Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 2 /

What is VLAN Tagging?

Learn more about VLAN Tagging.

IEEE 802.1Q, or VLAN Tagging, is a systems administration standard composed by the IEEE 802.1 workgroup. It permits various spanned systems to straightforwardly have the same physical system join without spillage of data between systems. IEEE 802.1Q — alongside its abbreviated structure dot1q — is generally used to allude to the embodiment convention used to execute this instrument over Ethernet syst

What is VLAN?

VLAN, otherwise known as Virtual LAN, is a type of local area network innovation that enables administrators to break up physical connectivity from logical network connectivity. In contrast, conventional LAN is much more limited when compared to VLAN because the former is constrained by physical connectivity alone.
 
Moreover, VLAN is composed of an assembly of gadgets linked on one or more LANs that are arranged so that they could connect to each other as though they were attached to the same wire despite the fact that they are placed on a number of various LAN sections.
 
IEEE 802.1Q characterizes the importance of a VLAN concerning the particular reasonable model supporting connecting at the MAC layer and to the IEEE 802.1D traversing tree convention. This convention takes into consideration individual VLANs to speak with each other utilizing a switch with layer-3 capacities, or just a switch.
 

VLAN Categories

 
  • ATM VLAN: This LAN type utilizes the LAN emulation (LANE) protocol for the sake of Ethernet packet mapping into ATM cells. It also delivers the packets to their ultimate destination via the ATM address conversion of an Ethernet MAC address.
 
  • Protocol-based VLAN: IP traffic is filtered by this VLAN category using a specific protocol such as IPX from neighboring end-stations by configuring a switch with a compendium of mapping layer-3 protocol types to VLAN membership ¡§C.
 
  • MAC-based VLAN: Individual MAC addresses are mapped into VLAN membership via configuring a switch with an access list that handles the whole procedure.
 
  • Port-based VLAN: This VLAN type is responsible for the configuration of each and every physical switch port via an access list that identifies membership in a collection of VLANs.
 
Since VLANs are based more on logical than physical connections, they're considered to be very versatile when it comes to resource optimization, bandwidth allocation, and host/user management. However, quite a lot of small office or home-based networks will probably not find this method necessary in going about network management because of its virtual nature.
 
Then again, businesses that use an internal office network, a public network (such as a WiFi hotspot), or a networked point-of-sale system (like those found in major shopping outlets) will benefit the most out of this extensive and widespread network variant just as long as the individual LANs are kept separated for security reasons yet still located on a general physical network for easier supervision.

Learn more about the Portable Penetrator WPA Password recovery
 
Learn more about the Penetrator Vulnerability Scanner
 

➤ Related pages
Aircrack
Application Security
Black box
Blind SQL Injection
Blue box
Global System for Mobile GSM
Hacker
Internet Filter
Logic Attack
Logic Bomb
Malware
Man in the Middle Attack
PCI-DSS Compliance
Red box
Server Spam Filter
Shoulder Surfing
Wardriving
What is 2600?
What is a Botnet?
What is SANS Top 20?
What is vlan tagging?
What is Wimax?
What is Zero Day?

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef