SlideShare a Scribd company logo
1 of 3
Download to read offline
Configuring Cyberoam VLAN
VLAN Configuration in Cyberoam.
This article documents how to implement IEEE 802.1Q Virtual LAN (VLAN) technology
between Cyberoam appliance and 802.1Q-compliant devices, such as Cisco switches and
routers.
Virtual Local Area Networks (VLANs) use tag-based LAN multiplexing technology to
simulate multiple LAN’s within a single physical LAN using IP header tagging. VLAN
ID/tags are 4-byte frame extensions that contain a VLAN identifier as well as other
information.
VLANs multiply the capabilities of Cyberoam appliance. VLAN tags added to network
frames increases the number of network interfaces (ports) beyond the available physical
ports on the Cyberoam appliance.
Advantages
• Increased Port density
• Logical segmentation of Network irrespective of physical placement
• Granular security on heterogeneous LANs
• Improved Network throughput as VLAN confines broadcast domain
Using VLANs, a single Cyberoam appliance can provide security services and control
connections between multiple domains. Traffic from each domain is given a different VLAN
ID. Cyberoam can recognize VLAN IDs and apply security policies to secure network
between domains. Cyberoam can also apply authentication, various policies, and firewall
rule features for network.
Cyberoam Configuration
Follow the below given steps from Web Admin console to configure VLAN:
Step 1: Define virtual subinterface
Go to System>Configure Network>Manage Interface and click “Add VLAN Subinterface”
button to open the create page
Configuring Virtual LAN
Configuring Cyberoam VLAN
Physical Interface: Select interface for which the virtual subinterface is to be defined.
Virtual subinterface will be the member of selected physical Interface/Port. The dropdown
menu will list only the LAN and DMZ interfaces.
VLAN ID: Specify VLAN ID. The interface VLAN ID can be any number between 2 and
4094. The VLAN ID of each virtual subinterface must match the VLAN ID of the packet. If
the IDs do not match, the virtual subinterface will not receive the VLAN tagged traffic.
Virtual Interfaces added to the same physical interface cannot have the same VLAN ID.
However, you can add virtual subinterfaces with the same VLAN ID to different physical
interfaces
IP address: Specify IP address and netmask for the virtual subinterfaces. Assign static IP
address only. Only static IP address can be assigned and Subnet ID should be unique
across all the physical/virtual subinterfaces
Zone: Select virtual subinterface Zone. Virtual subinterface will be the member of the
selected zone. Virtual subinterface created will remain unused until it is included in a zone.
Virtual subinterface can be the member of LAN, DMZ or custom zone.
Note:
1. Zone membership can be defined at the time of defining virtual subinterface or later
whenever required.
2. Virtual subinterface can be the member of custom zone.
3. Virtual subinterface cannot be the member of WAN zone
On successful creation, Interface details (System>Configuration Network>Manage
Interface page) will display newly defined virtual subinterface under the selected physical
interface.
Configuring Cyberoam VLAN
Step 2 : Restart Management services from CLI console
Logon to CLI console through SSH or Telnet and select option R Restart Management
Services
Once the virtual interface is defined and is included in a zone, it can be treated exactly
same as the physical interface. Customization of firewall rules that govern the traffic
between VLANs and other interfaces, IDP policies and virus and spam scanning can be
performed the same way as done with the physical interface.
If virtual subinterface is defined for custom zone, two default firewall rules for the zone are
automatically created for the custom zone. For example, if virtual subinterface is defined
for LAN zone, 2 default firewall rules under Virtual subinterface to WAN zone are
automatically created based on the default LAN to WAN zone firewall rules.
From version 9.5.4 build 66 onwards, VLAN (Virtual LAN) tags will be preserved even
when antivirus scanning, spam filtering and web filtering using Internet Access Policy (IAP)
are applied to VLAN tagged traffic in Bridge mode.
Document version – 1.0-19/08/2008

More Related Content

What's hot

101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdf101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdfBiVnHu1
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testingKamlesh Dhanwani
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)newbie2019
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructorSalem Trabelsi
 
시스코 wIPS 소개자료
시스코 wIPS 소개자료시스코 wIPS 소개자료
시스코 wIPS 소개자료활 김
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentestingYunfei Yang
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowFarooq Khan
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 

What's hot (20)

High-Density Wireless Networks for Auditoriums
High-Density Wireless Networks for AuditoriumsHigh-Density Wireless Networks for Auditoriums
High-Density Wireless Networks for Auditoriums
 
101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdf101 CCNA Labs with Solutions.pdf
101 CCNA Labs with Solutions.pdf
 
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference GuideAruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testing
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
vlan
vlanvlan
vlan
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
 
시스코 wIPS 소개자료
시스코 wIPS 소개자료시스코 wIPS 소개자료
시스코 wIPS 소개자료
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Firewalls
FirewallsFirewalls
Firewalls
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 

Similar to Cyberoam configuring vlan

Similar to Cyberoam configuring vlan (20)

Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
 
Benefits of vlan
Benefits of vlanBenefits of vlan
Benefits of vlan
 
Vlan
VlanVlan
Vlan
 
Vlan final
Vlan finalVlan final
Vlan final
 
Virtual local area network
Virtual local area networkVirtual local area network
Virtual local area network
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
Vlan
VlanVlan
Vlan
 
Virtual local area networks
Virtual local area networksVirtual local area networks
Virtual local area networks
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
CCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptxCCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptx
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptx
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Cyberoam configuring vlan

  • 1. Configuring Cyberoam VLAN VLAN Configuration in Cyberoam. This article documents how to implement IEEE 802.1Q Virtual LAN (VLAN) technology between Cyberoam appliance and 802.1Q-compliant devices, such as Cisco switches and routers. Virtual Local Area Networks (VLANs) use tag-based LAN multiplexing technology to simulate multiple LAN’s within a single physical LAN using IP header tagging. VLAN ID/tags are 4-byte frame extensions that contain a VLAN identifier as well as other information. VLANs multiply the capabilities of Cyberoam appliance. VLAN tags added to network frames increases the number of network interfaces (ports) beyond the available physical ports on the Cyberoam appliance. Advantages • Increased Port density • Logical segmentation of Network irrespective of physical placement • Granular security on heterogeneous LANs • Improved Network throughput as VLAN confines broadcast domain Using VLANs, a single Cyberoam appliance can provide security services and control connections between multiple domains. Traffic from each domain is given a different VLAN ID. Cyberoam can recognize VLAN IDs and apply security policies to secure network between domains. Cyberoam can also apply authentication, various policies, and firewall rule features for network. Cyberoam Configuration Follow the below given steps from Web Admin console to configure VLAN: Step 1: Define virtual subinterface Go to System>Configure Network>Manage Interface and click “Add VLAN Subinterface” button to open the create page Configuring Virtual LAN
  • 2. Configuring Cyberoam VLAN Physical Interface: Select interface for which the virtual subinterface is to be defined. Virtual subinterface will be the member of selected physical Interface/Port. The dropdown menu will list only the LAN and DMZ interfaces. VLAN ID: Specify VLAN ID. The interface VLAN ID can be any number between 2 and 4094. The VLAN ID of each virtual subinterface must match the VLAN ID of the packet. If the IDs do not match, the virtual subinterface will not receive the VLAN tagged traffic. Virtual Interfaces added to the same physical interface cannot have the same VLAN ID. However, you can add virtual subinterfaces with the same VLAN ID to different physical interfaces IP address: Specify IP address and netmask for the virtual subinterfaces. Assign static IP address only. Only static IP address can be assigned and Subnet ID should be unique across all the physical/virtual subinterfaces Zone: Select virtual subinterface Zone. Virtual subinterface will be the member of the selected zone. Virtual subinterface created will remain unused until it is included in a zone. Virtual subinterface can be the member of LAN, DMZ or custom zone. Note: 1. Zone membership can be defined at the time of defining virtual subinterface or later whenever required. 2. Virtual subinterface can be the member of custom zone. 3. Virtual subinterface cannot be the member of WAN zone On successful creation, Interface details (System>Configuration Network>Manage Interface page) will display newly defined virtual subinterface under the selected physical interface.
  • 3. Configuring Cyberoam VLAN Step 2 : Restart Management services from CLI console Logon to CLI console through SSH or Telnet and select option R Restart Management Services Once the virtual interface is defined and is included in a zone, it can be treated exactly same as the physical interface. Customization of firewall rules that govern the traffic between VLANs and other interfaces, IDP policies and virus and spam scanning can be performed the same way as done with the physical interface. If virtual subinterface is defined for custom zone, two default firewall rules for the zone are automatically created for the custom zone. For example, if virtual subinterface is defined for LAN zone, 2 default firewall rules under Virtual subinterface to WAN zone are automatically created based on the default LAN to WAN zone firewall rules. From version 9.5.4 build 66 onwards, VLAN (Virtual LAN) tags will be preserved even when antivirus scanning, spam filtering and web filtering using Internet Access Policy (IAP) are applied to VLAN tagged traffic in Bridge mode. Document version – 1.0-19/08/2008