I have noticed that heplify can capture the packet it sent (HEP3 packet) and encode it and sent another packet. So the packet size will be larger and larger. I know it can be prevented by set a small portrange (not including the port that heplify uses). But is there any other method to prevent this?
I have noticed that heplify can capture the packet it sent (HEP3 packet) and encode it and sent another packet. So the packet size will be larger and larger. I know it can be prevented by set a small portrange (not including the port that heplify uses). But is there any other method to prevent this?