SearchSecurity.com

How to configure a VLAN to achieve the benefits of VLAN security

With the proliferation of cryptologic technology, Web application firewalls and intrusion- detection systems in recent years, the emphasis placed on the acquisition and deployment of said devices has been profound, to say the least. Entire industries have been spawned by the continued use of these devices, but one type of device that receives little mention in contemporary security circles is the Layer 2 switch. Commonly thought of as simple devices that take packets in and spit packets out, Layer 2 switches are often forgotten about in terms of useful enterprise security technology.

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement