On Fri, 24 Jun 2011 10:23:19 -0300
Fernando Gont <ferna...@gont.com.ar> wrote:

> On 06/24/2011 01:29 AM, Mark Smith wrote:
> > Actually it can.  Have a look at the following -
> > 
> > http://tools.ietf.org/html/draft-ietf-6man-dad-proxy-01
> > 
> > The layer 3 hub-and-spoke forwarding topology described can also be and
> > is likely to also be enforced at layer 2, by preventing layer 2
> > forwarding of traffic between designated host ports, limiting it to
> > host port to router port, or router port to host port.
> 
> I think that deploying this only for dealing with ND-based attacks would
> be overkill.
> 

Depends on who you are.

> Thanks,
> -- 
> Fernando Gont
> e-mail: ferna...@gont.com.ar || fg...@acm.org
> PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
> 
> 
> 
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to