10-24-2012
As I recall from my old network engineering days a ping to a broadcast address should be done on the same subnet as the broadcast address, as a general rule. In this case, all the IP addresses on the network will respond for all interfaces configured and operational (and not blocking).
10 More Discussions You Might Find Interesting
1. Cybersecurity
How does ARP take care of uniqueness of physical addresses?
How does an ISP allocate a MAC address when I do not have an NIC( Network interface Card)? (1 Reply)
Discussion started by: ManishSaxena
1 Replies
2. Solaris
Dear all,
We are testing two of our servers for mq series connectivity. The scenario is, when one machine is shutting down it's services there are some scripts that do a dns update, which removes the ip address and relates it to the ip address of the other node on our dns server, and the update... (7 Replies)
Discussion started by: earlysame55
7 Replies
3. IP Networking
Does ARP Request packet Contains MAC Address of dest during broadcast?
I found It So...
When i captured ARP Req Pkts on ethereal...
Rgds
-Meti (1 Reply)
Discussion started by: ashokmeti
1 Replies
4. HP-UX
I was checking nettl output for a unstable telnet to my server. this is part of output:
###
***********************************STREAMS/UX*******************************@#%
Timestamp : Sun Jun 22 EETDST 2008 22:14:47.492899
Process ID : Subsystem ... (4 Replies)
Discussion started by: xramm
4 Replies
5. IP Networking
I'm running an arp -an on a Solaris 10 box. We're using IPMP. One of the systems is not able to see a host on the same network. The only difference between the two systems (one is having a problem, the other isn't) at least so far is the output of arp:
# arp -an | grep 224.55
e1000g5... (1 Reply)
Discussion started by: BOFH
1 Replies
6. Red Hat
Dear All
i have a linux proxy server which has RHEL-5 64 bit, it has two interfaces, it has the following details
eth0=10.200.14.42
eth3=10.201.14.42
default gateway=10.201.14.254
one static route=192.168.0.0/24 gw 10.200.14.254
i am facing a problem when i ping 10.201.14.42 from... (2 Replies)
Discussion started by: surfer24
2 Replies
7. IP Networking
About a week ago a customer hooked up a wireless router backwards to our network, causing it to serve incorrect DHCP addresses to some of them. Our networks are mostly statically assigned so this didn't cause as much damage as it might have, but now, over a week later, I still have incomplete... (1 Reply)
Discussion started by: Corona688
1 Replies
8. UNIX for Advanced & Expert Users
Can someone please explain this output to me. Why doesn't ifconfig show the same info?
~ $ arp -a
? (10.71.0.1) at 00:1b:21:2b:eb:0c on eth0 (4 Replies)
Discussion started by: cokedude
4 Replies
9. IP Networking
Hi, I'm trying to find a way to protect my network against arp spoofing.
What it is:
An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker.
How to protect myself:
In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies
10. IP Networking
Hello,
I have 2 clients with Unix installed.
host1: eth0 (192.168.5.10) & eth1 (192.168.10.10)
host2: eth0 (192.168.10.20)
I've connected host1-eth1 to host2-eth0. host1-eth0 isn't connected.
I started 'tcpdump' on wonder that host2 got ARP requests for 192.168.5.10.
Any idea why host1... (2 Replies)
Discussion started by: daWonderer
2 Replies
LEARN ABOUT DEBIAN
paranoid::network::ipv4
Paranoid::Network::IPv4(3pm) User Contributed Perl Documentation Paranoid::Network::IPv4(3pm)
NAME
Paranoid::Network::IPv4 - IPv4-related functions
VERSION
$Id: IPv4.pm,v 0.1 2012/05/29 21:37:44 acorliss Exp $
SYNOPSIS
use Paranoid::Network::IPv4;
@net = ipv4NetConvert($netAddr);
$rv = ipv4NetIntersect($net1, $net2);
or
use Paranoid::Network::IPv4 qw(:all);
print "Valid IP address
" if $netAddr =~ /^@{[ IPV4REGEX ]}$/;
@net = ipv4NetConvert($netAddr);
$broadcast = $net[IPV4BRDCST];
DESCRIPTION
This module contains a few convenience functions for working with IPv4 addresses.
By default only the subroutines themselves are imported. Requesting :all will also import the constants as well.
SUBROUTINES
/METHODS
ipv4NetConvert
@net = ipv4NetConvert($netAddr);
This function takes an IPv4 network address in string format and converts it into an array containing the base network address, the
broadcast address, and the netmask, in integer format. The network address can have the netmask in either CIDR format or dotted quads.
In the case of a single IP address, the array with only have one element, that of the IP in integer format.
Passing any argument to this function that is not a string representation of an IP address (including undef values) will cause this
function to return an empty array.
ipv4NetIntersect
$rv = ipv4NetIntersect($net1, $net2);
This function tests whether an IP or subnet intersects with another IP or subnet. The return value is essentially boolean, but the true
value can vary to indicate which is a subset of the other:
-1: destination range encompasses target range
0: both ranges do not intersect at all
1: target range encompasses destination range
The function handles the same string formats as ipv4NetConvert, but will allow you to test single IPs in integer format as well.
CONSTANTS
These are only imported if explicity requested or with the :all tag.
MAXIPV4CIDR
Simply put: 32. This is the largest CIDR notation supported in IPv4.
IPV4REGEX
Regular expression: qr/(?:d{1,3}.){3}d{1,3}/sm
You can use this for validating IP addresses as such:
$ip =~ m#^@{[ IPV4REGEX ]}$#;
or to extract potential IPs from extraneous text:
(@ips) = ( $string =~ m#(@{[ IPV4REGEX ]})#gsm);
IPV4CIDRRGX
Regular expression:
qr#(@{[ IPV4REGEX ]})(?:/(d+|@{[ IPV4REGEX ]}))?#sm
By default this will extract an IP or CIDR notation network address:
($net, $mask) = ( $ip =~ m#^@{[ IPV4CIDRRGX ]}$# );
In the case of a simple IP address $mask will be undefined.
IPV4BASE
This is the ordinal index of the base network address as returned by ipv4NetConvert.
IPV4BRDCST
This is the ordinal index of the broadcast address as returned by ipv4NetConvert.
IPV4MASK
This is the ordinal index of the network mask as returned by ipv4NetConvert.
DEPENDENCIES
o Paranoid
o Paranoid::Network::Socket
BUGS AND LIMITATIONS
AUTHOR
Arthur Corliss (corliss@digitalmages.com)
LICENSE AND COPYRIGHT
This software is licensed under the same terms as Perl, itself. Please see http://dev.perl.org/licenses/ for more information.
(c) 2012, Arthur Corliss (corliss@digitalmages.com)
perl v5.14.2 2012-05-29 Paranoid::Network::IPv4(3pm)