• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Question Best place to configure VLANs: Core Switch vs Peplink 3?

Reda_ELF

Junior Member
Hi everyone,


I have a question regarding VLAN setup in a network.
In my infrastructure, I have a core switch and a Peplink 3 (router/firewall). Should the VLANs be created and configured on the core switch, or directly on the Peplink 3?


Which approach is considered best practice, and why?


Thanks in advance for your advice!
 
As sdifox said, it usually depends on the situation. I prefer to not have VLANs defined on the router/firewall if that is your connection to the outside internet. You want to limit what an attacker could access, and by having the VLANs applied from the core switch to the router, you can better defend against this situation as you have to assume they could then redefine the VLANs (or even just view them) to more quickly gain information and compromise your network.

I have a router-on-a-stick setup, so even more complex, but I have 2 VLANs defined on my core switch that I pass through as a trunk to the network port that my router uses. One is for the external WAN VLAN (which has another port on my core switch which is connected to the cable modem, with that port assigned directly to the WAN VLAN), and the other VLAN is effectively called the TRANS-LAN VLAN. No other ports on my core switch have the WAN VLAN passed to them.

I have a default deny rule in the core switch (which is really a layer 3 switch, thus it is a router). I have other rules defined for my other VLANs such that if they need internet connectivity, they are allowed to route to the TRANS-LAN VLAN and vice versa. This way I can prevent devices from reaching the internet based if they have a rule to access the TRANS-LAN VLAN or not and I created various VLANS for segmenting different items from themselves (this is mainly all due to Internet-of-Things devices, like IP based smart-home devices because we know how well security is kept up-to-date on these kinds of things, so if it doesn't absolutely need the internet, it isn't able to connect).
 
Back
Top