Visit Our UNIX and Linux User Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #885
Difficulty: Easy
Denial of service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.
True or False?
Linux & Unix Commands - Search Man Pages

arping(8) [centos man page]

ARPING(8)						 System Manager's Manual: iputils						 ARPING(8)

NAME
arping - send ARP REQUEST to a neighbour host SYNOPSIS
arping [-AbDfhqUV] [-c count] [-w deadline] [-s source] -I interface destination DESCRIPTION
Ping destination on device interface by ARP packets, using source address source. OPTIONS
-A The same as -U, but ARP REPLY packets used instead of ARP REQUEST. -b Send only MAC level broadcasts. Normally arping starts from sending broadcast, and switch to unicast after reply received. -c count Stop after sending count ARP REQUEST packets. With deadline option, arping waits for count ARP REPLY packets, until the timeout expires. -D Duplicate address detection mode (DAD). See RFC2131, 4.4.1. Returns 0, if DAD succeeded i.e. no replies are received -f Finish after the first reply confirming that target is alive. -I interface Name of network device where to send ARP REQUEST packets. -h Print help page and exit. -q Quiet output. Nothing is displayed. -s source IP source address to use in ARP packets. If this option is absent, source address is: o In DAD mode (with option -D) set to 0.0.0.0. o In Unsolicited ARP mode (with options -U or -A) set to destination. o Otherwise, it is calculated from routing tables. -U Unsolicited ARP mode to update neighbours' ARP caches. No replies are expected. -V Print version of the program and exit. -w deadline Specify a timeout, in seconds, before arping exits regardless of how many packets have been sent or received. In this case arping does not stop after count packet are sent, it waits either for deadline expire or until count probes are answered. SEE ALSO
ping(8), clockdiff(8), tracepath(8). AUTHOR
arping was written by Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>. It is now maintained by YOSHIFUJI Hideaki <yoshfuji@skbuff.net>. SECURITY
arping requires CAP_NET_RAW capability to be executed. It is not recommended to be used as set-uid root, because it allows user to modify ARP caches of neighbour hosts. AVAILABILITY
arping is part of iputils package and the latest versions are available in source form at http://www.skbuff.net/iputils/iputils-cur- rent.tar.bz2. iputils-121221 10 June 2014 ARPING(8)

Check Out this Related Man Page

arpsend(8)							    Containers								arpsend(8)

NAME
arpsend - send ARP requests SYNOPSIS
arpsend -D -e target_ip [ -e target_ip ...] [-c count] [-w timeout] interface arpsend -U -i source_ip [-c count] [-w timeout] interface DESCRIPTION
Utility arpsend sends ARP packets on device interface to detect or update neighbours' ARP caches with a given IP. COMMANDS
Run utility with one of the following commands: -D Send broadcast ARP request to detect neighbours with target_ip. You have to specify target_ip (-e option). -U Send broadcast ARP request to update neighbours' ARP caches with source_ip. You have to specify source_ip (-i option). OPTIONS
-c count Number of packets to send. Default is infinity. -w interval Interval between packets, in seconds. Default is 1 second. -i source_ip_address Set source IP address field in ARP packet. -e target_ip_address Set target IP address field in ARP packet. Note that you can specify -e option multiple times to detect many IP addresses in one utility call. EXIT STATUS
arpsend returns 0 upon successful execution. If something goes wrong, it returns an appropriate error code. 1 EXC_USAGE Usage error 2 EXC_SYSTEM System error 3 EXC_RECV ARP reply was received EXAMPLES
To send request on interface eth0 to detect any neighbour computers with IP 192.168.10.200: arpsend -D -e 192.168.10.200 eth0 To send request on interface eth0 to update neighbours' ARP caches with IP 192.168.10.200: arpsend -U -i 192.168.10.200 eth0 NOTES
Interface you use have to be arpable and not be loopback (i.e. /sbin/ip link show interface should show neither NOARP nor LOOPBACK flags in interface parameters). SEE ALSO
vzctl(8). LICENSE
Copyright (C) 2000-2011, Parallels, Inc. Licensed under GNU GPL. OpenVZ 28 Jun 2011 arpsend(8)

Featured Tech Videos