THREE Reasons to Create a VLAN

Sdílet
Vložit
  • čas přidán 2. 11. 2020
  • In my experience as a network engineer, I have seen MANY different VLAN designs. Unfortunately, most engineers are left to their own guesswork to determine VLAN design. In my opinion, it’s best to keep it simple: there are only THREE reasons you would create a VLAN that I discuss in this video.
    01:55 Security
    04:38 Scalability
    07:15 Treatment
    For all of Jeremy's CBTNuggets courses, go here: bit.ly/JeremyCBT
    My Gear:
    ________________________________________________________________
    bit.ly/PartsAndGear
    My Social Media:
    ________________________________________________________________
    linktr.ee/cioarajeremy
    #KeepingITSimple #VLAN #KITS
  • Věda a technologie

Komentáře • 38

  • @AaronAnderson323
    @AaronAnderson323 Před 3 lety +20

    Great explanation. There is a white box blocking some of your illustrations in the upper right hand corner. 8:33 for example.

  • @AseDeliri
    @AseDeliri Před 3 lety +3

    Amazing. I'm a software engineer and I've never messed with networking stuff. No one explains anything. They just talk. Put that on your VLAN x or y. You actually explain the logic behind it. Thank you sir.

  • @manojmemane4974
    @manojmemane4974 Před 3 lety +2

    His awesomeness in teaching the technology is increasing day by day, that's why he is the best, Thanks Jeremy

  • @konradpietrucha1530
    @konradpietrucha1530 Před 3 lety +4

    Oh, you're good man! And I'm not talking about your technical skills cause that obvious. I'm talking about the presentation / teaching skills. The way you convey a message is so clear and elegant. This plus fun factor. Brilliant!

  • @JeDeXxRioProKing
    @JeDeXxRioProKing Před 3 lety +4

    i want to keep what i want to say SIMPLE @Jeremy You are the best

  • @maverickather
    @maverickather Před 3 lety

    Jeremy ..I wish CBT has more ppl like u , it wud hve nvr left behind in the race..! U r incredible ..It looks like I am in the live IT training session, rather than watching recorded vdo . Ur videos are the most interactive and energetic in tech tutorial segments.!!!!

  • @cyberapril-j
    @cyberapril-j Před 3 lety

    gotta rewatch this. your keepingitsimple video posts here are really good for those whos reviewing for their ccna and want to have some deep level of understanding. really great Jeremy!! thanks for this

  • @ThomasTomchak
    @ThomasTomchak Před 3 lety

    Love this simple but concise video. I think even experienced network admins could watch this as a refresher to refocus on what the real benefit of vlans is.

  • @balletriverdance1058
    @balletriverdance1058 Před 3 lety +1

    Thanks for the great video 👍🏻

  • @AlexEntirely
    @AlexEntirely Před 3 lety +1

    Your delivery is Bruce Lee. Sharp, fast, smooooth :) You are like water my friend :D

  • @superpoon16
    @superpoon16 Před 3 lety

    Thank you nice video easy to understand and fun to watch. Please make more.

  • @shawn4626
    @shawn4626 Před 3 lety

    Great stuff here Jeremy thank you

  • @aboutit-coursesandtutorial561

    Hey Jeremy. Excellent video, as always. Leaning networking is always fun and much easier when learning from your videos.
    One pointer if you are interested. If you change the timestamps in the description to something like this you will also get nice chapters in the seek bar of the video:
    00:00 Introduction
    01:55 Security
    04:38 Scalability
    07:15 Treatment
    The 00:00 part is very important. And the 0 for minutes between 1 and 9 is important for it to work.

  • @rashaelrabiae2214
    @rashaelrabiae2214 Před 3 lety

    Great video.Thank you

  • @dillonwalker8221
    @dillonwalker8221 Před 3 lety

    Thanks Jezza great video

  • @elnelly16
    @elnelly16 Před 3 lety

    Awesome, I am so glad !!

  • @jmhm17
    @jmhm17 Před 3 lety

    Im still a strong supporter of limiting broadcast domain size. Ive seen the performance benefits. Im talking extremes tho like 1 vlan for an entire campus. Common practice is still to segment per an IDF to limit broadcast domains and route per location (IDF).

  • @MikeTaylor-sw4ro
    @MikeTaylor-sw4ro Před rokem

    Not sure if anyone has mentioned this, but you can use a website translator to avoid content filtering of all sorts. We used to do this in school to browse some questionable content ;)

  • @mariembuenaventura1278

    Thank you sir!

  • @Eideen
    @Eideen Před 3 lety +2

    I would add 2 more reasons, that we use at work. Routing and isolation
    When you have network topology with link redundancy, or many campus it ill advised to spanned vlans cross buildings.
    When you have a network consisting of less than ideal equipment (Internet of shit) where network stack was not the primary focus, they can be very sensitive to and extra traffic. so it better to make smaller Vlans to isolate broadcast domains.

    • @88Rickster88
      @88Rickster88 Před 3 lety

      I listen to other videos and they list amongst those three reason listed as a performance reason (the same way as Torstein described - less broadcasts). Is this valid in today’s world of IT hardware?

  • @Vinoth193155
    @Vinoth193155 Před 3 lety

    Love you Jeremy 😊

  • @Completely_Incomplete
    @Completely_Incomplete Před 3 lety

    THANK YOU!!!

  • @drsquirrel00
    @drsquirrel00 Před 3 lety

    vlan numbers matching room numbers! OMG BRB. (You could argue this would work in a situation where you want them isolated, rentals, conference, multi tenant etc).

  • @chetanchaudhari1011
    @chetanchaudhari1011 Před 3 lety

    Hello Jeremy
    I have question on which layer BGP works..
    Could you please make video on it..
    I will be thankful.. expecting your acknowledgement

  • @tshewangphuntsho1363
    @tshewangphuntsho1363 Před 23 dny

    You should create more abstract videos

  • @markchristopher2509
    @markchristopher2509 Před rokem

    Question: aside from limiting the broadcast network, once routing is in place between VLANs how exactly does having VLANs increase security?

    • @user-rr3fo6hy9q
      @user-rr3fo6hy9q Před 11 dny

      What you can do is install antivirus on each end device, something like Cisco AMP, and in AMP you can segment the PC's into the same groups as you did with the VLANs. So you could have Finance on one VLAN and Marketing on a different VLAN, and say a PC in Marketing got infected with a virus. With Cisco AMP you could quarantine just that one computer, or if it's really bad you can quarantine the entire department/VLAN. This would prevent the virus from spreading to other departments/VLANs. Technically it's not the VLAN that's providing the security, Cisco AMP is doing that, but segmenting the PC's in AMP based on VLANs can reduce the impact.

  • @goruby2
    @goruby2 Před rokem

    Ok this is Cisco related but not on topic. I have a question. I have multiple working computers that will connect to the domain, and all of the share drives on some vlans but not on the vlan I need them on. Jeremy do you have a possible answer or solution?

  • @Torcheban
    @Torcheban Před 3 lety

    One VLAN to rule them all!

  • @justinknash
    @justinknash Před 3 lety

    How do you do cross vlan communication then? I.E. accounting needs to access the server on a different vlan.

    • @ryanmission
      @ryanmission Před 3 lety

      Presumably a router, or a firewall that's performing routing.

    • @user-rr3fo6hy9q
      @user-rr3fo6hy9q Před 11 dny

      You're describing inter-vlan routing, basically routing packets between vlans. This is common practice.

  • @jonnyzeeee
    @jonnyzeeee Před 3 lety +2

    Thanks for putting this together. You obviously know your stuff, but I just have to say that your handwritten diagrams don't work for me. Mostly because your handwriting is very hard to read. Take 6:23 for example, this looks like scribble. Please take this as constructive criticism and know that your efforts are appreciated.

  • @kristopherleslie8343
    @kristopherleslie8343 Před 3 lety +1

    Security and VLAN shouldn’t be used in same sentence