enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Black hole (networking) - Wikipedia

    en.wikipedia.org/wiki/Black_hole_(networking)

    A null route or black hole route is a network route (routing table entry) that goes nowhere. Matching packets are dropped (ignored) rather than forwarded, acting as a kind of very limited firewall. The act of using null routes is often called blackhole filtering. The rest of this article deals with null routing in the Internet Protocol (IP).

  3. Reverse-path forwarding - Wikipedia

    en.wikipedia.org/wiki/Reverse-path_forwarding

    Reverse path filters are typically used to disable asymmetric routing where an IP application has a different incoming and outgoing routing path. Its intent is to prevent a packet entering one interface from leaving via the other interfaces. Reverse-path Filtering is a feature of the Linux Kernel. [3]

  4. Private VLAN - Wikipedia

    en.wikipedia.org/wiki/Private_VLAN

    A Private VLAN divides a VLAN (Primary) into sub-VLANs (Secondary) while keeping existing IP subnet and layer 3 configuration. A regular VLAN is a single broadcast domain, while private VLAN partitions one broadcast domain into multiple smaller broadcast subdomains. Primary VLAN: Simply the original VLAN. This type of VLAN is used to forward ...

  5. IEEE 802.1Q - Wikipedia

    en.wikipedia.org/wiki/IEEE_802.1Q

    IEEE 802.1Q. IEEE 802.1Q, often referred to as Dot1q, is the networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames.

  6. IEEE 802.1ad - Wikipedia

    en.wikipedia.org/wiki/IEEE_802.1ad

    IEEE 802.1ad is an amendment to the IEEE 802.1Q-1998 networking standard which adds support for provider bridges. It was incorporated into the base 802.1Q standard in 2011. [1] The technique specified by the standard is known informally as stacked VLANs or QinQ. The original 802.1Q specification allows a single virtual local area network (VLAN ...

  7. EtherType - Wikipedia

    en.wikipedia.org/wiki/EtherType

    EtherType is a two- octet field in an Ethernet frame. It is used to indicate which protocol is encapsulated in the payload of the frame and is used at the receiving end by the data link layer to determine how the payload is processed. The same field is also used to indicate the size of some Ethernet frames. EtherType is also used as the basis ...

  8. VLAN hopping - Wikipedia

    en.wikipedia.org/wiki/VLAN_hopping

    VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible. There are two primary methods of VLAN hopping: switch spoofing and ...

  9. VLAN Trunking Protocol - Wikipedia

    en.wikipedia.org/wiki/VLAN_Trunking_Protocol

    VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network. [1] To do this, VTP carries VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over 802.1Q, and ISL trunks. VTP is available on most of the Cisco ...