␡
- Objectives
- Key Terms
- Introduction (3.0.1.1)
- VLAN Segmentation (3.1)
- VLANs in a Multiswitched Environment (3.1.2)
- VLAN Implementations (3.2)
- VLAN Trunks (3.2.2)
- Dynamic Trunking Protocol (3.2.3)
- Troubleshoot VLANs and Trunks (3.2.4)
- VLAN Security and Design (3.3)
- Design Best Practices for VLANs (3.3.2)
- Summary (3.4)
- Practice
- Class Activities
- Labs
- Packet Tracer Activities
- Check Your Understanding Questions
This chapter is from the book
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
- VLAN page 90
- data VLAN page 93
- default VLAN page 93
- native VLAN page 94
- trunk page 94
- management VLAN page 95
- voice VLAN page 96
- tagging page 101
- vlan.dat page 106
- VLAN Trunking Protocol (VTP) page 106
- Dynamic Trunking Protocol (DTP) page 120
- VLAN leaking page 127
- VLAN hopping page 134
- switch spoofing page 134
- double-tagging page 135
- Private VLAN (PVLAN) Edge page 136
- black hole VLAN page 138