Vlan Plan

Stats

Submitted by:
Date Added: 08 / 16 / 2010
Category: Technology
Words | Pages: 705 | 3
Views: 1410

Similar Essays

Vlan Plan

View Full Essay VLAN Plan     1

Running head: Implementing a VLAN Plan

                                                Implementing a VLAN Plan

                                                        Barbara Bishop

                                                              IT 242

                                                                                                                                VLAN Plan     2

Implementing a VLAN (Virtual Local Area Network) in a business has its advantages. In this report, the benefits of creating a VLAN plan will be discussed. Also in this report, plans to increase security, the purpose and benefit of using the VLAN Trunk Protocol (VTP), the definition of the VTP mode used to configure switches, and a backup plan for the business will be discussed.

                                                                                                                                VLAN Plan     3

    The main benefit of using a VLAN is that they provide flexibility, scalability, and above all increased security. VLAN member users do not have to be in the same geographical location to share resources. In order to segment the network into different broadcast domains to avoid bandwidth consumption, and reduce network congestion, the network will be logically split into broadcast domains. The different sections of the network will be divided by group function: marketing will have a section, engineering will have a section, operations will have a section, and the call center will have its own section. With the network split into four sections, security will be more easily attained. Each section will be logically separate from the rest of the network, so access is restricted from section to section. Access control for all the sections is the best way to ensure security. Only authorized users have access to the sections. This can be done through individual passwords to access data. Security barriers will be set up...