ARP Spoofing - Legitimate Usage

Legitimate Usage

ARP spoofing can also be used for legitimate purposes. For instance, network registration tools may redirect unregistered hosts to a signup page before allowing them full access to the network. This technique is used in hotels and other semi-public networks to allow traveling laptop users to access the Internet through a device known as a head end processor (HEP).

ARP spoofing can also be used to implement redundancy of network services. A backup server may use ARP spoofing to take over for a defective server and transparently offer redundancy.

ARP spoofing is often used by developers to debug IP traffic between two hosts when a switch is in use.

Read more about this topic:  ARP Spoofing

Famous quotes containing the words legitimate and/or usage:

    The policy of dollar diplomacy is one that appeals alike to idealistic humanitarian sentiments, to dictates of sound policy, and strategy, and to legitimate commercial aims.
    William Howard Taft (1857–1930)

    I am using it [the word ‘perceive’] here in such a way that to say of an object that it is perceived does not entail saying that it exists in any sense at all. And this is a perfectly correct and familiar usage of the word.
    —A.J. (Alfred Jules)