Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: VLAN

Related Topics

In the News (Fri 19 Jul 19)

  VLAN - LinuxNet
Vlans are a way to split up a layer2 broadcasting domain, by allowing multiple broadcast domains that each have a number (1-4096), and that can contain individual hosts, which are then not able to talk to eachother without passing through another device first (such as a firewall).
If the packet is to be received, the VLAN tag is to be stripped of the packet, and a second TYPE field will have to be interpreted.
It is possible to insert multiple VLAN tags, although this is not supported on linux, nor is it supported on many devices.
linux-net.osdl.org /index.php/VLAN   (820 words)

 CommsDesign - Tutorial on VLANs: Part 1
VLANs enable a LAN to be partitioned based on functional requirements while maintaining connectivity across all devices on the network.
The VLAN bridge functionality ensures data reception and forwarding among groups of ports (1, 3, 6 and 8) (2 and 4) and (5 and 7).
In Figure 1, MAC-based VLAN B removes the restriction for a sales division device to be attached to networks connected via ports 5 and 7 and enables the device to be part of any network reachable via the 8 ports.
www.commsdesign.com /showArticle.jhtml?articleID=26806942   (2374 words)

 Cisco VTP: VLAN Trunking Protocol
VLAN Trunking Protocol (VTP) is a Cisco Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis.
When you add, delete, or change a VLAN in a switch, the server switch where the changes were made increments the configuration revision and issues a summary advertisement, followed by one or several subset advertisements.
VLAN Trunking Protocol (VTP) is a Cisco protocol.
www.javvin.com /protocolVTP.html   (833 words)

With our unique software kernel and DSP-based voice compression technologies, VLan can be connected to a 10/100 base-T network and record analog voice in real time.
VLAN’s networking capability and standard voice file format allow easy access to voice files over LAN, WAN, intranet and the Internet using any multimedia PC.
With VLAN embedded solutions, system integration of a voice logger will be simple, flexible and fast.
www.eletech.com /Products/Voice_Loggers/VLan/vlan.htm   (247 words)

 Intel NetStructure® 6000 Switch - System Configuration Command: vlan
VLANs allow you to limit broadcast packets, multicast packets and forwarding lookup failures to a subset of the ports on the switch.
VLANs are assigned a number from 1 to 4,094.
All untagged and priority-tagged frames received by a port belong to the VLAN whose port VLAN identifier (PVID) is associated with that port.
www.intel.com /support/express/switches/6000/sb/cs-012323.htm   (506 words)

 Arjaes » Blog Archive » VLAN
A VLAN is a switched network that is logically segmented by functions, project teams, or applications, without regard to the physical location of users.
VLANs allow ports on the same or different switches to be grouped so that traffic is confined to members of that group only.
Switches will allow a VLAN of one of these types to be assigned to a static/dynamic port for which the physical MAC layer is of the corresponding type; for example, allow a VLAN of type Ethernet/802.3 to be assigned to a physical 10BaseT port.
www.arjaes.com /?p=31   (1840 words)

 SecurityDocs: VLAN   (Site not responding. Last check: 2007-10-12)
We think that is important to study this particular threat and gain insight into the involved mechanisms, as a breach of VLAN's security can have tremendous consequences.
Indeed, VLANs are used to separate subnets and implement security zones.
Recovery time would impact significantly on the business operations; in addition of an additional compromise threat during the time the subnets separations are removed, leading finally to information disclosure.
www.securitydocs.com /Architecture/VLAN   (284 words)

 WatchGuard LiveSecurity
VLAN switch configurations and deployments have been vulnerable to a number of spoofing and man-in-the-middle attacks.
The good news is that many of the early VLAN implementation problems have been corrected, and many of today's VLANs offer more security features than their predecessors.
Many VLAN switches provide administrative means to disable switch ports, limit the number of MAC addresses that can connect to a port, and lock down a specific MAC address (or addresses).
www.corecom.com /external/livesecurity/vlansec.htm   (1230 words)

 Cisco IOS VLAN Services
VLAN technology functions by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designated for the same VLAN.
The receiving router or switch then performs a VLAN ID match against the VLANs it is configured to support to determine whether it should remove the 802.10 header and forward the original packet to any ports that belong to the same VLAN.
Because each VLAN operates auto nomously, its data flow need not be interrupted by physical changes or Spanning Tree recomputations that go on elsewhere in the network topology.
www.cisco.com /warp/public/614/11.html   (1376 words)

 VLAN: Virtual Local Area Network (Virtual LAN) and IEEE 802.1Q
Virtual LAN (VLAN) refers to a group of logically networked devices on one or more LANs that are configured so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments.
Protocol-based VLAN: a switch is configured with a list of mapping layer 3 protocol types to VLAN membership - thereby filtering IP traffic from nearby end-stations using a particular protocol such as IPX.
VLAN standard is defined by IEEE (http://www.ieee.org) 802.1Q.
www.javvin.com /protocolVLAN.html   (622 words)

 VLAN Level Commands   (Site not responding. Last check: 2007-10-12)
When you configure a VLAN to be the designated management VLAN, the management IP address you configure on the device is associated only with the ports in the designated VLAN.
A private VLAN is a VLAN that has the properties of standard Layer 2 port-based VLANs but also provides additional control over flooding packets on a VLAN.
The primary VLAN is the interface between the secured ports and the rest of the network.
www.foundrynet.com /services/documentation/srcli/VLAN_cmds.html   (5978 words)

Thanks to Ben Greear http://www.candelatech.com/~greear for the VLAN project and also to all the people who have contributed to the project.
I'm leaving it in for historical reasons, but be aware that VLAN is included in the later 2.4 kernels, so most folks do NOT have to patch their kernel.
The problem was that the VLAN code in kernel header files weren't included properly when compiling the PCMCIA stuff.
www.candelatech.com /~greear/vlan/howto.html   (3659 words)

 Howstuffworks "How LAN Switches Work"
Basically, a VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on something other than physical location.
Broadcasts/Traffic flow - Since a principle element of a VLAN is the fact that it does not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces broadcasts.
You can create a VLAN using most switches simply by logging into the switch via Telnet and entering the parameters for the VLAN (name, domain and port assignments).
computer.howstuffworks.com /lan-switch16.htm   (605 words)

 SANS Institute - Intrusion Detection FAQ: Are there Vulnerabilites in VLAN Implementations? VLAN Security Test Report
This process was repeated, with PC 1 moved to a VLAN 2 port and from these two captures, the format of the 802.1q tag was found to be "81 00 0n nn", where nnn is the VLAN number.
For the next test, the PCs were connected to different VLANs on each of the switches and an attempt was made to get the generated frame to ‘hop’ from one VLAN to the other.
After consultation with their developers it was concluded that the traffic from VLAN 1 was allowed to hop to other VLANs because the trunk port was also set (implicitly) to native VLAN 1.
www.sans.org /resources/idfaq/vlan.php   (1287 words)

 Cisco VLAN Roadmap   (Site not responding. Last check: 2007-10-12)
A 32-bit (4-byte) VLAN ID field is applied to every packet as it is forwarded across FDDI links; each packet carries a unique identification and is forwarded to the switches and routers that have been configured with the same VLAN identification.
In the absence of VLAN groups, redundant links between two switches (duplicate paths) cannot be fully utilized by the switches, because spanning tree technology enables only one of the links for carrying the traffic while disabling the others to prevent bridging loops.
Concurrent routing and VLAN forwarding can also be configured to provide a wider range of VLAN configuration options where both layer 2 and layer 3 applications reside within the network (common for all enterprise networks).
www.smc.maricopa.edu /compop/smcnetwork/vlanroadmap.html   (11768 words)

 Implementing VLAN trunking   (Site not responding. Last check: 2007-10-12)
In my last article “Introduction to VLAN trunking”, I wetted your appetite for a hot new technology that is revolutionizing the way network topology are being designed and interconnected.
A switch performs as the infrastructure to carry traffic for VLANs (for those that are allowed) on the Layer 2 infrastructure as the VLAN traffic director where as the router performs a higher layer function as a network gateway that can route Layer 3 traffic.
The switch determines where the traffic from that router’s virtual interface will wind up based on the VLAN ID portion of the 802.1q tag that was inserted in to the Ethernet frame header by the router.
www.lanarchitect.net /Articles/VLANTrunking/Implementation   (1626 words)

 Virtual LAN - Wikipedia, the free encyclopedia
A virtual LAN, commonly known as a vLAN or as a VLAN, is a method of creating independent logical networks within a physical network.
Virtual networks can also serve to restrict access to network resources without regard to physical topology of the network, although the strength of this method remains debatable as VLAN Hopping is a common means of bypassing such security measures.
In the context of VLANs, the term "trunk" denotes a network link carrying multiple VLANs which are identified by labels (or "tags") inserted into their packets.
en.wikipedia.org /wiki/VLAN   (709 words)

 LINUX VLAN + Cisco HOWTO   (Site not responding. Last check: 2007-10-12)
Thanks to Ben Greear http://scry.wanfear.com/~greear for the VLAN project and also to all the people who have contributed to the project.
Info on the VLAN protocol in general can be found at http://www.cisco.com/warp/public/614/11.html Other info can also be found at http://www.netlab.ohio-state.edu/~jain/refs/lsw_refs.htm ftp://p8021:-go_wildcats@p8021.hep.net/8021/q-drafts/d11/q-d11.pdf
I have: * Linux kernel 2.2.14 * Vlan 0.0.10 Patched into it * Cisco Catalyst 2900XL * 3Com 3C509B NIC using patched driver 3c59x Currently VLAN is not part of the kernel distribution so you need to patch it into a supported Linux kernel and re-compile.
scry.wanfear.com /~greear/vlan/cisco_howto.html   (2268 words)

 Migrating to VLAN: Tips, Tools and Standards
When VLANs can be defined remotely, and managed from a central location network managers can more easily design their networks based on business objectives such as improved service to users, while also continuously monitoring VLAN performance and adjusting VLAN policies and definitions.
Implicit Tagging: i.e., a frame is classified as belonging to a particular VLAN based on the data content of the frame (e.g., MAC address, layer 3 protocol) and/or the receiving port.
The rationale of allowing switches the freedom to apply their own level of VLAN membership awareness is the fact that in a multi-vendor environment progress rules must remain most flexible to provide for painless frame forwarding.
www.uniforum.org /web/pubs/uninews/970701/feature2.html   (1013 words)

 CaptureSetup/VLAN - The Ethereal Wiki
The OS's networking stack would be connected to the VLAN interface, and that interface would appear to the networking stack to be an Ethernet interface with a smaller MTU than normal (to leave room for the VLAN tags).
FreeBSD 5.3 vlan(4) man page, VLANs have named network interface devices separate from the network interface device for the physical LAN adapter; to see frames with their VLAN tags you might have to capture on the device for the physical LAN adapter rather than the device for the VLAN.
Virtual Networking on AIX 5L white paper, VLANs have named network interface devices separate from the network interface device for the physical LAN adapter; to see frames with their VLAN tags you might have to capture on the device for the physical LAN adapter rather than the device for the VLAN.
wiki.ethereal.com /CaptureSetup/VLAN   (1699 words)

 Router Expert: Building VLAN interfaces in Linux and IOS   (Site not responding. Last check: 2007-10-12)
Cisco follows the "forward everything" approach when it comes to the ability of VLAN traffic to traverse tagged interfaces, because it works from the philosophy that tagged interfaces are also STP-included interfaces.
Instead, the 4 byte increase, which enlarges the maximum Ethernet frame size from 1514 to 1518, is interpreted by the driver as a framing error known as a "giant" and the perceived oversized frames are then discarded.
The prerequisite for using this command is that the physical interface to which the VLAN interface is bound is activated during the boot process or on the command line.
searchnetworking.techtarget.com /tip/1,289483,sid7_gci1144522,00.html   (3151 words)

 802.1Q VLAN implementation for Linux   (Site not responding. Last check: 2007-10-12)
Join the vlan mailing list, After that, to post, send mail to vlan@ns1.wanfear.com.
One of those requests was to change the default naming scheme to eth0.5, for a VLAN of VID 5 on eth0.
* The vlan_id is the identifier (0-4095) of the VLAN you are operating on.
scry.wanfear.com /~greear/vlan.html   (1970 words)

 VLAN - Webopedia.com   (Site not responding. Last check: 2007-10-12)
Short for virtual LAN, a network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN.
VLANs are configured through software rather than hardware, which makes them extremely flexible.
One of the biggest advantages of VLANs is that when a computer is physically moved to another location, it can stay on the same VLAN without any hardware reconfiguration.
winplanet.webopedia.com /TERM/V/VLAN.html   (137 words)

 Web Authentication Level at the VLAN Level   (Site not responding. Last check: 2007-10-12)
The default is 90 seconds and 0 means the Web Authentication for the MAC address will not expire, unless other forms of deauthentication occurs.
Instead of just entering a duration for how long the MAC address remains authenticated, you can specify the MAC address to be added by the specified port that is a member of the VLAN.
The default is 28800 seconds, and 0 means the user is always authenticated and will never have to reauthenticate, except if an inactive period less than the re-authentication period is configured on the Web Authentication VLAN.
www.foundrynet.com /services/documentation/srcli/VLAN_Web.html   (1113 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.