摘要 |
A technique for identity based networking is disclosed. A system according to the technique can include a WAN (102), a first VLAN (104), a second VLAN (106) and a network database (108). The first VLAN (104) and second VLAN (106) can be coupled to the WAN (102). The network database (108) can include VLAN information. In operation, a client (110) that is authorized on the second VLAN (106) can attempt to connect to the first VLAN (104). A switch in the WAN (102) can perform a lookup in the network database (108) and determine that the client (110) is authorized on the second VLAN (106). Based on this information, the client (110) can be connected to the second VLAN (106) using VLAN tunneling (112).
|