On 06/24/2011 01:29 AM, Mark Smith wrote:
> Actually it can.  Have a look at the following -
> 
> http://tools.ietf.org/html/draft-ietf-6man-dad-proxy-01
> 
> The layer 3 hub-and-spoke forwarding topology described can also be and
> is likely to also be enforced at layer 2, by preventing layer 2
> forwarding of traffic between designated host ports, limiting it to
> host port to router port, or router port to host port.

I think that deploying this only for dealing with ND-based attacks would
be overkill.

Thanks,
-- 
Fernando Gont
e-mail: ferna...@gont.com.ar || fg...@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1



--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to