| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | New Z6C |
>
>
>BS> And consider how numerous hardware firewall/router devices (Dlink
>BS> DI-604
>BS> as an example) allow MAC spoofing. They present the MAC address to the
>BS> outside world that you manually enter in it's config. Now that's got to
>BS> be a prime example of MAC address duplication. :)
>
>
> If two (or more) devices present the same MAC address, how does the
> protocol know where to send the packets?
Think of a firewall/router such as the dlink model I referred to as a
border between what I think of as the "outside world" and the
"inside world". The outside world see's the spoofed (duplicated)
MAC address, while the inside world sees the true MAC address. Thus
neither identical MAC address sees itself.
Make sense now?
--- GEcho/32 & IM 2.50
* Origin: http://www.fidonet.ca (1:140/12)SEEN-BY: 633/267 270 5030/786 @PATH: 140/12 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.