Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. DHCP snooping - Wikipedia

    en.wikipedia.org/wiki/DHCP_snooping

    In computer networking, DHCP snooping is a series of techniques applied to improve the security of a DHCP infrastructure. [1] DHCP servers allocate IP addresses to clients on a LAN. DHCP snooping can be configured on LAN switches to exclude rogue DHCP servers and remove malicious or malformed DHCP traffic.

  3. Dynamic Host Configuration Protocol - Wikipedia

    en.wikipedia.org/wiki/Dynamic_Host_Configuration...

    v. t. e. The Dynamic Host Configuration Protocol ( DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture. [1]

  4. MAC-Forced Forwarding - Wikipedia

    en.wikipedia.org/wiki/MAC-Forced_Forwarding

    When a host tries to access the network through a switch port, DHCP snooping checks the host’s IP address against the database to ensure that the host is valid. MACFF then uses DHCP snooping to check whether the host has a gateway Access Router. If it does, MACFF uses a form of Proxy ARP to reply to any ARP requests, giving the router's MAC ...

  5. IGMP snooping - Wikipedia

    en.wikipedia.org/wiki/IGMP_snooping

    IGMP snooping is designed to prevent hosts on a local network from receiving traffic for a multicast group they have not explicitly joined. It provides switches with a mechanism to prune multicast traffic from links that do not contain a multicast listener (an IGMP client). Essentially, IGMP snooping is a layer 2 optimization for the layer 3 IGMP.

  6. Rogue DHCP - Wikipedia

    en.wikipedia.org/wiki/Rogue_DHCP

    Rogue DHCP. A rogue DHCP server is a DHCP server on a network which is not under the administrative control of the network staff. It is a network device such as a modem or a router connected to the network by a user who may be either unaware of the consequences of their actions or may be knowingly using it for network attacks such as man in the ...

  7. Spoofing attack - Wikipedia

    en.wikipedia.org/wiki/Spoofing_attack

    Spoofing attack. In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. [1]

  8. IP address spoofing - Wikipedia

    en.wikipedia.org/wiki/IP_address_spoofing

    An intrusion detection system (IDS) is a common use of packet filtering, which has been used to secure the environments for sharing data over network and host-based IDS approaches. [citation needed] It is also recommended to design network protocols and services so that they do not rely on the source IP address for authentication. Upper layers

  9. Internet Group Management Protocol - Wikipedia

    en.wikipedia.org/wiki/Internet_Group_Management...

    e. The Internet Group Management Protocol ( IGMP) is a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral part of IP multicast and allows the network to direct multicast transmissions only to hosts that have requested them.