If they are in separate VLANs with no routability then packets can't go from from VLAN to another VLAN.
Otherwise if the virus obeys the laws of unicast routing and only uses unicast then they shouldn't be able to talk to each other. But being a virus it doesn't have to obey any rules. It could try using multicast or broadcast to talk to other machines. It could try malforming layer 2 or layer 3 frames to see what happens. It might even change the machines L3 configuration. Perhaps it might try using a different protocol like IPX, or a service lcoation protocol like mDNS and Bonjour. Perhaps it might use a Toredo IPv6 gateway, and an IPv6 link local network.
When you have something deliberately written with the intent on creating damage you can't rely on it following the rules. Only proper layer 2 separation from the switch can stop the packets being spread.
Join us for an exclusive Cisco Customer Connection online briefing: Introducing Cisco Business Wireless Access Points and Mesh Extenders on February 25 at 8 am PT. Cisco product managers will provide a technical deep dive on these new wireless products t...
QuestionDear All,I'm currently looking for firmware version 184.108.40.206 for Linksys SPA400 Analog Telephony Gateway. Unfortunately, my device was bricked and I was able to recover it using a recovery tool and recovery firmware version 220.127.116.11 but can't find v...
Change in ASD Automatic Software Download Feature
Dec 13th, 2019
Cisco RV160, 260, 340, and 345 Series Routers
Due to an API change in Cisco’s software download platform the Automatic Download Feature (ASD) on RV series routers will be temporarily ...
SFP Module Support List for RV160x and RV260x Devices
Small form-factor pluggable (SFP) ports are included on the RV160 and 260 routers to allow the use of optical SFP transceiver modules. SFP’s convert the optical signals to electrical signals. SFP’s al...