Inter VLAN Communication – Will this work?

Will Host A Be Able to Communicate with Host B?

Take a close look at the diagram:

  • Host A is connected to Switch A on VLAN 10.

  • Host B is connected to Switch B on VLAN 20.

  • The inter-switch link between Switch A and Switch B is not a trunk — it’s configured as an access port.

  • Both hosts are in the same IP subnet: 10.1.1.0/24.

So the big question is: Will Host A (10.1.1.10) be able to talk to Host B (10.1.1.20)?

 

The Explanation

At first glance, you might think the answer is no. After all, VLAN 10 and VLAN 20 are supposed to be separate broadcast domains. Without a Layer 3 device (router or Layer 3 switch) to perform inter-VLAN routing, traffic from VLAN 10 shouldn’t be able to reach VLAN 20.

But here’s the catch:

  • VLANs are locally significant to each switch. Switch A has no knowledge of VLAN 20, and Switch B has no knowledge of VLAN 10.

  • The link between Switch A and Switch B is configured as an access port, not a trunk. That means frames leaving Switch A are untagged when they traverse the link.

  • When those untagged frames arrive at Switch B, the receiving port is assigned to VLAN 20. Switch B therefore assumes all incoming traffic on that port belongs to VLAN 20.

Effectively, this means Host A’s traffic on VLAN 10 (Switch A) is reclassified into VLAN 20 (Switch B). Since both hosts are in the same subnet, ARP resolves successfully, and Host A and Host B can communicate.

👉 Yes, communication will succeed — but for the wrong reason.

 

The Learning

While Host A and Host B can talk, this design completely breaks VLAN segmentation. Instead of isolating VLANs, you’ve unintentionally collapsed VLAN 10 on Switch A into VLAN 20 on Switch B.

This kind of misconfiguration is surprisingly common and can lead to:

  • Security risks – traffic from one VLAN leaking into another.

  • Operational confusion – engineers expecting isolation when none exists.

  • Troubleshooting nightmares – inconsistent VLAN assignments across switches.

 

Key Takeaways

  1. VLAN tagging happens only on trunk ports. Access ports always send and receive untagged traffic.

  2. VLANs don’t magically extend across switches. Unless you use trunks, each switch treats VLAN IDs independently.

  3. Plan your VLAN design carefully. Misconfigured inter-switch links can silently undermine your segmentation and security model.

  4. Always double-check port modes. A single access port in the wrong VLAN can collapse your network isolation.

 

Final Thought

Yes, Host A and Host B can communicate in this setup — but not because VLANs are working correctly. They’re communicating because VLANs are misconfigured. As a network engineer, these “it works, but it’s wrong” scenarios are the ones to watch out for.

Table of Contents

FREE CCNA Roadmap

Get our comprehensive roadmap to mastering networking and earning your CCNA

Subscription Form CCNA

No spam. Unsubscribe anytime.