Explain why in modern networks the native VLAN is set to an unused VLAN and the trunk port is configured to tag its native VLAN traffic as well.

What will be an ideal response?

Native VLANs exist to provide compatibility with older or simpler non-VLAN tagging switches, but there is a catch. The native VLAN opens your network to a nasty vulnerability called a double-tagging attack that lets the attacker access VLANs they should not be able to access. For this reason, in modern networks the native VLAN is set to an unused VLAN and the trunk port is configured to tag its native VLAN traffic as well.
 

Computer Science & Information Technology

You might also like to view...

In a relational database, a ________ exists between two tables when a record in one table is related to many records in a second table

A) many-to-many B) one-to-one C) one-to-many D) some-to-some

Computer Science & Information Technology

Which view enables you to easily see the size of a file?

A) More B) List C) Large icons D) Details

Computer Science & Information Technology