VLAN Puzzle

1234567891011
Across
  1. 2. The process of transferring VLAN traffic between two or more switches.
  2. 4. This switch works at Layer 2 and Layer 3 of the OSI model.
  3. 5. A Cisco proprietary protocol that updates a VLAN switch into three states - server, client or transparent
  4. 8. Type of attack allows unauthorized access to VLANs but this is mitigated by changing the native VLAN to an unused one and configuring the trunk
  5. 9. The configuration for when a router interface is connected to multiple VLANs on a switch
  6. 11. If you give an incorrect VLAN ____ to a device, then that device won’t have access to resources it needs.
Down
  1. 1. AAA is vital to switches’ security because it supports port _____, which gives us a way to protect our network from unwanted people trying to access the network.
  2. 3. This special remote access server program allows the server endpoint to function as a network router, which routes IP packets between networks.
  3. 5. This lets you segment a physical network into multiple discrete networks without having to add additional hardware.
  4. 6. These VLANs based on MAC addresses
  5. 7. to tag its native VLAN traffic.
  6. 10. The process of making a router work between two VLANs is called ______ routing.