Tag archive: Layer 2

The most of attacks on LAN are carrying out, surprisingly from inside (directly or via VPN). It¬†means, that person who my be responsible for break-in may belong to the circle of trusted people or may use access to network resources thanks to one of trusted people. ¬†Anyway, if you are network administrator the major rule…

Sooner or later every expanding network has to be divided onto broadcast domains. There are a few reasons why it should have been done, for example to separate broadcast storms, to sort out logical networks accordingly with employees functions or in order to implement higher level of security (Vlan access lists). So, how to separate…

Menu