{"id":33230,"date":"2023-12-13T22:25:08","date_gmt":"2023-12-13T22:25:08","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33230"},"modified":"2024-05-31T13:09:20","modified_gmt":"2024-05-31T13:09:20","slug":"how-to-set-up-vlan","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/","title":{"rendered":"How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration"},"content":{"rendered":"\n<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Key Takeaways<\/title>\n    <link href=\"https:\/\/fonts.googleapis.com\/css2?family=Montserrat:wght@400;700&#038;display=swap\" rel=\"stylesheet\">\n<\/head>\n<body style=\"font-family: 'Montserrat', sans-serif; letter-spacing: 0.5px;\">\n    <div style=\"background-color: #fff; border: 2px solid #d9d9d9; border-radius: 10px; padding: 20px; max-width: 800px; margin: 20px auto; box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1);\">\n        <h3 style=\"font-size: 18px; color: #2b2bb7; margin-bottom: 15px;\">Key Takeaways<\/h3>\n        <ul style=\"list-style-type: none; padding: 0; margin: 0 0 20px 0;\">\n            <li style=\"font-size: 16px; color: #555; margin-bottom: 10px; padding-left: 20px; position: relative; letter-spacing: 0.5px;\">\n                <span style=\"color: #555; font-size: 20px; position: absolute; left: 0; top: -2px;\">\u2022<\/span>\n               Setting up a VLAN is a 12-step process. The steps include preparing unique VLAN IDs, creating a network diagram, configuring switch ports, and assigning switch ports to VLANs.\n                <a href=\"#steps\" style=\"font-style: italic; margin-left: 5px; color: #bb65ff;\">(Jump to Section)<\/a>\n            <\/li>\n            <li style=\"font-size: 16px; color: #555; margin-bottom: 10px; padding-left: 20px; position: relative; letter-spacing: 0.5px;\">\n                <span style=\"color: #555; font-size: 20px; position: absolute; left: 0; top: -2px;\">\u2022<\/span>\n                Static and dynamic VLANs serve different purposes. They are compared based on advantages based on network size, complexity, and requirements.\n                <a href=\"#static-dynamic\" style=\"font-style: italic; margin-left: 5px; color: #bb65ff;\">(Jump to Section)<\/a>\n            <\/li>\n            <li style=\"font-size: 16px; color: #555; margin-bottom: 10px; padding-left: 20px; position: relative; letter-spacing: 0.5px;\">\n                <span style=\"color: #555; font-size: 20px; position: absolute; left: 0; top: -2px;\">\u2022<\/span>\n                It&#8217;s imperative to get the VLAN setup process right and periodically reassess VLAN performance to ensure network security and efficiency.\n                <a href=\"#reassess\" style=\"font-style: italic; margin-left: 5px; color: #bb65ff;\">(Jump to Section)<\/a>\n            <\/li>\n        <\/ul>\n    <\/div>\n<\/body>\n<\/html>\n\n\n\n<p>Setting up a virtual local area network (VLAN) can be a complicated process, especially if you\u2019re operating a large enterprise network, a network with legacy or hybrid architectures, or a network with specific workloads that require additional security and regulatory compliance safeguards.<\/p>\n\n\n\n<p>Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps \u2014 particularly steps five through eight \u2014 may be completed simultaneously, in a slightly different order, or even in a more automated fashion if you choose to set up a dynamic VLAN.<\/p>\n\n\n\n<p>Still, in general, your network stands the best chance of success if you complete the following 12 VLAN configuration steps and document your processes, strategies, and requirements along the way.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6d0fbce0c8\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6d0fbce0c8\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#1-Brainstorm-VLAN-Groupings\" title=\"1. Brainstorm VLAN Groupings\">1. Brainstorm VLAN Groupings<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#2-Prepare-Unique-VLAN-IDs\" title=\"2. Prepare Unique VLAN IDs\">2. Prepare Unique VLAN IDs<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#3-Create-a-Logical-Network-Diagram-or-Map\" title=\"3. Create a Logical Network Diagram or Map\">3. Create a Logical Network Diagram or Map<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#4-Optional-Purchase-Additional-Equipment\" title=\"4. Optional: Purchase Additional Equipment\">4. Optional: Purchase Additional Equipment<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#5-Connect-Network-Devices-to-Appropriate-Switch-Ports\" title=\"5. Connect Network Devices to Appropriate Switch Ports\">5. Connect Network Devices to Appropriate Switch Ports<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#6-Configure-Switch-Ports\" title=\"6. Configure Switch Ports\">6. Configure Switch Ports<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#7-Set-up-VLAN-Specifications-via-Network-Switch-Settings\" title=\"7. Set up VLAN Specifications via Network Switch Settings\">7. Set up VLAN Specifications via Network Switch Settings<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#8-Assign-Switch-Ports-to-VLANs\" title=\"8. Assign Switch Ports to VLANs\">8. Assign Switch Ports to VLANs<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#9-Optional-Add-VLAN-Tags\" title=\"9. Optional: Add VLAN Tags\">9. Optional: Add VLAN Tags<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#10-Optional-Configure-Inter-VLAN-Routing\" title=\"10. Optional: Configure Inter-VLAN Routing\">10. Optional: Configure Inter-VLAN Routing<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#11-Quality-Test-Your-VLAN\" title=\"11. Quality-Test Your VLAN\">11. Quality-Test Your VLAN<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#12-Document-and-Reassess-VLAN-Performance-Periodically\" title=\"12. Document and Reassess VLAN Performance Periodically\">12. Document and Reassess VLAN Performance Periodically<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#Should-You-Use-a-Static-VLAN-or-Dynamic-VLAN\" title=\"Should You Use a Static VLAN or Dynamic VLAN?\">Should You Use a Static VLAN or Dynamic VLAN?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#Bottom-Line-The-Importance-of-Preparation-for-Optimal-VLAN-Performance\" title=\"Bottom Line: The Importance of Preparation for Optimal VLAN Performance\">Bottom Line: The Importance of Preparation for Optimal VLAN Performance<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"steps\"><span class=\"ez-toc-section\" id=\"1-Brainstorm-VLAN-Groupings\"><\/span>1. Brainstorm VLAN Groupings<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In a traditional local area network with no virtualized barriers, all devices and network components communicate and share information with each other; you\u2019re likely setting up a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-vlan\/\">VLAN<\/a> in the first place because this foundational setup is too loose for your requirements. But what are the ideal segments that will make your network function optimally and securely?<\/p>\n\n\n\n<p>At this point in VLAN creation and configuration, it\u2019s time to determine what VLAN groupings make the most sense for your network\u2019s strategic complexities. Consider not only how many VLANs you\u2019ll need but also the purpose each VLAN will serve and how they need to be set up to fulfill that purpose. While many organizations stick to more traditional boundaries like physical locations or departments, there may be more effective and secure ways for you to group and set up VLAN rules.<\/p>\n\n\n\n<p>For example, if your company works closely with a third-party professional services firm that needs access to certain HR and security applications and data but not others, you could divide your VLANs based on which ones need looser versus stricter identity and access management controls. From there, determine which users and devices will align with and be assigned to each grouping.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"776\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_groupings.jpg\" alt=\"Example VLAN groupings infographic.\" class=\"wp-image-33236\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_groupings.jpg 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_groupings-300x194.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_groupings-1024x662.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_groupings-768x497.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><figcaption class=\"wp-element-caption\">Example VLAN groupings<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2-Prepare-Unique-VLAN-IDs\"><\/span>2. Prepare Unique VLAN IDs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Every single VLAN you set up will need a unique VLAN identification number so you can segment network traffic to the appropriate places and keep documentation organized for multiple VLANs simultaneously. VLAN IDs are purely numeric and range from one to 4,095. While you don\u2019t necessarily \u201cneed\u201d these VLAN IDs to be operational yet, it\u2019s a good idea to figure them out now so you can use them when labeling your network diagram in the next step.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3-Create-a-Logical-Network-Diagram-or-Map\"><\/span>3. Create a Logical Network Diagram or Map<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><br>Before you even begin setting up your VLANs and connecting devices and switches, the best way to ensure a successful VLAN network setup is to map out the specificities and relationships of your network with a network diagram. The labels and connections you illustrate at this stage of VLAN creation will give you the labels and organizational structure you need to keep track of all the devices, switches, routers, and other components necessary to fulfill your architectural plans.<\/p>\n\n\n\n<p>Your team may choose to create this diagram manually or with tools that are already in your portfolio. However, a number of free and low-cost network diagramming tools specifically offer templates and icons that make it easier to illustrate the network you\u2019re setting up, often with low-code\/no-code interfaces and tools. If you\u2019re interested in finding a network diagramming tool to make this step more efficient, consider investing in one of these <a href=\"https:\/\/www.enterprisenetworkingplanet.com\/management\/network-diagram-software\/\">top network diagram software and tooling solutions<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"827\" height=\"602\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_setup_template.jpg\" alt=\"Example VLAN setup template infographic.\" class=\"wp-image-33235\" style=\"width:700px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_setup_template.jpg 827w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_setup_template-300x218.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-example_vlan_setup_template-768x559.jpg 768w\" sizes=\"(max-width: 827px) 100vw, 827px\" \/><figcaption class=\"wp-element-caption\">Example VLAN setup template (Creately)<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4-Optional-Purchase-Additional-Equipment\"><\/span>4. Optional: Purchase Additional Equipment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Based on the VLAN grouping requirements and design(s) you\u2019ve developed in the previous three steps, you should have a clearer picture of any missing hardware or software that you need to purchase. Perhaps you have more VLAN groupings than you expected and need to bring in additional switches and routers. Or maybe your organization is growing quickly, and you want to purchase new switches with more ports for more devices. There\u2019s also the possibility that you are moving from a primarily on-premises network setup to a hybrid or cloud setup that requires new software or third-party relationships.<\/p>\n\n\n\n<p>Regardless of your new requirements, start by creating an inventory list of any networking equipment you currently own, including information about switch and router formats, configurations, port counts, speeds, and other details pertinent to VLAN setup. From there, make a separate list of the networking tools you\u2019re missing, the cost of these missing tools, and any other specialized information that should be considered during the buying process.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5-Connect-Network-Devices-to-Appropriate-Switch-Ports\"><\/span>5. Connect Network Devices to Appropriate Switch Ports<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You should now connect VLAN servers, end-user devices, and other relevant network devices \u2014 as long as their IP addresses are already configured \u2014 to the switch ports that have been selected for the corresponding VLAN group. While individual devices, ports, switches, and routers have not yet necessarily been configured in their settings to align with a certain VLAN and function, you should still know which devices and network components have been set aside for which VLANs. If you\u2019re unsure about the switch ports that should be connecting to each device, reference your network diagram (or go back to the network diagramming stage and create a more detailed diagram).&nbsp;<\/p>\n\n\n\n<p>If you are opting to create a dynamic VLAN instead of a static VLAN, steps five through eight may look a little different for you. For example, you may spend these steps creating or identifying the appropriate rule-based protocols for your devices and setting up automation rules rather than manually connecting ports and devices to VLANs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6-Configure-Switch-Ports\"><\/span>6. Configure Switch Ports<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Now that your devices are connected to the correct switch ports, it\u2019s time to configure the switch ports so they can perform according to their assigned functions. Many of your ports will simply need to be set up as access ports in the switch\u2019s settings; an access port is a simple connection that allows devices to connect to only one VLAN. Access ports are most appropriate for devices and users that will not be using VLAN tagging or participating in inter-VLAN routing.&nbsp;<\/p>\n\n\n\n<p>Trunk ports are also configured in a switch\u2019s settings, but they are designed to manage higher bandwidth traffic and can manage traffic for more than one VLAN. Devices should only be connected to trunk ports if they have been authorized and configured for VLAN tagging and inter-VLAN routing. Before moving on to the next step, double-check that devices are connected to the correct type of switch port for their operational needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7-Set-up-VLAN-Specifications-via-Network-Switch-Settings\"><\/span>7. Set up VLAN Specifications via Network Switch Settings<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>All of the prework is done: It\u2019s time to actually create the virtual local area networks you want through network switch settings. You\u2019ll do this by accessing your network switch management interfaces and going to the section where you can create VLANs. Create the number of VLANs you determined were necessary in previous steps and assign them the unique VLAN IDs you selected in step two.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8-Assign-Switch-Ports-to-VLANs\"><\/span>8. Assign Switch Ports to VLANs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Again, keep in mind that steps five through eight may go in a slightly different order, depending on your team and their preferences. So if you have not yet assigned switch ports to the appropriate VLAN, it\u2019s time to do that now. Tagged ports (trunk ports) are likely already associated with the correct VLANs, but you should confirm that they are set up correctly at this time. For untagged ports (access ports), you\u2019ll need to manually connect them to the correct VLAN. Remember, trunk ports can be associated with more than one VLAN, if appropriate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9-Optional-Add-VLAN-Tags\"><\/span>9. Optional: Add VLAN Tags<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vlan-tagging\/\">VLAN tagging<\/a> is the process through which VLAN network traffic is further segmented and specialized. When VLAN tags are in use, associated devices and ports automatically interact with devices and ports that share those same tags; however, tags also give network administrators the power to further direct traffic and support case-by-case inter-VLAN routing scenarios.&nbsp;<\/p>\n\n\n\n<p>VLAN tagging is most appropriate for networks with complex traffic patterns and a diverse range of users, devices, and security permissions. If you choose to set up trunk ports with multiple VLANs running through them, as demonstrated in step six, you\u2019ll need to make sure at least some of your VLANs receive tags so traffic doesn\u2019t get muddled in trunk ports.&nbsp;<\/p>\n\n\n\n<p>If you\u2019re not sure if your network would benefit from VLAN tags, read this in-depth article on the topic to help you make your decision: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/tagged-vs-untagged-vlan\/\">Tagged vs. Untagged VLAN: When You Should Use Each<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10-Optional-Configure-Inter-VLAN-Routing\"><\/span>10. Optional: Configure Inter-VLAN Routing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If your network requires VLAN-to-VLAN communication as a part of its regular operations, you\u2019ll want to use the VLAN tags you set up in the previous step to direct inter-VLAN routing. While it sounds counterintuitive to open traffic flow between VLANs, many organizations choose to do this because the different layer at which routers operate makes it possible for them to still control what types of traffic flow across VLANs and when and how devices and users move from VLAN to VLAN. As part of the inter-VLAN configuration step, you may also need to set up or double-check your VLAN access controls, ensuring only approved users and devices can take advantage of inter-VLAN routing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"11-Quality-Test-Your-VLAN\"><\/span>11. Quality-Test Your VLAN<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Now that everything\u2019s set up, it\u2019s time to test network connectivity and performance. Make sure that all devices within the same VLAN are able to interact with each other and, conversely, that they are not able to reach devices in other VLANs. Ping and traceroute are both effective tools for testing VLAN connectivity and performance, but a number of other <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network security and management tools<\/a> may be appropriate as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"reassess\"><span class=\"ez-toc-section\" id=\"12-Document-and-Reassess-VLAN-Performance-Periodically\"><\/span>12. Document and Reassess VLAN Performance Periodically<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Enterprise networks in particular frequently change as more devices and users, new hardware and software requirements, and new operational and security use cases arise. Network administrators and\/or network security team members should maintain an up-to-date network diagram, equipment inventory, changelogs, and other configuration documentation so it\u2019s easy to see what the network looks like now, if and where any vulnerabilities have reared their heads, and if any other changes are necessary to improve network performance. Each time you go through this process, update your documentation so you have a full history of the network and what you\u2019ve done to maintain it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"static-dynamic\"><span class=\"ez-toc-section\" id=\"Should-You-Use-a-Static-VLAN-or-Dynamic-VLAN\"><\/span>Should You Use a Static VLAN or Dynamic VLAN?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Static and dynamic VLANs bring different advantages to network administrators, depending on the size, complexity, and requirements of their network. Below, we\u2019ve explained how each type works and when you should use it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1059\" height=\"1200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-static_vs_dynamic_vlan.jpg\" alt=\"Static vs Dynamic VLAN infographic.\" class=\"wp-image-33234\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-static_vs_dynamic_vlan.jpg 1059w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-static_vs_dynamic_vlan-265x300.jpg 265w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-static_vs_dynamic_vlan-904x1024.jpg 904w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan-static_vs_dynamic_vlan-768x870.jpg 768w\" sizes=\"(max-width: 1059px) 100vw, 1059px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Static VLAN<\/h3>\n\n\n\n<p>Static VLANs exist when network administrators manually connect network devices to physical switch ports and those devices receive their VLAN assignment based on that connection. If the device ever needs to be reassigned to a new VLAN, the network administrator would physically connect it to a new switch port that is already associated with that VLAN. In other words, a static VLAN is one in which switch ports are assigned to VLANs and devices are not assigned to VLANs; they receive their orders directly from the switch port they\u2019re connected to.<\/p>\n\n\n\n<p>This type of VLAN is best for smaller networks, or networks that change infrequently and include fewer VLAN segments because network administrators have to manually connect (and sometimes reconnect) devices to the right ports for them to work. With a larger network that\u2019s changing frequently, this task alone could become a full-time job and riddled with errors. Static VLANs are most advantageous for network administrators who need an easy-to-setup VLAN with predictable infrastructure and limited authentication needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Dynamic VLAN<\/h3>\n\n\n\n<p>A dynamic VLAN is one in which devices are assigned to that VLAN on a dynamic and semi-automated basis. Specialized criteria determine which devices are assigned to which VLANs and when. These criteria may include specialized network access controls and protocols, VLAN membership policy servers (VMPS) and databases, or some other combination of servers and data-driven rules. With a dynamic VLAN, devices are assigned to VLANs while ports frequently are not assigned to particular VLANs; they are simply the conduit through which pre-assigned device traffic flows.<\/p>\n\n\n\n<p>Dynamic VLANs are best for larger and more complex networks that need to maintain frequently changing authentication and usage rules. It\u2019s a much more difficult implementation process when compared to static VLAN, but for more strenuous network rules and requirements, dynamic VLAN ultimately saves network professionals time in the long run, as they can simply update protocols and VMPS entries when new VLAN assignments are needed across multiple devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bottom-Line-The-Importance-of-Preparation-for-Optimal-VLAN-Performance\"><\/span>Bottom Line: The Importance of Preparation for Optimal VLAN Performance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>While the actual process of setting up a VLAN can be as simple as updating network switch settings and connecting devices to VLAN switch ports, the strategy behind a successful VLAN setup can be much more daunting. You\u2019ll need to consider any specialized security or compliance requirements, the different device types that need access, and the resources and monitoring it will take to set up and sustain an efficient VLAN.&nbsp;<\/p>\n\n\n\n<p>All the steps listed above are crucial aspects of creating and configuring a sustainable VLAN network. But perhaps the most important step of all is documenting your thought process and your network architecture, especially as they change over time. Maintaining detailed documentation will help your existing network and security team members stay on top of the most pertinent network updates and issues while simultaneously ensuring that any future members of the team receive the foundational training necessary to successfully work in your VLAN ecosystem.<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">What Is Network Security? Definition, Threats &amp; Protections<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d0fbcb5bd-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d0fbcb5bd\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d0fbcb5bd\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d0fbcb5bd\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d0fbcb5bd\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d0fbcb5bd\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d0fbcb5bd\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.<\/p>\n","protected":false},"author":328,"featured_media":33233,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[32028],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-33230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-vlan"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration<\/title>\n<meta name=\"description\" content=\"Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration\" \/>\n<meta property=\"og:description\" content=\"Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-13T22:25:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T13:09:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shelby Hiter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shelby Hiter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\"},\"author\":{\"name\":\"Shelby Hiter\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5\"},\"headline\":\"How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration\",\"datePublished\":\"2023-12-13T22:25:08+00:00\",\"dateModified\":\"2024-05-31T13:09:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\"},\"wordCount\":2375,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png\",\"keywords\":[\"vlan\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\",\"name\":\"How to Set Up a VLAN in 12 Steps: Creation & Configuration\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png\",\"datePublished\":\"2023-12-13T22:25:08+00:00\",\"dateModified\":\"2024-05-31T13:09:20+00:00\",\"description\":\"Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: ktsdesign\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5\",\"name\":\"Shelby Hiter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg\",\"caption\":\"Shelby Hiter\"},\"description\":\"eSecurity Planet contributor Shelby Hiter has covered cybersecurity, AI and more in her time at TechnologyAdvice. In addition to eSecurity Planet, she's worked as a technology editor and writer for TechRepublic, LinuxToday, Webopedia, SoftwarePundit, Datamation, Enterprise Networking Planet, CIO Insight, AllBusiness.com, and SiteProNews. Beyond B2B content strategy and editing, she also specializes in marketing and communication strategies and the occasional photo collage of her dog.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Set Up a VLAN in 12 Steps: Creation & Configuration","description":"Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/","og_locale":"en_US","og_type":"article","og_title":"How to Set Up a VLAN in 12 Steps: Creation & Configuration","og_description":"Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/","og_site_name":"eSecurity Planet","article_published_time":"2023-12-13T22:25:08+00:00","article_modified_time":"2024-05-31T13:09:20+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png","type":"image\/png"}],"author":"Shelby Hiter","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Shelby Hiter","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/"},"author":{"name":"Shelby Hiter","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5"},"headline":"How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration","datePublished":"2023-12-13T22:25:08+00:00","dateModified":"2024-05-31T13:09:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/"},"wordCount":2375,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png","keywords":["vlan"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/","url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/","name":"How to Set Up a VLAN in 12 Steps: Creation & Configuration","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png","datePublished":"2023-12-13T22:25:08+00:00","dateModified":"2024-05-31T13:09:20+00:00","description":"Whether you\u2019re an expert or just starting out, this article will help you master the art of VLAN setup. Learn the basics of how to set up a VLAN.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/12\/esp_20231213-how-to-set-up-vlan.png","width":1400,"height":900,"caption":"Image: ktsdesign\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-vlan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Set Up a VLAN in 12 Steps: Creation &amp; Configuration"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5","name":"Shelby Hiter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg","caption":"Shelby Hiter"},"description":"eSecurity Planet contributor Shelby Hiter has covered cybersecurity, AI and more in her time at TechnologyAdvice. In addition to eSecurity Planet, she's worked as a technology editor and writer for TechRepublic, LinuxToday, Webopedia, SoftwarePundit, Datamation, Enterprise Networking Planet, CIO Insight, AllBusiness.com, and SiteProNews. Beyond B2B content strategy and editing, she also specializes in marketing and communication strategies and the occasional photo collage of her dog.","url":"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33230"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/328"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33230"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33230\/revisions"}],"predecessor-version":[{"id":35658,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33230\/revisions\/35658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33233"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33230"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33230"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33230"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}