HOTSPOT + ARP POISONING

Scenario is

MT/HOSTPOT = 10.0.0.1
Clients = 10.0.0.x with default gw & dns pointing to MT (i.e 10.0.0.1)

My network is flooded with ARP Poisoning. How can I prevent it to infect my HOTSPOT SERVER without going at every client end, and tell them to load antiarp or provide them with batch file doing static mac-ip entry for server.

I Heared that PPPoE is safe from arp flooding ?

any1?

Set your interfaces/bridges to arp=reply-only, then on your dhcp server set add-arp=yes, and on the wireless interface disable default forwarding. If the arp poisoning is coming from the ethernet network, then set to allow only mac-address per port. PPPoE would be the most secure, but is less convenient.

Is there any tool available through which I can create a ready made PPPoE dialer setup for user. Like in VPN, we have CMAK option which creates custom dialer , users simply install it and enter user id passwd only,

how to find the ARP Poisining,
pls share your method to find it