In-Reply-To: [EMAIL PROTECTED]
I looked into vlan security a little while back and found few problems
with respect to security. Note the following discussion relates to Cisco
kit.
Cisco have some good documentation on CCO, but you'll likely need a
support contract/login to get
-Mensaje original-
De: LINKCRAFT [mailto:[EMAIL PROTECTED]
Enviado el: martes, 03 de junio de 2003 8:52
Para: [EMAIL PROTECTED]
Asunto: VLAN security
I have a leased line network with few VLAN configured,
may I know how can I implement the security in order
to prevent hacking from one VLAN
:[EMAIL PROTECTED]
Sent: Tuesday, June 03, 2003 12:52 AM
To: [EMAIL PROTECTED]
Subject: VLAN security
I have a leased line network with few VLAN configured,
may I know how can I implement the security in order
to prevent hacking from one VLAN to another VLAN or
from internet. There is no firewall
I have a leased line network with few VLAN configured,
may I know how can I implement the security in order
to prevent hacking from one VLAN to another VLAN or
from internet. There is no firewall installed in the
network. Can I implement firewall? If affirmative, how
can I protect between each
There should be no user traffic on the default/management vlan
This vlan propagate everywhere and is not prune.
-Message d'origine-
De : Rich MacVarish [mailto:[EMAIL PROTECTED]]
Envoyé : 7 février, 2003 10:14
À : Naman Latif
Cc : [EMAIL PROTECTED]
Objet : Re: VLAN Security
Greetings
Hi,
We have different Cisco Catalyst switches configured for VLANS. With the
current configuration
1. All trunks have a native VLAN, which is not used by any User.
2. Management VLAN is other than VLAN 1.
We have different VLANs in place, however these are only used for
different Servers ,And
-
From: Naman Latif [mailto:[EMAIL PROTECTED]]
Sent: February 6, 2003 2:00 PM
To: [EMAIL PROTECTED]
Subject: VLAN Security
Hi,
We have different Cisco Catalyst switches configured for VLANS. With the
current configuration
1. All trunks have a native VLAN, which is not used by any User.
2
ports, especially if you add other user vlans in the future.
-Ethan
-Original Message-
From: Naman Latif [mailto:[EMAIL PROTECTED]]
Sent: Thursday, February 06, 2003 11:00 AM
To: [EMAIL PROTECTED]
Subject: VLAN Security
Hi,
We have different Cisco Catalyst switches configured for VLANS
To: [EMAIL PROTECTED]
Subject: VLAN Security
Hi,
We have different Cisco Catalyst switches configured for VLANS. With the
current configuration
1. All trunks have a native VLAN, which is not used by any User. 2.
Management VLAN is other than VLAN 1.
We have different VLANs in place, however
: 604-889-4811
Fax: 604-453-5870
email: [EMAIL PROTECTED]
web: www.candlewest.com
-Original Message-
From: Ethan [mailto:[EMAIL PROTECTED]]
Sent: Friday, February 07, 2003 10:59 AM
To: Security-Basics
Subject: RE: VLAN Security
Since you have a seperate management vlan, and it sounds like
Greetings,
I don't know of any advantages (if someone does please share) of moving
all users to a non-default VLAN, but there may be an advantage to putting
different user groups onto different VLANs.
Example, putting Development and HR onto different VLANs essentially puts
them on seperate
[mailto:[EMAIL PROTECTED]]
| Sent: Friday, July 05, 2002 2:05 AM
| To: Jonathan Strine; [EMAIL PROTECTED]
| Subject: Re: VLAN Security
|
|
| Jonathan Strine wrote:
| Ok, now for the question. How secure is a setup like this in
| terms of the VLAN? I know that VLANs were originally designed
Jonathan Strine wrote:
Ok, now for the question. How secure is a setup like this in terms
of the VLAN? I know that VLANs were originally designed to enhance
performance (i.e. use more the switch's potential) than for security
and I have heard about possible vulnerabilities regarding VLAN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have two Lucent P330 switches (each one is at a seperate location)
connected via OC-12 with ATM modules in each switch. I have two
VLANs (a VLAN for secure hosts, and a VLAN for other hosts) in each
location so that I can control access to the
14 matches
Mail list logo