Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1206

VLAN

What is VLAN?

VLANA virtual LAN (IEEE 802.1Q) groups switch ports into separate broadcast domains by tagging Ethernet frames with a 12-bit VLAN ID.


A Virtual LAN, standardized in IEEE 802.1Q, divides a physical switching fabric into multiple logical LANs by inserting a 4-byte VLAN tag containing a 12-bit VID (1-4094) into Ethernet frames. Access ports belong to a single VLAN; trunk ports carry multiple tagged VLANs between switches. Devices in different VLANs cannot reach each other at layer 2 and must transit a router or layer-3 switch, which makes VLANs a building block of network segmentation, host isolation, and policy zones. Security-relevant attacks include VLAN hopping (double tagging, switch spoofing) and CAM-table overflow. Hardening involves disabling DTP, pruning unused VLANs, using a dedicated unused VLAN as the native, and pairing 802.1Q with 802.1X and ACLs.

Examples

  1. 01

    VoIP phones are placed in VLAN 20 while user PCs sit in VLAN 10 on the same access port.

  2. 02

    An attacker double-tags a frame (10 then 99) to hop from VLAN 10 into VLAN 99.

Frequently asked questions

What is VLAN?

A virtual LAN (IEEE 802.1Q) groups switch ports into separate broadcast domains by tagging Ethernet frames with a 12-bit VLAN ID. It belongs to the Network Security category of cybersecurity.

What does VLAN mean?

A virtual LAN (IEEE 802.1Q) groups switch ports into separate broadcast domains by tagging Ethernet frames with a 12-bit VLAN ID.

How does VLAN work?

A Virtual LAN, standardized in IEEE 802.1Q, divides a physical switching fabric into multiple logical LANs by inserting a 4-byte VLAN tag containing a 12-bit VID (1-4094) into Ethernet frames. Access ports belong to a single VLAN; trunk ports carry multiple tagged VLANs between switches. Devices in different VLANs cannot reach each other at layer 2 and must transit a router or layer-3 switch, which makes VLANs a building block of network segmentation, host isolation, and policy zones. Security-relevant attacks include VLAN hopping (double tagging, switch spoofing) and CAM-table overflow. Hardening involves disabling DTP, pruning unused VLANs, using a dedicated unused VLAN as the native, and pairing 802.1Q with 802.1X and ACLs.

How do you defend against VLAN?

Defences for VLAN typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for VLAN?

Common alternative names include: Virtual LAN, 802.1Q VLAN.

Related terms

See also