Abstract The report describes why VLANS are used, how to design a VLAN infrastructure for an organization with necessary switches and routers, security attacks based on VLANS and features on the platforms which would mitigate these attacks.