logoalt Hacker News

Chihuahua0633today at 6:05 PM1 replyview on HN

Adding exceptions for certain protocols, IP ranges (maybe multicast, even) are certainly ways around this, but I imagine with every hole you poke to allow something, you are also opening a hole for data to leak.


Replies

c0nsumertoday at 6:08 PM

Client isolation is done at L2. You can't add exceptions for IP ranges / protocols / etc this way because that's up the stack. Even if devices can learn about each other in other ways, isolation gets in the way of direct communication between them.

show 1 reply