… | |
… | |
40 | make it work. |
40 | make it work. |
41 | |
41 | |
42 | =item MAC-BASED SECURITY |
42 | =item MAC-BASED SECURITY |
43 | |
43 | |
44 | Since every host has it's own private key, other hosts cannot spoof |
44 | Since every host has it's own private key, other hosts cannot spoof |
45 | traffic from this host. That makes it possible to filter packest by MAC |
45 | traffic from this host. That makes it possible to filter packet by MAC |
46 | address, e.g. to ensure that packets from a specific IP address come, in |
46 | address, e.g. to ensure that packets from a specific IP address come, in |
47 | fact, from a specific host. |
47 | fact, from a specific host that is associated with that IP and not from |
|
|
48 | another host. |
48 | |
49 | |
49 | =back |
50 | =back |
50 | |
51 | |
51 | =head1 PROGRAMS |
52 | =head1 PROGRAMS |
52 | |
53 | |