> Yes, in the *past* switches could be exploited during a failure by them
> passing data between VLANs that they shouldn't. I don't know of a single
> *current* exploit that exists that way though. While it may exist, since no
> one seems to be able to point it out, much less refer to it with anything or
> more substance than historic anecdotal evidence, I just think the
> credibility today is probably not very good anymore.

Actually broadcasting on ARP-Table overflow is not an error, but the
intended fail-back strategy. You can turn that off with secure mode. I dont
know of any awitch with did that in VLAN configuration.

Greetings
Bernd
-- 
  (OO)      -- [EMAIL PROTECTED] --
 ( .. )  ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/
  o--o     *plush*  2048/93600EFD  eckes@irc  +497257930613  BE5-RIPE
(O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to