more flexibility in network design. Device grouping can be done virtually within the same switch without the need to physically differentiate. So the need for the number of switches in a network will be less and will save infrastructure costs.
    You don't need any additional and cables, which helps you save costs.
  • Easier network management, VLANs make it easier for network administrators to monitor, reconfigure networks, restrict access, move devices, and so on.
    You can logically group networks by department, project team, or function.
    These factors reduce the time and energy that administrators have to devote to configuration and security measures.
  • Network efficiency, network traffic is more directed, which will reduce unnecessary traffic and will lower the network load.
    VLANs have higher performance and lower latency than LANs.

Disadvantages of VLANs

  • Requires a switch that has management capabilities.
  • Requires a for large networks.

When to use VLAN

When you manage a local area network that has a few devices or a small network, using a VLAN will not give you much benefit. The difference in network performance will not make much difference between using a VLAN or not.

On a network consisting of only a few devices, using a VLAN will increase the cost of the network infrastructure. What you need to know, not all switches support the use of VLANs. In low-end switches, the VLAN management function is not available.

Using VLANs will be very useful when you manage a network with several devices reaching hundreds or maybe thousands. With a large number of devices, start thinking about efficiency in management to achieve maximum network performance.

On a large network, you will have difficulty if you are still using a traditional LAN. A large network will have large traffic as well, if you do not do the right configuration will impact poor network performance. In addition, the high mobility of the device will make it very difficult for you to manage the network.

By using a VLAN, you can solve problems like that easily.

Latest Articles

Redirect and Block URLs with HOSTS File on Windows

Redirect and Block URLs with HOSTS File on Windows

Redirect and Block URLs you can easily on Windows. Just by adding the IP of a website, you can redirect or block it. Of course, this is very useful to limit the access of your employees or children from accessing websites that you do not allow. Your Windows PC has...

Basic Computer and Laptop Maintenance Techniques

Basic Computer and Laptop Maintenance Techniques

You may not realize it, but computers and cars have something in common, both requiring regular maintenance. If your car needs regular oil changes, your computer should also regularly update its software, keep its antivirus up to date, and check for spyware....

How Proxy Anonymity Works

How Proxy Anonymity Works

The exchange of information on the Internet is carried out on a client-server model. The client sends a request (what files he needs) and the server sends a reply (what files he needs). For close cooperation (full understanding) between the client and the server, the...

How to Create Fake Files of Any Size in Windows

How to Create Fake Files of Any Size in Windows

Do you need a file with a size of 10 MB, 100 MB, 1 GB or 1 TB to test? Follow the following article to create one instantly. You don't need to download files or waste time searching for large files, you can create them easily. Sometimes you need large files quickly to...

Calculation of Ideal Bandwidth Requirements

Calculation of Ideal Bandwidth Requirements

The majority of hosting companies have a choice of bandwidth options in their plans. So, what exactly is bandwidth in the context of web hosting? In simple terms, bandwidth is the amount of traffic allowed between your website and the rest of the internet. The amount...