On 06/24/2011 01:29 AM, Mark Smith wrote: > Actually it can. Have a look at the following - > > http://tools.ietf.org/html/draft-ietf-6man-dad-proxy-01 > > The layer 3 hub-and-spoke forwarding topology described can also be and > is likely to also be enforced at layer 2, by preventing layer 2 > forwarding of traffic between designated host ports, limiting it to > host port to router port, or router port to host port.
I think that deploying this only for dealing with ND-based attacks would be overkill. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------