Page 897 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 897

(specifically a layer 3 switch). As networks are being crafted in virtual
               environments or in the cloud, software switches are often used. In

               these situations, VLANs are not hardware-based but instead are
               switch-software-based implementations.

               VLANs let you control and restrict broadcast traffic and reduce a
               network’s vulnerability to sniffers because a switch treats each VLAN
               as a separate network division. To communicate between segments,
               the switch must provide a routing function. It’s the routing function

               that blocks broadcasts between subnets and VLANs, because a router
               (or any device performing layer 3 routing functions such as a layer 3
               switch) doesn’t forward layer 2 Ethernet broadcasts. This feature of a
               switch blocks Ethernet broadcasts between VLANs and so helps
               protect against broadcast storms. A broadcast storm is a flood of
               unwanted Ethernet broadcast network traffic.

               Another element of some VLAN deployments is that of port isolation

               or private ports. These are private VLANs that are configured to use a
               dedicated or reserved uplink port. The members of a private VLAN or
               a port-isolated VLAN can interact only with each other and over the
               predetermined exit port or uplink port. A common implementation of
               port isolation occurs in hotels. A hotel network can be configured so
               that the Ethernet ports in each room or suite are isolated on unique
               VLANs so that connections in the same unit can communicate, but

               connections between units cannot. However, all of these private
               VLANs have a path out to the internet (i.e., the uplink port).



                          VLANs work like subnets, but keep in mind that they are not


                  actual subnets. VLANs are created by switches at layer 2. Subnets
                  are created by IP address and subnet mask assignments at layer 3.






                  VLAN Management for Security



                  Any network segment that does not need to communicate with
                  another to accomplish a work task/function should not be able to
   892   893   894   895   896   897   898   899   900   901   902