##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
VLANs and trunking
What you will learn
The problem with flat networks
Virtual LANs explained
Isolating sensitive traffic
Reducing broadcast domains
Organizing by function
Valid VLAN numbers
VLAN 1 behavior
Test your understanding
Single VLAN assignment
Carrying multiple VLANs
When to use each
The tagging protocol
Inside the 4-byte tag
QoS in the VLAN tag
The VLAN identifier
Test your understanding
Untagged trunk traffic
A common misconfiguration
VLAN hopping attacks
General approach
Adding to the VLAN database
Putting devices in VLANs
Carrying multiple VLANs
Test your understanding
Connecting VLANs
One interface, many VLANs
Switching and routing combined
Separating voice traffic
Setting up phone ports
Test your understanding
VLAN Trunking Protocol
Server, client, transparent
Production guidelines
Common issues
Summary of concepts