On Fri, 24 Jun 2011 10:23:19 -0300 Fernando Gont <ferna...@gont.com.ar> wrote:
> On 06/24/2011 01:29 AM, Mark Smith wrote: > > Actually it can. Have a look at the following - > > > > http://tools.ietf.org/html/draft-ietf-6man-dad-proxy-01 > > > > The layer 3 hub-and-spoke forwarding topology described can also be and > > is likely to also be enforced at layer 2, by preventing layer 2 > > forwarding of traffic between designated host ports, limiting it to > > host port to router port, or router port to host port. > > I think that deploying this only for dealing with ND-based attacks would > be overkill. > Depends on who you are. > Thanks, > -- > Fernando Gont > e-mail: ferna...@gont.com.ar || fg...@acm.org > PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 > > > -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------