I do believe you are finally starting to get it! Still a couple of
misconceptions.
And practically all VLAN switches are also routers internally
which allows them to ROUTE between their VLANs
Wrong. Only layer-3 switches do both. Expect to pay at least ten times the
cost of a managed layer-2 switch for a layer-3. No one would buy a layer-3
for $4000 if they could do the same job with a layer-2 for $400.
they would need an external router to do this job and
thus to move traffic from one VLAN to another is a ROUTING
job.
YES, YES! You've got it!!
You have apparently taken the word "Switch" (applied to the box
as a whole) and incorrectly assumed that these are not HYBRID
DEVICES which combine configurable bridged segments comprising
multiple PORTS with routing to other such VLAN segments.
As I've stated multiple times, there are switches that do both. They are
called Layer-3 switches. I have 4 of them on my network ($30,000 each,
ugg!). They handle the core layer-2 network functions (VLANS) AND they ALSO
perform the core routing. But even on a layer-3 switch, routing is set up
completely separately from the VLAN setup. The other 150 or so switches that
handle VLAN trunking, distribution and endpoint termination are all managed
layer-2 switches. Layer-3's are very rare by comparison.
Yes, and you article agrees with me explicitly.
NO, it does not. Here's an excerpt from page 3
"For this reason, many companies have decided to implement Layer 3 switches
strategically throughout their network. Regardless of the method chosen, it's
most important for you to recognize that when a host on one VLAN wants to
communicate with a host on another, a router must somehow be involved."
The word strategically says it all. You use them sparingly and strategically
when needed.
I'm very glad you now have a clearer understanding of how VLANs work. Now,
go back and look at my original post on how I would set up that network. A
Layer-2 managed switch on each dependent subnet, one Layer 3 switch
strategically located on Subnet A where it could serve as both router
between segments that need to communicate and gatekeeper between segments
that must be isolated. It still allows the "island" - Subnet C to
communicate with the DC / DNS server on VLAN A, but with the access-list in
place, prevents any contact between Subnet C and workstations in any of the
other subnets.
Works, huh?
....kurt