next up previous contents
Next: Automation Up: ARP Spoofing Previous: Activation

Deactivation

Once the existing server is ready to be used again it is simply a matter of removing the additional interface on the backup server and stopping ARP spoofing. Finally additional spoofed ARP packets are sent out pointing the existing servers IP address back to the original hardware address.



Horms
1998-04-13