Other Approaches
Proxying/spoofing
TCP ACK snooping/spoofing
Protocol translation (e.g., WAP)
All violate end-to-end principle
less robust
complicates security
Just say no!
Previous slide
Next slide
Back to first slide
View graphic version