top | item 47172042 (no title) cluckindan | 3 days ago If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic? discuss order hn newest cyberax|3 days ago Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
cyberax|3 days ago Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
cyberax|3 days ago