When are Native VLANs used? Are there times when a Native VLAN will never be used?











up vote
1
down vote

favorite












This is probably a simple one, but I am very new to VLANs.



I'd like to avoid using VLAN 1 as well as gain a better understanding of when native VLANs come into play when setting up a switch.



On an 8 port switch, if ports 1-4 are set as access ports (untagged) on VLAN 10, and ports 5-7 are set as access ports (untagged) on VLAN 20, if port 8 is set to trunk mode (tagged, to connect to another switch) with native VLAN still on VLAN 1, that native VLAN 1 would never actually be used, right, since all traffic is set to VLAN 10 and 20? If this is correct, what would the setup look like for traffic to use the native VLAN?










share|improve this question
























  • Is this a Cisco switch?
    – Ron Maupin
    Dec 7 at 16:26










  • I've been using Packet Tracer (Cisco), but also have access to an HP Procurve as well as Netgear managed switch...hence my terminology possibly being messy.
    – vim_usr
    Dec 7 at 16:28










  • You can set up Cisco to not trunk VLAN and have all VLANs on a trunk as tagged, so there is no native VLAN. Other vendors sometime need VLAN 1 as a native VLAN. It depends on the version of STP used.
    – Ron Maupin
    Dec 7 at 16:31










  • I assumed trunk = tagged. So when an untagged frame associated with a VLAN like VLAN 10, that frame would be tagged as 10 on the trunk. Is that not always the case?
    – vim_usr
    Dec 7 at 16:36










  • That depends on how it is configured. You could have VLAN 10 as the native VLAN, so it would not be tagged. You can simply leave VLAN 1 as the native (untagged) VLAN, and remove it from from the list of VLANs allowed on the trunk (a Cisco best practice). That may not work on other vendors.
    – Ron Maupin
    Dec 7 at 16:40















up vote
1
down vote

favorite












This is probably a simple one, but I am very new to VLANs.



I'd like to avoid using VLAN 1 as well as gain a better understanding of when native VLANs come into play when setting up a switch.



On an 8 port switch, if ports 1-4 are set as access ports (untagged) on VLAN 10, and ports 5-7 are set as access ports (untagged) on VLAN 20, if port 8 is set to trunk mode (tagged, to connect to another switch) with native VLAN still on VLAN 1, that native VLAN 1 would never actually be used, right, since all traffic is set to VLAN 10 and 20? If this is correct, what would the setup look like for traffic to use the native VLAN?










share|improve this question
























  • Is this a Cisco switch?
    – Ron Maupin
    Dec 7 at 16:26










  • I've been using Packet Tracer (Cisco), but also have access to an HP Procurve as well as Netgear managed switch...hence my terminology possibly being messy.
    – vim_usr
    Dec 7 at 16:28










  • You can set up Cisco to not trunk VLAN and have all VLANs on a trunk as tagged, so there is no native VLAN. Other vendors sometime need VLAN 1 as a native VLAN. It depends on the version of STP used.
    – Ron Maupin
    Dec 7 at 16:31










  • I assumed trunk = tagged. So when an untagged frame associated with a VLAN like VLAN 10, that frame would be tagged as 10 on the trunk. Is that not always the case?
    – vim_usr
    Dec 7 at 16:36










  • That depends on how it is configured. You could have VLAN 10 as the native VLAN, so it would not be tagged. You can simply leave VLAN 1 as the native (untagged) VLAN, and remove it from from the list of VLANs allowed on the trunk (a Cisco best practice). That may not work on other vendors.
    – Ron Maupin
    Dec 7 at 16:40













up vote
1
down vote

favorite









up vote
1
down vote

favorite











This is probably a simple one, but I am very new to VLANs.



I'd like to avoid using VLAN 1 as well as gain a better understanding of when native VLANs come into play when setting up a switch.



On an 8 port switch, if ports 1-4 are set as access ports (untagged) on VLAN 10, and ports 5-7 are set as access ports (untagged) on VLAN 20, if port 8 is set to trunk mode (tagged, to connect to another switch) with native VLAN still on VLAN 1, that native VLAN 1 would never actually be used, right, since all traffic is set to VLAN 10 and 20? If this is correct, what would the setup look like for traffic to use the native VLAN?










share|improve this question















This is probably a simple one, but I am very new to VLANs.



I'd like to avoid using VLAN 1 as well as gain a better understanding of when native VLANs come into play when setting up a switch.



On an 8 port switch, if ports 1-4 are set as access ports (untagged) on VLAN 10, and ports 5-7 are set as access ports (untagged) on VLAN 20, if port 8 is set to trunk mode (tagged, to connect to another switch) with native VLAN still on VLAN 1, that native VLAN 1 would never actually be used, right, since all traffic is set to VLAN 10 and 20? If this is correct, what would the setup look like for traffic to use the native VLAN?







switch vlan switchport






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Dec 7 at 17:58









jonathanjo

10.3k1632




10.3k1632










asked Dec 7 at 16:23









vim_usr

1405




1405












  • Is this a Cisco switch?
    – Ron Maupin
    Dec 7 at 16:26










  • I've been using Packet Tracer (Cisco), but also have access to an HP Procurve as well as Netgear managed switch...hence my terminology possibly being messy.
    – vim_usr
    Dec 7 at 16:28










  • You can set up Cisco to not trunk VLAN and have all VLANs on a trunk as tagged, so there is no native VLAN. Other vendors sometime need VLAN 1 as a native VLAN. It depends on the version of STP used.
    – Ron Maupin
    Dec 7 at 16:31










  • I assumed trunk = tagged. So when an untagged frame associated with a VLAN like VLAN 10, that frame would be tagged as 10 on the trunk. Is that not always the case?
    – vim_usr
    Dec 7 at 16:36










  • That depends on how it is configured. You could have VLAN 10 as the native VLAN, so it would not be tagged. You can simply leave VLAN 1 as the native (untagged) VLAN, and remove it from from the list of VLANs allowed on the trunk (a Cisco best practice). That may not work on other vendors.
    – Ron Maupin
    Dec 7 at 16:40


















  • Is this a Cisco switch?
    – Ron Maupin
    Dec 7 at 16:26










  • I've been using Packet Tracer (Cisco), but also have access to an HP Procurve as well as Netgear managed switch...hence my terminology possibly being messy.
    – vim_usr
    Dec 7 at 16:28










  • You can set up Cisco to not trunk VLAN and have all VLANs on a trunk as tagged, so there is no native VLAN. Other vendors sometime need VLAN 1 as a native VLAN. It depends on the version of STP used.
    – Ron Maupin
    Dec 7 at 16:31










  • I assumed trunk = tagged. So when an untagged frame associated with a VLAN like VLAN 10, that frame would be tagged as 10 on the trunk. Is that not always the case?
    – vim_usr
    Dec 7 at 16:36










  • That depends on how it is configured. You could have VLAN 10 as the native VLAN, so it would not be tagged. You can simply leave VLAN 1 as the native (untagged) VLAN, and remove it from from the list of VLANs allowed on the trunk (a Cisco best practice). That may not work on other vendors.
    – Ron Maupin
    Dec 7 at 16:40
















Is this a Cisco switch?
– Ron Maupin
Dec 7 at 16:26




Is this a Cisco switch?
– Ron Maupin
Dec 7 at 16:26












I've been using Packet Tracer (Cisco), but also have access to an HP Procurve as well as Netgear managed switch...hence my terminology possibly being messy.
– vim_usr
Dec 7 at 16:28




I've been using Packet Tracer (Cisco), but also have access to an HP Procurve as well as Netgear managed switch...hence my terminology possibly being messy.
– vim_usr
Dec 7 at 16:28












You can set up Cisco to not trunk VLAN and have all VLANs on a trunk as tagged, so there is no native VLAN. Other vendors sometime need VLAN 1 as a native VLAN. It depends on the version of STP used.
– Ron Maupin
Dec 7 at 16:31




You can set up Cisco to not trunk VLAN and have all VLANs on a trunk as tagged, so there is no native VLAN. Other vendors sometime need VLAN 1 as a native VLAN. It depends on the version of STP used.
– Ron Maupin
Dec 7 at 16:31












I assumed trunk = tagged. So when an untagged frame associated with a VLAN like VLAN 10, that frame would be tagged as 10 on the trunk. Is that not always the case?
– vim_usr
Dec 7 at 16:36




I assumed trunk = tagged. So when an untagged frame associated with a VLAN like VLAN 10, that frame would be tagged as 10 on the trunk. Is that not always the case?
– vim_usr
Dec 7 at 16:36












That depends on how it is configured. You could have VLAN 10 as the native VLAN, so it would not be tagged. You can simply leave VLAN 1 as the native (untagged) VLAN, and remove it from from the list of VLANs allowed on the trunk (a Cisco best practice). That may not work on other vendors.
– Ron Maupin
Dec 7 at 16:40




That depends on how it is configured. You could have VLAN 10 as the native VLAN, so it would not be tagged. You can simply leave VLAN 1 as the native (untagged) VLAN, and remove it from from the list of VLANs allowed on the trunk (a Cisco best practice). That may not work on other vendors.
– Ron Maupin
Dec 7 at 16:40










1 Answer
1






active

oldest

votes

















up vote
3
down vote



accepted










If you have an 8-port switch with ports 1-4 on VLAN 10, and 5-7 on VLAN 20, port 8 as trunk and default VLAN 1 ...



It's correct, VLAN 1 shouldn't be used



Watch for




  • Untagged frames arriving on the trunk port 8

  • Tagged-as-VLAN-1 frames arriving on the access ports or the trunk port


What happens with these depends on your manufacturer, model, and potentially other configuration. The normal goal would be to




  • Drop any untagged frames arriving on a trunk

  • Drop any unknown-VLAN tagged frames arriving anywhere


How you configure this depends on the particular switch.



Of course, if everything is configured correctly, you'll never get these untagged or tagged with unknown VLAN frames. But what's at the other end of all your wires? If there is any chance of malicious frames, or the ever-present certainty of configuration errors, this is just for protection. As a security matter, one of the first things the malcious systems do is mess with VLANs and MAC addresses.






share|improve this answer























  • This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
    – vim_usr
    Dec 7 at 16:33










  • Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
    – jonathanjo
    Dec 7 at 16:36










  • Thank you for the clarification. That makes sense.
    – vim_usr
    Dec 7 at 16:38











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "496"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f55275%2fwhen-are-native-vlans-used-are-there-times-when-a-native-vlan-will-never-be-use%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
3
down vote



accepted










If you have an 8-port switch with ports 1-4 on VLAN 10, and 5-7 on VLAN 20, port 8 as trunk and default VLAN 1 ...



It's correct, VLAN 1 shouldn't be used



Watch for




  • Untagged frames arriving on the trunk port 8

  • Tagged-as-VLAN-1 frames arriving on the access ports or the trunk port


What happens with these depends on your manufacturer, model, and potentially other configuration. The normal goal would be to




  • Drop any untagged frames arriving on a trunk

  • Drop any unknown-VLAN tagged frames arriving anywhere


How you configure this depends on the particular switch.



Of course, if everything is configured correctly, you'll never get these untagged or tagged with unknown VLAN frames. But what's at the other end of all your wires? If there is any chance of malicious frames, or the ever-present certainty of configuration errors, this is just for protection. As a security matter, one of the first things the malcious systems do is mess with VLANs and MAC addresses.






share|improve this answer























  • This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
    – vim_usr
    Dec 7 at 16:33










  • Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
    – jonathanjo
    Dec 7 at 16:36










  • Thank you for the clarification. That makes sense.
    – vim_usr
    Dec 7 at 16:38















up vote
3
down vote



accepted










If you have an 8-port switch with ports 1-4 on VLAN 10, and 5-7 on VLAN 20, port 8 as trunk and default VLAN 1 ...



It's correct, VLAN 1 shouldn't be used



Watch for




  • Untagged frames arriving on the trunk port 8

  • Tagged-as-VLAN-1 frames arriving on the access ports or the trunk port


What happens with these depends on your manufacturer, model, and potentially other configuration. The normal goal would be to




  • Drop any untagged frames arriving on a trunk

  • Drop any unknown-VLAN tagged frames arriving anywhere


How you configure this depends on the particular switch.



Of course, if everything is configured correctly, you'll never get these untagged or tagged with unknown VLAN frames. But what's at the other end of all your wires? If there is any chance of malicious frames, or the ever-present certainty of configuration errors, this is just for protection. As a security matter, one of the first things the malcious systems do is mess with VLANs and MAC addresses.






share|improve this answer























  • This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
    – vim_usr
    Dec 7 at 16:33










  • Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
    – jonathanjo
    Dec 7 at 16:36










  • Thank you for the clarification. That makes sense.
    – vim_usr
    Dec 7 at 16:38













up vote
3
down vote



accepted







up vote
3
down vote



accepted






If you have an 8-port switch with ports 1-4 on VLAN 10, and 5-7 on VLAN 20, port 8 as trunk and default VLAN 1 ...



It's correct, VLAN 1 shouldn't be used



Watch for




  • Untagged frames arriving on the trunk port 8

  • Tagged-as-VLAN-1 frames arriving on the access ports or the trunk port


What happens with these depends on your manufacturer, model, and potentially other configuration. The normal goal would be to




  • Drop any untagged frames arriving on a trunk

  • Drop any unknown-VLAN tagged frames arriving anywhere


How you configure this depends on the particular switch.



Of course, if everything is configured correctly, you'll never get these untagged or tagged with unknown VLAN frames. But what's at the other end of all your wires? If there is any chance of malicious frames, or the ever-present certainty of configuration errors, this is just for protection. As a security matter, one of the first things the malcious systems do is mess with VLANs and MAC addresses.






share|improve this answer














If you have an 8-port switch with ports 1-4 on VLAN 10, and 5-7 on VLAN 20, port 8 as trunk and default VLAN 1 ...



It's correct, VLAN 1 shouldn't be used



Watch for




  • Untagged frames arriving on the trunk port 8

  • Tagged-as-VLAN-1 frames arriving on the access ports or the trunk port


What happens with these depends on your manufacturer, model, and potentially other configuration. The normal goal would be to




  • Drop any untagged frames arriving on a trunk

  • Drop any unknown-VLAN tagged frames arriving anywhere


How you configure this depends on the particular switch.



Of course, if everything is configured correctly, you'll never get these untagged or tagged with unknown VLAN frames. But what's at the other end of all your wires? If there is any chance of malicious frames, or the ever-present certainty of configuration errors, this is just for protection. As a security matter, one of the first things the malcious systems do is mess with VLANs and MAC addresses.







share|improve this answer














share|improve this answer



share|improve this answer








edited Dec 7 at 17:39

























answered Dec 7 at 16:27









jonathanjo

10.3k1632




10.3k1632












  • This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
    – vim_usr
    Dec 7 at 16:33










  • Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
    – jonathanjo
    Dec 7 at 16:36










  • Thank you for the clarification. That makes sense.
    – vim_usr
    Dec 7 at 16:38


















  • This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
    – vim_usr
    Dec 7 at 16:33










  • Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
    – jonathanjo
    Dec 7 at 16:36










  • Thank you for the clarification. That makes sense.
    – vim_usr
    Dec 7 at 16:38
















This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
– vim_usr
Dec 7 at 16:33




This leads me to another related question, wouldn't any untagged frame arriving on trunk port 8 have to associated with VLAN 10 or 20 since that's how the ports have been setup?
– vim_usr
Dec 7 at 16:33












Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
– jonathanjo
Dec 7 at 16:36




Assuming you only have 10 and 20 defined: yes, only tagged-10 and tagged-20 arriving on trunk port will be useful. But you might get malicious or erroneous packets with funny tags or no tag. All depends on what's on the other end of the trunk.
– jonathanjo
Dec 7 at 16:36












Thank you for the clarification. That makes sense.
– vim_usr
Dec 7 at 16:38




Thank you for the clarification. That makes sense.
– vim_usr
Dec 7 at 16:38


















draft saved

draft discarded




















































Thanks for contributing an answer to Network Engineering Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.





Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


Please pay close attention to the following guidance:


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f55275%2fwhen-are-native-vlans-used-are-there-times-when-a-native-vlan-will-never-be-use%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Morgemoulin

Scott Moir

Souastre