<section title="20.3. Virtual Local Area Networks"><subsection title="Objective"><paragraph
    title="20.3.1."


><![CDATA[<p>Virtual local area networks (VLANs) are deployed in a secure manner that does not compromise the security of information and systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="20.3.2."


><![CDATA[<p>This section covers information relating to the use of VLANs within agency networks.</p>]]></paragraph>
</block>
<block title="Multiprotocol Label Switching"><paragraph
    title="20.3.3."


><![CDATA[<p>For the purposes of this section Multiprotocol Label Switching (MPLS) is considered to be equivalent to VLANs and is subject to the same controls.</p>]]></paragraph>
</block>
<block title="Exceptions for connectivity"><paragraph
    title="20.3.4."


><![CDATA[<p>A single network, managed in accordance with a single SecPlan, for which some functional separation is needed for administrative or similar reasons, can use VLANs to achieve that functional separation.</p>]]></paragraph>
<paragraph
    title="20.3.5."


><![CDATA[<p>VLANs can also be used to separate VTC and IPT traffic from data traffic at the same classification (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video and Telephony Conferencing and Internet Protocol Telephony</a>).</p>]]></paragraph>
</block>
<block title="Software Defined Networking (SDN)"><paragraph
    title="20.3.6."


><![CDATA[<p>Software-defined networking (SDN) is an approach to networking in which control is decoupled from hardware and managed by a separate application described as a controller. &nbsp;SDNs are intended to provide flexibility by enabling network engineers and administrators to respond to rapidly changing business requirements.</p>]]></paragraph>
<paragraph
    title="20.3.7."


><![CDATA[<p>Separation and Segregation principles also apply to SDNs. &nbsp;Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="20.3.8."


><![CDATA[<p class="NormS10C1b">Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference&nbsp;</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td><strong>IEEE 802.1Q-2011</strong></td>
<td>
<p><strong>IEEE Standard for Local and Metropolitan area networks – Media Access Control (MAC) Bridges, and Virtual Bridged Local Area Networks.</strong></p>
</td>
<td style="text-align: center;">
<p>Institute of Electrical and Electronics Engineers (IEEE)</p>
</td>
<td><a href="https://standards.ieee.org/">IEEE SA - The IEEE Standards Association - Home</a><a rel="noopener noreferrer" href="http://standards.ieee.org" target="_blank"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Inter-Switch Link and IEEE 802.1Q Frame Format</strong></p>
</td>
<td style="text-align: center;">
<p>CISCO</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html" target="_blank">Inter-Switch Link and IEEE 802.1Q Frame Format - Cisco</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Dynamic Trunking Protocol (DTP)</strong></p>
</td>
<td style="text-align: center;">
<p>CISCO</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/tech/lan-switching/virtual-lans-vlan-trunking-protocol-vlans-vtp/index.html" target="_blank">Virtual LANs VLAN Trunking Protocol (VLANs VTP) - Cisco</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using VLANs"><paragraph
    title="20.3.9.R.01."

    tags="Technical,VLANs"


><![CDATA[<p>Limiting the sharing of a common (physical or virtual) switch between VLANs of differing classifications reduces the chance of data leaks that could occur due to VLAN vulnerabilities. &nbsp;Furthermore, disabling trunking on physical switches that carry VLANs of differing security domains will reduce the risk of data leakage across the VLANs. &nbsp;The principles of separation and segregation must be applied to all network designs and architectures.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.01."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must"
    cid="4942"
><![CDATA[<p>The principles of separation and segregation MUST be applied to the design and architecture of VLANs.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.02."

    tags="Technical,VLANs"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="4943"
><![CDATA[<p>Agencies MUST NOT use VLANs between classified networks and any other network of a lower classification.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.03."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="4944"
><![CDATA[<p>Agencies MUST NOT use VLANs between any classified network and any unclassified network.</p>]]></paragraph>
<paragraph
    title="20.3.9.C.04."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must Not"
    cid="4945"
><![CDATA[<p>VLAN trunking MUST NOT be used on switches managing VLANs of differing security domains.</p>]]></paragraph>
</block>
<block title="Configuration and administration"><paragraph
    title="20.3.10.R.01."

    tags="Technical,VLANs"


><![CDATA[<p>When administrative access is limited to originating from the highest classified network on a switch, the security risk of a data spill is reduced.</p>]]></paragraph>
<paragraph
    title="20.3.10.C.01."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Must"
    cid="4948"
><![CDATA[<p>Administrative access MUST be permitted only from the most trusted network.</p>]]></paragraph>
</block>
<block title="Disabling unused ports"><paragraph
    title="20.3.11.R.01."

    tags="Technical,VLANs"


><![CDATA[<p>Disabling unused ports on a switch will reduce the opportunity for direct or indirect attacks on systems.</p>]]></paragraph>
<paragraph
    title="20.3.11.C.01."

    tags="Technical,VLANs"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4951"
><![CDATA[<p>Unused ports on the switches MUST be disabled.</p>]]></paragraph>
<paragraph
    title="20.3.11.C.02."

    tags="Technical,VLANs"


    classification="All Classifications"
    compliance="Should"
    cid="4952"
><![CDATA[<p>Unused ports on the switches SHOULD be disabled.</p>]]></paragraph>
</block>
</subsection>
</section>
