It can often help prevent ARP-based Man-in-the-Middle attacks.
这种技术常常用于帮助防御基于ARP的中间人攻击。
3
This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.