ajsnetworking.com
An Example of a Security Exploit Due to the Native VLAN - AJSnetworking.com
In many of our Cisco courses, we learn that networking best practices often point to the non-use of the Native VLAN. But why is this? It turns out there are security vulnerabilities that could result from having a VLAN not tagged across your trunk links. For example, there is the …