> Yes, in the *past* switches could be exploited during a failure by them > passing data between VLANs that they shouldn't. I don't know of a single > *current* exploit that exists that way though. While it may exist, since no > one seems to be able to point it out, much less refer to it with anything or > more substance than historic anecdotal evidence, I just think the > credibility today is probably not very good anymore.
Actually broadcasting on ARP-Table overflow is not an error, but the intended fail-back strategy. You can turn that off with secure mode. I dont know of any awitch with did that in VLAN configuration. Greetings Bernd -- (OO) -- [EMAIL PROTECTED] -- ( .. ) ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/ o--o *plush* 2048/93600EFD eckes@irc +497257930613 BE5-RIPE (O____O) When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl! _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls