[168230] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Proxy ARP detection

daemon@ATHENA.MIT.EDU (Clay Fiske)
Wed Jan 15 19:24:37 2014

From: Clay Fiske <clay@bloomcounty.org>
In-Reply-To: <20140116000331.GG67472@burnout.tpb.net>
Date: Wed, 15 Jan 2014 16:24:19 -0800
To: Niels Bakker <niels=nanog@bakker.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jan 15, 2014, at 4:03 PM, Niels Bakker <niels=3Dnanog@bakker.net> =
wrote:

> * clay@bloomcounty.org (Clay Fiske) [Thu 16 Jan 2014, 00:59 CET]:
>> This is where theory diverges nicely from practice. In some cases the =
offender broadcast his reply, and guess what else? A lot of routers =
listen to unsolicited ARP replies.
>=20
> I've never seen this.  Please name vendor and product, if only so =
other subscribers to this list can avoid doing business with them.

This was some time ago, but the two I was able to dig up from that case =
were both Junipers. Perhaps it=92s something that only happens when =
proxy ARP is enabled?


-c



home help back first fref pref prev next nref lref last post