{"id":64163,"date":"2022-06-08T13:00:00","date_gmt":"2022-06-08T17:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=64163"},"modified":"2024-07-10T13:45:48","modified_gmt":"2024-07-10T17:45:48","slug":"untagged-vs-tagged-vlan","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/untagged-vs-tagged-vlan","title":{"rendered":"Untagged vs. Tagged VLAN: What\u2019s the Difference?"},"content":{"rendered":"\n
At one point in time, networking was one of the modern wonders of the world. By connecting every device at a company, organizations could broadly disseminate information in what felt like a secret code. <\/p>\n\n\n\n
The problem was those networks quickly began to spiral out of control. With hundreds or even thousands of computers linked to one network, processing power tanked, and security did too. Anyone on the network could view, download, steal, or sell company data \u4e00 a recipe for disaster.<\/p>\n\n\n\n
How did enterprises overcome these challenges? Enter: VLANs.<\/p>\n\n\n\n
VLANs, or virtual area networks, splice local area networks into distinct groups and connect those groups of devices remotely. Once a device is part of a VLAN, it can only communicate with other devices on that same network, which automatically decreases broadcast volume and locks down data access. Behind the scenes, IT can also use VLANs to manage traffic and implement additional security measures that reduce the risk of a breach<\/a>.<\/p>\n\n\n\n To reap the benefits of a VLAN, you first need to understand the fundamentals. In this piece, we\u2019ll explain what a VLAN is, how VLAN tagging differs from untagged VLANs, and why VLAN tagging can uplevel your network security. Utilizing network segmentation will help you to implement a more granular, identity-based approach to network security.<\/p>\n\n\n\n