Legitimate Usage
ARP spoofing can also be used for legitimate purposes. For instance, network registration tools may redirect unregistered hosts to a signup page before allowing them full access to the network. This technique is used in hotels and other semi-public networks to allow traveling laptop users to access the Internet through a device known as a head end processor (HEP).
ARP spoofing can also be used to implement redundancy of network services. A backup server may use ARP spoofing to take over for a defective server and transparently offer redundancy.
ARP spoofing is often used by developers to debug IP traffic between two hosts when a switch is in use.
Read more about this topic: ARP Spoofing
Famous quotes containing the words legitimate and/or usage:
“The media no longer ask those who know something ... to share that knowledge with the public. Instead they ask those who know nothing to represent the ignorance of the public and, in so doing, to legitimate it.”
—Serge Daney (19441992)
“...Often the accurate answer to a usage question begins, It depends. And what it depends on most often is where you are, who you are, who your listeners or readers are, and what your purpose in speaking or writing is.”
—Kenneth G. Wilson (b. 1923)