IT Systems  >   Communications Networks  >   LAN  >  

VLAN

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Virtual Local Area Networks Hardware, Virtual Local Area Networks Software, IEEE 802.1q, Logical LAN, Virtual LAN Hardware, VLAN Hardware, VLAN Software, Media Access Control Bridges, Virtual Local Area Networks, MAC Bridges, Virtual LAN Software, VLANs, 802.1q, Virtual LAN, Virtual LAN Appliances, Virtual Bridged LAN, Virtual Bridged Local Area Networks
DEFINITION: VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port that is not normally accessible from a given end system. (A VLAN is a local area network with a definition that maps devices on some other basis than geographic location - for example, by department, type of user, or primary application.) A VLAN hopping attack can occur in either of two  … 
Definition continues below.
VLANWhite Papers (View All Report Types)
1 - 25 of 26 Matches Previous Page  | Next Page
NFS and vSphere Best Practices
sponsored by Tintri
WHITE PAPER: Tintri VMstore offers advanced features, extreme performance and high-availability.
Posted: 11 Sep 2014 | Published: 31 May 2013

Tintri

Using Policy Based Routing and Access Control Lists in a Virtualized Network
sponsored by Dell, Inc.
WHITE PAPER: This resource is a deployment guide for Dell Networking switches, discussing the implementation of policy based routing and access control lists in virtualized networks.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Dell, Inc.

Basics of Switching
sponsored by Global Knowledge
WHITE PAPER: A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.
Posted: 05 Sep 2013 | Published: 28 Jun 2013

Global Knowledge

Demystifying Switch-based ACLs
sponsored by Global Knowledge
WHITE PAPER: This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more!
Posted: 14 Feb 2013 | Published: 14 Feb 2013

Global Knowledge

Demystifying VLAN Trunk Protocol
sponsored by Global Knowledge
WHITE PAPER: This detailed white paper will help you uncover the truth about the often-misunderstood Virtual Local Area Network (VLAN) Trunk Protocol, or VTP. Discover an in-depth overview of how VTP works and see how you can overcome VTP challenges to minimize network outages and more – read on to get started.
Posted: 10 Jan 2013 | Published: 31 Dec 2012

Global Knowledge

Solution brief: Exceed the Limits with Extreme Networks SDN Solutions
sponsored by Extreme Networks
WHITE PAPER: Explore a portfolio of products that will help you accelerate the adoption of software-defined networking (SDN) within your enterprise.
Posted: 14 May 2013 | Published: 30 Apr 2013

Extreme Networks

Exploring Software-Defined Networking with Brocade
sponsored by Brocade
WHITE PAPER: Software-defined networking (SDN) is a hot topic today. This white paper provides an overview of the concept and the role it will play in achieving cloud success. View now to learn more!
Posted: 09 May 2013 | Published: 30 Apr 2012

Brocade

Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
Posted: 01 May 2012 | Published: 20 Apr 2012

Juniper Networks, Inc.

Integrating Physical and Virtual Networking – Virtualized Server Connect to the Data Center Fabric
sponsored by Enterasys
WHITE PAPER: Server virtualization has affected all facets of the data center – from servers to storage to the network. While the promise is a reduced capital investment, higher agility and lower operational expenses, the success of server virtualization depends on the integration of both the physical and the virtual network. This has its own set of challenges.
Posted: 22 Nov 2011 | Published: 21 Nov 2011

Enterasys

What Is an Ethernet Fabric?
sponsored by Brocade
WHITE PAPER: Compared to classic hierarchical Ethernet architectures, Ethernet fabrics provide the higher levels of performance, utilization, availability and simplicity required to meet the business needs of data centers today and into the future.
Posted: 15 Nov 2011 | Published: 31 Aug 2011

Brocade

Improving the Experience and Economics of the Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Most companies today are implementing mobility applications to establish closer relationships with their employees, suppliers and customers. Mobility applications enable the sales force to be extremely reactive, stay connected to their customers, and act on new opportunities in literally seconds.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

Simplify VMware vSphere* 4Networking with Intel® Ethernet 10 Gigabit Server Adapters
sponsored by Intel
WHITE PAPER: Server virtualization can quickly result in excessively complex network ports if you don't have a plan. This white paper explores the factors that can lead to GbE port bloat, including physical server connection paradigms and security procedures. 
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Intel

Ten top problems network techs encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by technicians today and their symptoms, causes, and resolutions.
Posted: 18 Apr 2011 | Published: 18 Apr 2011

Fluke Networks

Ten top problems network techs encounter
sponsored by Fluke Networks
WHITE PAPER: This white paper discusses ten common problems encountered by technicians today and their symptoms, causes, and resolutions.
Posted: 14 Oct 2010 | Published: 14 Oct 2010

Fluke Networks

The Top 5 VoIP Problems and How to Solve Them
sponsored by Fluke Networks
WHITE PAPER: This paper examines each of these problems and addresses how the ClearSight Analyzer can be used to isolate the cause of the problem.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Fluke Networks

Dell Networking Solutions Guide for Microsoft Hyper-V
sponsored by Dell and Microsoft
WHITE PAPER: This solutions guide details the four available networking configurations, and the advantages and disadvantages of each with an emphasis on typical Dell system configuration and the hardware offerings.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Dell and Microsoft

The Case for Virtual Local Area Networks (VLANs)
sponsored by Global Knowledge
WHITE PAPER: In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Switching Essentials: An Introduction to Network Switching
sponsored by Global Knowledge
WHITE PAPER: In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Solving the Mysteries of Subnetting
sponsored by Global Knowledge
WHITE PAPER: Subnetting is a complicated topic that has confused students for a very long time, however, subnetting is an important topic for many different certifications with various vendors, including Cisco.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Keeping Your Head above the Cloud: 7 Data Center Challenges before Going Virtual
sponsored by F5 Networks
WHITE PAPER: This White Paper details seven data center challenges before deploying a virtual data center.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

F5 Networks

Optimized Metro Aggregation Network for Triple Play Services
sponsored by ECI Telecom
WHITE PAPER: Learn how the convergence of voice, video and data ("Triple Play") together with relaxed regulatory control have forced service providers to shift towards a combined offering of voice, video, and data service improving their position in the market
Posted: 22 Jul 2008 | Published: 01 Jul 2008

ECI Telecom

The ECHO™ - Cisco Connection: ECHO™, and How It Interacts with Cisco's CallManager
sponsored by Teleformix
WHITE PAPER: Read this white paper and learn how ECHO's direct digital integration with Cisco's VoIP network enables the pooling of voice VLAN ports through SPAN or RSPAN.
Posted: 11 Jul 2008 | Published: 01 Jul 2007

Teleformix

The ECHO™ - Avaya Connection: ECHO™, and How It Interacts with Avaya's Telephony Solutions
sponsored by Teleformix
WHITE PAPER: Read this paper to learn how Teleformix's ECHO™ digital recording solution integrates seamlessly with Avaya's telephony systems, providing your company with a crucial customer service tool - quality assurance recording.
Posted: 11 Jul 2008 | Published: 01 Jul 2007

Teleformix

Eliminating Security Trade-Offs with Cross-Platform Server Isolation
sponsored by Apani
WHITE PAPER: This paper will examine the challenges of using network firewalls and VLANs for security within the corporate network and introduce the many advantages of cross-platform server isolation as an alternative in protecting servers.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Apani

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks
1 - 25 of 26 Matches Previous Page    1 2    Next Page
 
VLAN DEFINITION (continued): …  ways. If a network switch is set for autotrunking, the attacker turns it into a switch that appears as if it has a constant need to trunk (that is, to access all the VLANs allowed on the trunk port). In Cisco's Dynamic Trunking Protocol (DTP), the susceptibility of a system to this form of VLAN hopping can be minimized by turning off the autotrunking feature (DTP off) on all switches that do not need to trunk. In the second form of VLAN hopping, the hacker transmits data through one switch to another by sending frames with two 802.1Q tags, one for the attacking switch and the other for the victim … 
VLAN definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement