From the course: Cisco Network Security: Secure Routing and Switching
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
VLAN attacks
From the course: Cisco Network Security: Secure Routing and Switching
VLAN attacks
- [Instructor] A VLAN, or virtual local area network, removes the physical barrier and treats the host as if they were all part of the same subnet, while logically separating networks within networks. VLANs offer several advantages over traditional LANs. By creating smaller broadcast domains and using switches instead of routers improves overall efficiency. VLANs can be used to restrict access and create virtual work groups in isolation. We can implement wireless constraints by ensuring a user assigned to a specific VLAN will always connect to that VLAN regardless of their location. VLANs are widely used, but you should be aware, there are a few attacks against VLANs. VLAN hopping is where a user spoofs a switch by making an end device act as a trunk port. Now, this happens many times because the switch is set in auto-trunking or dynamic trunking mode, which is the default configuration. When the port senses that it is…