Comment by cluckindan
1 day ago
If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic?
1 day ago
If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic?
Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.