for sorry MK dosent protect users from**-net cut-switch sniffer-big mother-Softperfect Bandwidth Mmanager-wireshark..etc** all of them based on ARP SPOOFING AND POISSOING
any one can help us plz?
you may use static ARP table entries. or ‘reply-only’ mode of interface
you don’t have basics knowledge about networking…start with this
i using already static arp table and it dosent do anything with sniffers and i tried reply only before and it dosent work
thx for that but tell me if you know ya genuis
you can’t protect anything against sniffer unless you encrypt the traffic. or don’t let anyone near others traffic.
Quod erat demonstrandum.
how can i encrypt the traffic although idont use wireless connection..details plz
pppoe, ipsec…
a simple search on google would be enough
See the following post for some ideas that might help you.
http://forum.mikrotik.com/t/32-subnet-mask-to-prevent-arp-spoofing/26921/1
Unfotunately the only way to completely stop the problem while maintaining an open wireless network is if Mikrotik implements a “session-id” connection tracking mechanism to prevent this. I believe this will be a very valuable and necessary enhancement for hotspot implementations since encrypted networks add a level of complexity to hotspot environments that “scare many casual” users to the extent that they simply do not make use of them.
The only other way to completely prevent this problem is to implement an encrypted network which is not ideal in hotspot implementations for the reason detailed above.
With the general availability of tools such as Netcut and other hacker tools this problem is becoming more and more problematic in hotspot environments.