User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Configuring Network Settings
Chapter 6: Managing Your Network 175
The Safe@Office appliance supports the following VLAN types:
• Tag-based
In tag-based VLAN you use one of the gateway’s ports as a 802.1Q VLAN trunk,
connecting the appliance to a VLAN-aware switch. Each VLAN behind the trunk is
assigned an identifying number called a “VLAN ID”, also referred to as a "VLAN
tag". All outgoing traffic from a tag-based VLAN contains the VLAN's tag in the
packet headers. Incoming traffic to the VLAN must contain the VLAN's tag as well, or
the packets are dropped. Tagging ensures that traffic is directed to the correct VLAN.
Figure 17: Tag-Based VLAN