Explain why in modern networks the native VLAN is set to an unused VLAN and the trunk port is configured to tag its native VLAN traffic as well.

What will be an ideal response?


Native VLANs exist to provide compatibility with older or simpler non-VLAN tagging switches, but there is a catch. The native VLAN opens your network to a nasty vulnerability called a double-tagging attack that lets the attacker access VLANs they should not be able to access. For this reason, in modern networks the native VLAN is set to an unused VLAN and the trunk port is configured to tag its native VLAN traffic as well.
 

Computer Science & Information Technology

You might also like to view...

MC Bytes are composed of__________ bits.

a) Ten. b) Six. c) Eight. d) Two.

Computer Science & Information Technology

boolean values can be displayed as the words true and false with the ________ format specifier.

a. %bool. b. %b. c. %true. d. %boolean.

Computer Science & Information Technology

Given a base class named Vehicles and a derived class named Sedans, __________ can inherit from __________.

a. Sedans can inherit from Vehicles b. Vehicles can inherit from Sedans c. Inheritance is not possible here because there is no superclass. d. Inheritance is not possible here because there is no subclass.

Computer Science & Information Technology

A sequence of folders in the folder structure that leads to a specific file or folder is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology