Paper
20 October 2022 Design for security configuration of remote management multi-VLAN switch based on VLAN trunking protocol
Zhi Long
Author Affiliations +
Proceedings Volume 12451, 5th International Conference on Computer Information Science and Application Technology (CISAT 2022); 124510F (2022) https://doi.org/10.1117/12.2656502
Event: 5th International Conference on Computer Information Science and Application Technology (CISAT 2022), 2022, Chongqing, China
Abstract
As the communication network technology develops, the switch is of special importance in the secure communication configuration. A switch can be connected to the computer directly through the "Console" port and the common port. Especially when the user is in the office or on a business trip, it is necessary to manage the device remotely. At this time, the switch configuration cannot be configured locally, but needs the Telnet or Web browser to achieve the switch configuration. Usually, if multiple VLANs are needed for division, there will be different gateways for each VLAN. In practice, there are many multi-VLAN multi-triple convergence scenarios. Even the intermediate device has a route, if the device is connected by remote management without a route back, the data packet will be in a single-pass state. Although it can be sent out, the path is presented as inaccessible without a route4. The design is based on the Cisco simulator and the combination of VLAN trunking protocol (VTP) technology and VLAN technology of port division with Layer 2 and Layer 3 switches as core devices to achieve unified configuration and management of VLAN and remote password login management mode. Users can access the device management through a highly secure encrypted channel to avoid illegal user intrusion to obtain management resources and harm the network. In turn, it can restrict the remote IP address that allows access to the switch through Telnet and Web and guarantee the security function of network management.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhi Long "Design for security configuration of remote management multi-VLAN switch based on VLAN trunking protocol", Proc. SPIE 12451, 5th International Conference on Computer Information Science and Application Technology (CISAT 2022), 124510F (20 October 2022); https://doi.org/10.1117/12.2656502
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Switches

Network security

Computer networks

Computer security

Local area networks

Control systems

Network architectures

RELATED CONTENT

Protecting sensitive data: lessons learned
Proceedings of SPIE (March 12 1996)
Implementation of virtual LANs over ATM WANs
Proceedings of SPIE (September 16 1998)
Gbps optical connectivity with the 'staggering switch'
Proceedings of SPIE (December 17 1992)
Remote secure observing for the Faulkes Telescopes
Proceedings of SPIE (September 15 2004)

Back to Top