Sponsored Content
Full Discussion: ARP address resoluton
Special Forums Cybersecurity ARP address resoluton Post 20828 by Perderabo on Monday 6th of May 2002 07:56:27 AM
Old 05-06-2002
ARP does not take care of address uniqueness. That's not arp's job. It assumes the addresses are unique and will fail if they are not.

Your second question does not compute for me. I would assume that you are running slip or ppp or something like that. If you really have a mutant ISP that is assigning you a MAC address, you need to determine which type of mac address it is. If it's a ethernet address, your ISP could apply for a block of ethernet addresses. The ethernet address has two parts: a manufacturer id and unique address within the manufacturer id. Other lans work the same way.

To support their switchover product, HP would give out ethernet addresses not assigned to any hardware. All of HP's addresses are unique to HP. And it's up to HP to make sure that they don't give out the same address twice.
 

10 More Discussions You Might Find Interesting

1. IP Networking

multiple arp replies

Can someone tell me if I tweak the destination field in an arp request for TCP connection to match it with the the mac addresses of different recivers in an ethernet as the packet passes through them in short each one catches the arp request and replies, what would happen I mean will the sender of... (2 Replies)
Discussion started by: Rakesh Ranjan
2 Replies

2. Solaris

ARP Cache

Dear all, We are testing two of our servers for mq series connectivity. The scenario is, when one machine is shutting down it's services there are some scripts that do a dns update, which removes the ip address and relates it to the ip address of the other node on our dns server, and the update... (7 Replies)
Discussion started by: earlysame55
7 Replies

3. HP-UX

HW Address and arp

I was checking nettl output for a unstable telnet to my server. this is part of output: ### ***********************************STREAMS/UX*******************************@#% Timestamp : Sun Jun 22 EETDST 2008 22:14:47.492899 Process ID : Subsystem ... (4 Replies)
Discussion started by: xramm
4 Replies

4. IP Networking

Modifying ARP frames

Hi All, Is there any way to modify or filter the ARP frames?? thanks! (2 Replies)
Discussion started by: lagigliaivan
2 Replies

5. Red Hat

Arp Problem

Dear All i have a linux proxy server which has RHEL-5 64 bit, it has two interfaces, it has the following details eth0=10.200.14.42 eth3=10.201.14.42 default gateway=10.201.14.254 one static route=192.168.0.0/24 gw 10.200.14.254 i am facing a problem when i ping 10.201.14.42 from... (2 Replies)
Discussion started by: surfer24
2 Replies

6. UNIX for Advanced & Expert Users

arp questions

Can someone please explain this output to me. Why doesn't ifconfig show the same info? ~ $ arp -a ? (10.71.0.1) at 00:1b:21:2b:eb:0c on eth0 (4 Replies)
Discussion started by: cokedude
4 Replies

7. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

8. IP Networking

necessary ARP request?

Hello, I have 2 clients with Unix installed. host1: eth0 (192.168.5.10) & eth1 (192.168.10.10) host2: eth0 (192.168.10.20) I've connected host1-eth1 to host2-eth0. host1-eth0 isn't connected. I started 'tcpdump' on wonder that host2 got ARP requests for 192.168.5.10. Any idea why host1... (2 Replies)
Discussion started by: daWonderer
2 Replies

9. War Stories

What arp -s is good for

A customer appears to have drastically misunderstood our instructions for connecting to our WAN. He set his PC IP address to the same as one of the bridges. :mad: :wall: This caused much confusion on the network, to put it mildly. He called to complain about the poor performance of the network... (13 Replies)
Discussion started by: Corona688
13 Replies

10. Red Hat

[RedHat] ARP issue

Hello, I am setting up a new RedHat server with two network interfaces. These interfaces are on different subnets, and connected to the same firewall. I'm trying to reach a remote IP. It works fine from the first interface. The second interface however, is making ARP requests instead of... (0 Replies)
Discussion started by: Wanou85
0 Replies
ARPWATCH(8)						      System Manager's Manual						       ARPWATCH(8)

NAME
arpwatch - keep track of ethernet/ip address pairings SYNOPSIS
arpwatch [ -dN ] [ -f datafile ] [ -i interface ] [ -n net[/width ]] [ -r file ] [ -s sendmail_path ] [ -p ] [ -a ] [ -m addr ] [ -u username ] [ -R seconds ] [ -Q ] [ -z ignorenet/ignoremask ] DESCRIPTION
Arpwatch keeps track for ethernet/ip address pairings. It syslogs activity and reports certain changes via email. Arpwatch uses pcap(3) to listen for arp packets on a local ethernet interface. The -d flag is used enable debugging. This also inhibits forking into the background and emailing the reports. Instead, they are sent to stderr. The -f flag is used to set the ethernet/ip address database filename. The default is arp.dat. The -i flag is used to override the default interface. The -n flag specifies additional local networks. This can be useful to avoid "bogon" warnings when there is more than one network running on the same wire. If the optional width is not specified, the default netmask for the network's class is used. The -N flag disables reporting any bogons. The -r flag is used to specify a savefile (perhaps created by tcpdump(1) or pcapture(1)) to read from instead of reading from the network. In this case, arpwatch does not fork. (Debian) The -s flag is used to specify the path to the sendmail program. Any program that takes the option -odi and then text from stdin can be substituted. This is useful for redirecting reports to log files instead of mail. (Debian) The -p flag disables promiscuous operation. ARP broadcasts get through hubs without having the interface in promiscuous mode, while saving considerable resources that would be wasted on processing gigabytes of non-broadcast traffic. OTOH, setting promiscuous mode does not mean getting 100% traffic that would concern arpwatch . YMMV. (Debian) -a By default, arpwatch reports bogons (unless -N is given) for IP addresses that are in the same subnet than the first IP address of the default interface. If this option is specified, arpwatch will report bogons about every IP addresses. (Debian) The -m option is used to specify the e-mail address to which reports will be sent. By default, reports are sent to root on the local machine. (Debian) The -u flag instructs arpwatch to drop root privileges and change the UID to username and GID to the primary group of username . This is recommended for security reasons, but username has to have write access to the default directory. (Debian) The -R flag instructs arpwatch to restart in seconds seconds after the interface went down. By default, in such cases arpwatch would print an error message and exit. This option is ignored if either the -r or -u flags are used. (Debian) The -Q flags prevents arpwatch from sending reports by mail. (Debian) The -z flag is used to set a range of ip addresses to ignore (such as a DHCP range). Netmask is specified as 255.255.128.0. Note that an empty arp.dat file must be created before the first time you run arpwatch. REPORT MESSAGES
Here's a quick list of the report messages generated by arpwatch(1) (and arpsnmp(1)): new activity This ethernet/ip address pair has been used for the first time six months or more. new station The ethernet address has not been seen before. flip flop The ethernet address has changed from the most recently seen address to the second most recently seen address. (If either the old or new ethernet address is a DECnet address and it is less than 24 hours, the email version of the report is suppressed.) changed ethernet address The host switched to a new ethernet address. SYSLOG MESSAGES
Here are some of the syslog messages; note that messages that are reported are also sysloged. ethernet broadcast The mac ethernet address of the host is a broadcast address. ip broadcast The ip address of the host is a broadcast address. bogon The source ip address is not local to the local subnet. ethernet broadcast The source mac or arp ethernet address was all ones or all zeros. ethernet mismatch The source mac ethernet address didn't match the address inside the arp packet. reused old ethernet address The ethernet address has changed from the most recently seen address to the third (or greater) least recently seen address. (This is similar to a flip flop.) suppressed DECnet flip flop A "flip flop" report was suppressed because one of the two addresses was a DECnet address. FILES
/var/lib/arpwatch - default directory arp.dat - ethernet/ip address database /usr/share/arpwatch/ethercodes.dat - vendor ethernet block list SEE ALSO
arpsnmp(8), arp(8), bpf(4), tcpdump(1), pcapture(1), pcap(3) AUTHORS
Craig Leres of the Lawrence Berkeley National Laboratory Network Research Group, University of California, Berkeley, CA. The current version is available via anonymous ftp: ftp://ftp.ee.lbl.gov/arpwatch.tar.gz BUGS
Please send bug reports to arpwatch@ee.lbl.gov. Attempts are made to suppress DECnet flip flops but they aren't always successful. Most error messages are posted using syslog. 4th Berkeley Distribution 8 October 2000 ARPWATCH(8)
All times are GMT -4. The time now is 03:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy