Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Vulnerability Assessment of VLAN
Jan 14 2011 08:59AM
S Walker (walker_s hotmail co uk)
1. If the VLAN you're on is not the trunk (usually 1) then there should
only be traffic for that VLAN going through it. If you listen with
tcpdump/wireshark on said VLAN, and cause an ARP or other L2 broadcast
on another VLAN then you should be able to confirm if this is the case.
[ more ]
Copyright 2010, SecurityFocus