A security administrator receives reports that several workstations are unable to access resources within one network segment. A packet capture shows the segment is flooded with ICMPv6 traffic from the source fe80::21ae:4571:42ab:1fdd and for the destination ff02::1. Which of the following should the security administrator integrate into the network to help prevent this from occurring?
EdmundA
1 year, 7 months agovorozco
3 years, 4 months agovorozco
3 years, 4 months agoquagga
3 years, 7 months agockr8
3 years, 9 months agoSoniSoni
3 years, 11 months agoD1960
4 years, 1 month agoD1960
4 years, 2 months ago