Disable no gratuitous ARP request.
关闭没有必要的ARP请求。
When a networked device sends an ARP request, it simply trusts that when the ARP reply comes in, it really does come from the correct device.
当一个网络中的设备发出去一个广播ARP请求时,它只是简单的相信当收到一个ARP响应时,这个响应真的是来自正确的设备(因为按照协议只有IP地址对应的设备才会发出相应报文,译者注)。
A gratuitous ARP request is sent on all virtual Ethernet adapters to update the ARP caches on all external switches and systems on the network.
一个ARP请求被发送到所有虚拟以太网,从而更新网络上所有外部交换机和系统上的ARP缓存。
In fact, many operating systems implement ARP so trustingly that devices that have not made an ARP request still accept ARP replies from other devices.
实际上,许多操作系统实现ARP时都是尽管没有发出任何ARP请求但仍然接受来自其他设备的ARP响应。
The hacker begins by sending a malicious ARP "reply" (for which there was no previous request) to your router, associating his computer's MAC address with 192.168.0.12 (see Diagram 3).
黑客先发送一个恶意的ARP “响应” (因为在此之前根本没有请求)到你的路由器,将他的计算机的MAC地址和192.168.0.12绑定 (如图3).
The printer recognizes its own IP in the request and sends an ARP Reply: "Hey, my IP address is 192."168.0.45.
这台打印机发现它的IP地址就是请求里的IP地址,于是它发送一个ARP响应:“嘿,我的IP地址是192.”168.0.45。
All hosts receive the request and the frame is passed up to ARP.
所有的主机都收到这个请求,而且帧被送达地址解析协议。
All hosts receive the request and the frame is passed up to ARP.
所有的主机都收到这个请求,而且帧被送达地址解析协议。
应用推荐