VLAN SET 3
docx
keyboard_arrow_up
School
Harvard University *
*We aren’t endorsed by this school
Course
77967
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
3
Uploaded by ColonelEnergy6151
1
List Some Tips for VLAN Configuration that Increase Security and Overall Network
Performance
Student’s name
Affiliation
Professor’s name
Course
Date
2
List Some Tips for VLAN Configuration that Increase Security and Overall Network
Performance
Network security and performance is the greatest asset in the field of information
technology. There are two key aspect of network monitoring and they encompass performance
and security. Network performance is established on the basis of service quality that is approved
by the customer. On the other hand, network security ensures there is no access of confidential
and sensitive information that could lead to theft and damage of one’s identity. Network security
and performance can be enhanced through some tips for VLAN configuration and they
encompass use of VLAN to isolate the resources that are considered critical such as servers and
management interface (
Alimi & Mufutau, 2015)
. Isolation of the resources ensures restriction of
unauthorized access. Moreover, the implementation of VLAN tagging is essential in
guaranteeing the delivery of the traffic to a specific correct point rather than a misplaced data
delivery that will lead unauthorized access. Also, the use of access control list (ACLs) guarantees
restriction of traffic that is conducted between VLANs. Furthermore, ACLs ensure there is no
access to sensitive network data and resources by unauthorized persons. VLAN trunking allows
the delivery of traffic in a physical connection thereby reducing the complexity of the network
and result in improved security and performance. The use of VLANs in segmentation of network
is also a common trend, segmentation help in separating the network into smaller and
manageable network that is easy to manage and secure.
Reference
Alimi, I. A., & Mufutau, A. O. (2015). Enhancement of network performance of an enterprises
network with VLAN.
American Journal of Mobile Systems, Applications and
Services
,
1
(2), 82-93.
3
Reply
The discussion brings out clear points regarding the VLAN configuration tips that I
strongly believe as the information are coherent with my stream of thought. I would like to add a
point that I came across, where regular review and updating the VLAN ensures an updated and
running network that meets the customers need and improved security.
I am in agreement with the points that have been presented in the discussion, helping me
achieve great insights that have helped me equip my knowledge bank.
Moreover, the use of
access control list play an essential role of restricting traffic between network and preventing
illegal access of information by unauthorized person’s. After reading the discussion, I am
intrigued to find more about other models that are related to VLAN aware switch.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help