VLAN SET 3

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

77967

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

3

Uploaded by ColonelEnergy6151

Report
1 List Some Tips for VLAN Configuration that Increase Security and Overall Network Performance Student’s name Affiliation Professor’s name Course Date
2 List Some Tips for VLAN Configuration that Increase Security and Overall Network Performance Network security and performance is the greatest asset in the field of information technology. There are two key aspect of network monitoring and they encompass performance and security. Network performance is established on the basis of service quality that is approved by the customer. On the other hand, network security ensures there is no access of confidential and sensitive information that could lead to theft and damage of one’s identity. Network security and performance can be enhanced through some tips for VLAN configuration and they encompass use of VLAN to isolate the resources that are considered critical such as servers and management interface ( Alimi & Mufutau, 2015) . Isolation of the resources ensures restriction of unauthorized access. Moreover, the implementation of VLAN tagging is essential in guaranteeing the delivery of the traffic to a specific correct point rather than a misplaced data delivery that will lead unauthorized access. Also, the use of access control list (ACLs) guarantees restriction of traffic that is conducted between VLANs. Furthermore, ACLs ensure there is no access to sensitive network data and resources by unauthorized persons. VLAN trunking allows the delivery of traffic in a physical connection thereby reducing the complexity of the network and result in improved security and performance. The use of VLANs in segmentation of network is also a common trend, segmentation help in separating the network into smaller and manageable network that is easy to manage and secure. Reference Alimi, I. A., & Mufutau, A. O. (2015). Enhancement of network performance of an enterprises network with VLAN. American Journal of Mobile Systems, Applications and Services , 1 (2), 82-93.
3 Reply The discussion brings out clear points regarding the VLAN configuration tips that I strongly believe as the information are coherent with my stream of thought. I would like to add a point that I came across, where regular review and updating the VLAN ensures an updated and running network that meets the customers need and improved security. I am in agreement with the points that have been presented in the discussion, helping me achieve great insights that have helped me equip my knowledge bank. Moreover, the use of access control list play an essential role of restricting traffic between network and preventing illegal access of information by unauthorized person’s. After reading the discussion, I am intrigued to find more about other models that are related to VLAN aware switch.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help