Legitimate Usage
ARP spoofing can also be used for legitimate purposes. For instance, network registration tools may redirect unregistered hosts to a signup page before allowing them full access to the network. This technique is used in hotels and other semi-public networks to allow traveling laptop users to access the Internet through a device known as a head end processor (HEP).
ARP spoofing can also be used to implement redundancy of network services. A backup server may use ARP spoofing to take over for a defective server and transparently offer redundancy.
ARP spoofing is often used by developers to debug IP traffic between two hosts when a switch is in use.
Read more about this topic: ARP Spoofing
Famous quotes containing the words legitimate and/or usage:
“What we believe is more important than our material existence, therefore warfare is a legitimate extension of values.”
—Edward Johnson (b. 1915)
“Pythagoras, Locke, Socratesbut pages
Might be filled up, as vainly as before,
With the sad usage of all sorts of sages,
Who in his life-time, each was deemed a bore!
The loftiest minds outrun their tardy ages.”
—George Gordon Noel Byron (17881824)