Legitimate Usage
ARP spoofing can also be used for legitimate purposes. For instance, network registration tools may redirect unregistered hosts to a signup page before allowing them full access to the network. This technique is used in hotels and other semi-public networks to allow traveling laptop users to access the Internet through a device known as a head end processor (HEP).
ARP spoofing can also be used to implement redundancy of network services. A backup server may use ARP spoofing to take over for a defective server and transparently offer redundancy.
ARP spoofing is often used by developers to debug IP traffic between two hosts when a switch is in use.
Read more about this topic: ARP Spoofing
Famous quotes containing the words legitimate and/or usage:
“The policy of dollar diplomacy is one that appeals alike to idealistic humanitarian sentiments, to dictates of sound policy, and strategy, and to legitimate commercial aims.”
—William Howard Taft (18571930)
“I am using it [the word perceive] here in such a way that to say of an object that it is perceived does not entail saying that it exists in any sense at all. And this is a perfectly correct and familiar usage of the word.”
—A.J. (Alfred Jules)