Great Circle Associates Firewalls
(November 1994)
 

Indexed By Date: [Previous] [Next] Indexed By Thread: [Previous] [Next]

Subject: Re: MAC spoofing by non-IP protocols
From: Gregg Rosenberg <gregg @ interaccess . com>
Date: Sun, 6 Nov 1994 23:04:59 -0600 (CST)
To: Howard Berkowitz <hcb @ clark . net>
Cc: renner <renner @ macroint . com>, firewalls @ GreatCircle . COM
In-reply-to: <199411030118 . UAA07618 @ clark . net>



On Wed, 2 Nov 1994, Howard Berkowitz wrote:

> Can anyone cite a need, other than compatibility with older
> software, why we must have them?

Older software is definitely a painfull reality for many years to come.
Some vendors, such as IBM require the use of localy administered 
addresses when you mix third party stacks with theirs.  Due to everyone 
not following the exact same spec.  Ir uf you will IBM deciding to change 
the standard a bit.

-- 
Gregg Rosenberg                          |  Consulting 
Service       
Director of Systems and Technology       |  Education / Training     
Applied Computer Services                |  Demand Printing Service  
gregg @
 acsil .
 com                          |  Graphics Arts Service    
                                                  



References:
Indexed By Date Previous: Re: Concerns about MAC spoofing
From: Gregg Rosenberg <gregg @ interaccess . com>
Next: Re: IP forwarding
From: morgan @ engr . uky . edu (Wes Morgan)
Indexed By Thread Previous: Re: MAC spoofing by non-IP protocols
From: David Miller <isdmill @ gatekeeper . ddp . state . me . us>
Next: Re: Concerns about MAC spoofing
From: Brent @ GreatCircle . COM (Brent Chapman)

Google
 
Search Internet Search www.greatcircle.com