Advanced Cyber Security

Encyclopedia / Encyclopedia Part 2 /

What is VLAN Tagging?

Learn more about VLAN Tagging.

IEEE 802.1Q, or VLAN Tagging, is a systems administration standard composed by the IEEE 802.1 workgroup.

It permits various spanned systems to straightforwardly have the same physical system join without spillage of data between systems. IEEE 802.1Q — alongside its abbreviated structure dot1q — is generally used to allude to the embodiment convention used to execute this instrument over Ethernet syst

What is VLAN?

VLAN, otherwise known as Virtual LAN, is a type of local area network innovation that enables administrators to break up physical connectivity from logical network connectivity.

In contrast, conventional LAN is much more limited when compared to VLAN because the former is constrained by physical connectivity alone.

Moreover, VLAN is composed of an assembly of gadgets linked on one or more LANs that are arranged so that they could connect to each other as though they were attached to the same wire despite the fact that they are placed on a number of various LAN sections. IEEE 802.1Q characterizes the importance of a VLAN concerning the particular reasonable model supporting connecting at the MAC layer and to the IEEE 802.1D traversing tree convention. This convention takes into consideration individual VLANs to speak with each other utilizing a switch with layer-3 capacities, or just a switch.

VLAN Categories


Since VLANs are based more on logical than physical connections, they're considered to be very versatile when it comes to resource optimization, bandwidth allocation, and host/user management.

However, quite a lot of small office or home-based networks will probably not find this method necessary in going about network management because of its virtual nature.

Then again, businesses that use an internal office network, a public network (such as a WiFi hotspot), or a networked point-of-sale system (like those found in major shopping outlets) will benefit the most out of this extensive and widespread network variant just as long as the individual LANs are kept separated for security reasons yet still located on a general physical network for easier supervision.

Learn more about the Portable Penetrator WPA Password recovery
Learn more about the Penetrator Vulnerability Scanner

➤ Related pages
Application Security
Black box
Blind SQL Injection
Blue box
Global System for Mobile GSM
Internet Filter
Logic Attack
Logic Bomb
Man in the Middle Attack
PCI-DSS Compliance
Red box
Server Spam Filter
Shoulder Surfing
What is 2600?
What is SANS Top 20?
What is Zero Day?
What is a Botnet?
What is vlan tagging?