Richard Hector wrote:
>  Trunk the VLANs from the computer to the switch.

deloptes writes:
> What does the original topic has to do with trunked VLAN?

You can use it to fake a real router by faking a second NIC.  It makes
your firewall vulnerable to VLAN hopping attacks.
-- 
John Hasler 
jhas...@newsguy.com
Elmwood, WI USA

Reply via email to