Method, system and switch for preventing MAC address spoofing
A MAC address and switch technology, applied in the field of data products, to achieve the effect of ensuring network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. In the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, not to limit the present invention.
[0036] In order to prevent MAC address spoofing attacks in the IPv6 network, in the technical solution of the embodiment of the present invention, a binding state table formed by information such as IP, MAC address, access port, and time-to-live of each access user is established on the switch (Binding State Table, BST), the BST entry is not a static configuration entry, but a dynamic entry with state transitions. When processing user packets, use the BST tabl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 