That’s a very cool feature actually but how does it stop a hacker if he has obtained a trusted MAC address from another device and connect to vlan 20 directly while the real device is offline?
tjoa
FYI I learned About VLANs that it is in no way „locked down“. I can spoof the MAC address of a known device from a specific VLAN and I’m in that VLAN. Yes your devices can’t reach the internet/other devices by default but it won’t stop a bad actor.
I use the Wipr ad block extension and then just safari. I can’t bare YouTube ads.
Ja ich hab auch manchmal das Gefühl dass die 25km/h auch für einige Rentner schon grenzwertig sind. Die haben nicht besonders viel Kontrolle über ihr ebike.
Fucking lock down the Baltic Sea. Problem solved
Finde schade, dass das Bild von Postillion gerippt ist und er keine Quellenangabe macht…
Confused web dev noises
Who said that this is fine in general? The argument that electric vehicles are not competitive with petrol cars in Germany IF you use public charging stations only is kind of irrelevant if in reality 90% of charging cycles are done at home.
Ok do you know a single person that relies on public charging for their ev? Cuz I don’t.
Also most have their own logistics that is just as fast as amazons (cuz they need to since they sell on Amazon)
Ok maybe I don’t fully understand yet. Let’s say an access point has 3 SSIDs, lan, guest and iot each client on each SSID gets a vlan tag accordingly. So it’s only connected to a single physical port, i think that’s what confused me. But SSIDs are interfaces just like an physical port afaik so your analogy still stands. The security here is the WiFi password anything that connects to LAN gets a LAN vlan tag. but it’s not like anything that connects to any of the SSIDs can get the DHCP lease of some random device on any vlan cuz it got tagged before. Or am I missing something?