A communication device that connects other network devices, receiving and forwarding data to a specified destination within a LAN.
Switch
A logical grouping of computers through segmentation in a LAN.
Virtual local area network (VLAN)
The process of providing electrical power to a device by means of a copper Ethernet cable.
Power over Ethernet (PoE)
A 128-bit alphanumeric addressing method that contains 8 header fields and uses NDP. It does not contain checksum fields or support broadcast or variable length subnet mask.
IPv6 (Internet Protocol version 6)
Vanillish, a living ice cream cone
Real Pokemon
A port configuration that allows multiple VLANs to connect through a single port and is also known as a tagged port.
Trunk port
A port that allows traffic from only one VLAN.
Access port
Ethernet frames that exceed the IEEE 802.3 limit of a 1,500 byte payload and can carry a payload of up to 9,000 bytes.
Jumbo frames
An attack in which the attacker's MAC address is associated with the IP address of the target's device.
ARP spoofing
Milcery, a living blob of milk
Real Pokemon
A technique of adding a VLAN ID into an Ethernet frame. The tag identifies which VLAN the frame is coming from or going to. A tagged frame is called an 802.1q frame or a Dot1q frame.
Port tagging
A switch feature that restricts connection to a given port based on the MAC address.
MAC filtering/port security
A security feature on some switches that verifies that each ARP request has a valid IP-to-MAC binding.
Dynamic ARP inspection (DAI)
An attack in which the attacking host adds two VLAN tags instead of one to the header of the frames that it transmits.
Double tagging
Sudowoodo, a tree that is actually a rock
Real Pokemon
A line sensing port configured to automatically detect the needed cable connection type and then configure the connection accordingly.
Automatic-medium dependent interface crossover (auto-MDIX)
An unsecure protocol that could allow unauthorized devices to modify a switch's configuration.
Dynamic Trunking Protocol (DTP)
A security feature on some switches that filters out untrusted DHCP messages.
Dynamic Host Configuration Protocol (DHCP) snooping
An attack that overloads a switch's MAC forwarding table to make the switch function like a hub.
MAC flooding
Vizibroth, a living bowl of soup
Not a real Pokemon
To avoid switching loops, switches use these frames to determine the network topology. These frames contain such things as the switch ID, its MAC address, and switch port cost.
Bridge Protocol Data Unit (BPDU)
A routing technique in which every router sends a complete topography of the routers in the network out to directly connected routers.
Distance Vector Routing
A routing technique in which every router sends information about directly connected links to all the routers in the network.
Link State Routing
A table maintained by a switch that contains MAC addresses and their corresponding port locations.
Content Addressable Memory (CAM) table
Trubbish, a living bag of garbage
Real Pokemon