Join Greg Sowell for an in-depth discussion in this video VLANs, part of Foundations of Networking: Network Media (WANs).
- View Offline
- [Voiceover] Virtual local area networks are used to…logically separate Layer 2 switch networks.…Users on different VLANs can't communicate directly,…just as they would if they were on physically separate…networks.…It's a great way to segment a network, and improve…security.…These Ethernet frames are separated by…applying tags.…802.1Q is the IEEE standard for tagging Ethernet frames…with VLAN information.…It inserts a 32-bit field in the Ethernet header…between the source MAC address and EtherType fields.…
VLANs are typically invisible to the end user.…All of the configuration takes place within the switches.…Clients connect to a switch, just like normal.…Inside the switch, the access port is set to tag…incoming packets for the appropriate user VLAN.…This is done by choosing an arbitrary VLAN number…between 2 and 4,094.…VLAN 1 is the default VLAN.…This means by default all ports are set to this.…It is for this reason that best practice says not to…use VLAN 1 in your environment.…
Once you assign a VLAN number, the port is set to tag…
He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more