When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Switch virtual interface - Wikipedia

    en.wikipedia.org/wiki/Switch_virtual_interface

    When you enable VLAN interface creation, a switch creates a VLAN interface for the default VLAN (VLAN 1) to permit remote switch administration. SVIs are generally configured for a VLAN for the following reasons: Allow traffic to be routed between VLANs by providing a default gateway for the VLAN. Provide fallback bridging (if required for non ...

  3. VLAN access control list - Wikipedia

    en.wikipedia.org/wiki/VLAN_access_control_list

    A VLAN access control list (VACL) provides access control for all packets that are bridged within a VLAN or that are routed into or out of a VLAN. Unlike regular Cisco IOS access control lists that are configured on router interfaces and applied on routed packets only, VACLs apply to all packets.

  4. EtherType - Wikipedia

    en.wikipedia.org/wiki/EtherType

    EtherType is also used as the basis of 802.1Q VLAN tagging, encapsulating packets from VLANs for transmission multiplexed with other VLAN traffic over an Ethernet trunk. EtherType was first defined by the Ethernet II framing standard and later adapted for the IEEE 802.3 standard. EtherType values are assigned by the IEEE Registration Authority.

  5. Private VLAN - Wikipedia

    en.wikipedia.org/wiki/Private_VLAN

    A Private VLAN divides a VLAN (Primary) into sub-VLANs (Secondary) while keeping existing IP subnet and layer 3 configuration. A regular VLAN is a single broadcast domain, while private VLAN partitions one broadcast domain into multiple smaller broadcast subdomains. Primary VLAN: Simply the original VLAN. This type of VLAN is used to forward ...

  6. VLAN - Wikipedia

    en.wikipedia.org/wiki/VLAN

    By using VLANs, one can control traffic patterns and react quickly to employee or equipment relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration. [3] VLANs can be used to partition a local network into several distinctive segments, for instance: [4] Production; Voice over IP

  7. Stateful firewall - Wikipedia

    en.wikipedia.org/wiki/Stateful_firewall

    UDP hole punching is a technology that leverages this trait to allow for dynamically setting up data tunnels over the internet. [6] ICMP messages are distinct from TCP and UDP and communicate control information of the network itself. A well-known example of this is the ping utility. [7] ICMP responses will be allowed back through the firewall.

  8. Link aggregation - Wikipedia

    en.wikipedia.org/wiki/Link_aggregation

    Channel bonding is differentiated from load balancing in that load balancing divides traffic between network interfaces on per network socket (layer 4) basis, while channel bonding implies a division of traffic between physical interfaces at a lower level, either per packet (layer 3) or a data link (layer 2) basis.

  9. Multiple Spanning Tree Protocol - Wikipedia

    en.wikipedia.org/wiki/Multiple_Spanning_Tree...

    However, when a LAN is virtualized using VLAN trunking, each physical link represents multiple logical connections. Blocking a physical link blocks all its logical links and forces all traffic through the remaining physical links within the spanning tree. Redundant links cannot be utilized at all.