(In a local area network, the IP address is converted into a second-layer physical address (ie, a MAC address) through the ARP protocol. The ARP protocol has extremely important implications for network security. Hosts implement ARP spoofing by fabricating IP addresses and MAC addresses, and can generate a lot of ARP traffic in the network to block the network. This article gives everyone a clear understanding of this attack method through a classic analysis case.)