• That's because every device you add to your network has to be manually added to your ARP script or entered into each machine's ARP table.

    是因为加入一台设备网络需要你手动地编写ARP脚本输入设备ARP映射表。

    youdao

  • In fact, many operating systems implement ARP so trustingly that devices that have not made an ARP request still accept ARP replies from other devices.

    实际上许多操作系统实现ARP时都是尽管没有发出任何ARP请求但仍然接受来自其他设备ARP响应

    youdao

  • One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning.

    黑客攻击一种形式包括修改恶意数据ARP映射缓存,即所谓ARP中毒

    youdao

  • A gratuitous ARP request is sent on all virtual Ethernet adapters to update the ARP caches on all external switches and systems on the network.

    一个ARP请求发送所有虚拟以太网,从而更新网络所有外部交换机系统上的ARP缓存

    youdao

  • The ARP table ensures that the device doesn't have to repeat ARP Requests for devices it has already communicated with.

    ARP映射确保设备不会已经通讯过设备重复发送ARP请求

    youdao

  • Then using the "arp -s" command, you can add static ARP entries for all your known devices.

    然后使用 "arp-s"命令可以所知道设备添加静态ARP映射。

    youdao

  • When a networked device sends an ARP request, it simply trusts that when the ARP reply comes in, it really does come from the correct device.

    网络中的设备发出个广播ARP请求时只是简单相信当收到一个ARP响应时,这个响应真的来自正确的设备(因为按照协议只有IP地址对应的设备才会发出相应报文,译者注)。

    youdao

  • PDP Context Modification due to changes in Subscribed Evolved ARP may be skipped if there is no previously stored value for Subscribed Evolved ARP.

    因为签约的演进ARP变化而产生的PDP上下文修改可以跳过- - -如果之前没有存储签约的演进ARP的话。

    youdao

  • "False" means the previously mentioned flood flows will not be installed. Instead an ARP flow will be installed on each switch that sends all ARP packets to the controller.

    意味着之前提到不会安装每个交换机上会安装一个ARP所有ARP包发送控制器

    youdao

  • When IP needs a hardware address, ARP first consults the ARP cache for the hardware address that corresponds to the destination IP address.

    IP协议需要某一硬件地址时,地址解析协议首先ARP高速缓存询问与目的地IP地址相应硬件地址。

    youdao

  • Has analyzed the ARP virus's attack principle, as well as several typical ARP deceit way.

    分析ARP病毒攻击原理以及几种典型ARP欺骗方式。

    youdao

  • This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.

    本文分析ARP协议及其工作原理现有ARP欺骗攻击防御方法以及防御检测特点。

    youdao

  • This paper introduces the procedure of ARP agreement, the principle of ARP deception and methods to prevent ARP deception.

    本文介绍ARP协议工作过程ARP欺骗原理给出防范ARP欺骗的一些方法

    youdao

  • This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.

    文章分析ARP协议工作原理安全缺陷攻击原理攻击方式基础,详细论述基于ARP协议攻击的防御方法

    youdao

  • According to the analysis of ARP protocol, this paper provided a distributed subnet topology discovery method based on ARP protocol message.

    根据ARP协议分析给出一种基于ARP协议报文分布式子网拓扑发现方法

    youdao

  • When designing and implementing the ARP protocol in high-end routers, we must deal with three key issues: consistency of the ARP table, ARP access failure and ARP security.

    高性能路由器上设计实现ARP协议时存在三个关键问题ARP一致性ARP访问失效ARP协议的安全。

    youdao

  • The paper briefly introduces ARP agreement, analyses the principles for ARP attacking and illustrates effectiveness of prevalent preventions and treatments.

    文章简单介绍了ARP协议分析了ARP攻击原理从机制上说明了流行的防治方法有效性

    youdao

  • This paper gives an introduction to the functions, packet format and working theory of the ARP (Address Resolution Protocol) and analyses the security vulnerabilities that exist in the ARP.

    文章详细介绍ARP协议功能分组格式工作原理分析了当前ARP协议存在安全性问题。

    youdao

  • This paper introduces the definition of ARP and the principle of ARP spoofing, analyses the modes of ARP spoofing and supplies the protecting methods of ARP spoofing.

    文章介绍了ARP协议含义ARP协议欺骗原理分析了ARP欺骗攻击形式提出防范ARP欺骗攻击的一些措施

    youdao

  • ARP spoofing attack is a common phenomenon in recent networking industry, the article analyzes the ARP protocol is given several ways to prevent ARP attack.

    ARP欺骗攻击近来网络行业普遍现象文章通过分析ARP协议给出ARP攻击防范几种方法

    youdao

  • The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.

    其二,分析ARP协议实现细节,采用ARP欺骗技术实现安全加密路由平台原有网络结构的彻底透明

    youdao

  • The paper proposes that the key is to find the ARP deception and solve the ARP deception.

    以更快更好地发现ARP欺骗解决ARP欺骗研究的目的所在。

    youdao

  • To withstand the ARP attacks, an algorithm using an active technique to detect the ARP attacks was proposed.

    为了有效对抗ARP攻击提出一种采用主动检测技术算法

    youdao

  • Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.

    利用数据链路地址解析协议(ARP)可以进行IP冲突ARP欺骗ARP溢出等方式的网络攻击

    youdao

  • We offer a truly close program that prevents ARP attack, receive in every namely implementation ARP is bound above switching equipment calm, and filter drop all and illegal ARP bag.

    我们提出一个真正严密防止ARP攻击方案就是台接入交换机上面实现ARP绑定并且过滤所有非法ARP

    youdao

  • On this foundation, we are again compensatory "log" function and "ARP active defence" function, ARP attack is OK also by perfect settlement.

    基础上我们补充日志功能ARP主动防御”功能,ARP攻击可以完美的解决

    youdao

  • By studying the ARP protocol in depth, this paper implements a software solution for MACIP address binding based on ARP spoof, which can manage hosts from more than one subnet.

    通过深入研究ARP协议ARP欺骗方式实现了主机MAC和IP地址绑定设计了一个可以跨越多个子网进行管理的MAC IP地址绑定软件解决方案。

    youdao

  • ARP processing for incoming ARP packets.

    传入的ARP处理

    youdao

  • Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.

    不同网络环境条件下综合使用三种防范ARP攻击方法南京工业大学有效防御ARP攻击。

    youdao

  • Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.

    不同网络环境条件下综合使用三种防范ARP攻击方法南京工业大学有效防御ARP攻击。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定