Address Resolution Protocol (ARP)
- ARP translates Layer 3 IP addresses to Layer 2 MAC addresses - essential for local network communication since Ethernet frames require MAC addresses for delivery
- Works only within the same broadcast domain (subnet) - cannot resolve MAC addresses across routers
- Uses broadcast requests and unicast replies to build and maintain ARP tables on each device
ARP Process Flow
- Host needs to send data to IP address but only knows the IP, not the MAC address
- Host checks local ARP table first (cache lookup)
- If no entry exists, host sends ARP Request broadcast (FF:FF:FF:FF:FF:FF) asking “Who has IP X.X.X.X?”
- Target device responds with ARP Reply unicast containing its MAC address
- Requesting host updates ARP table and can now send the original data frame
ARP Message Types
| Type | Description | Destination | Purpose |
|---|---|---|---|
| ARP Request | Broadcast message | FF:FF:FF:FF:FF:FF | “Who has this IP address?” |
| ARP Reply | Unicast response | Specific MAC | “I have that IP, here’s my MAC” |
ARP Table Management
- Entries are dynamically learned and cached locally on each device
- Default aging timer: 20 minutes for Cisco devices (can be modified)
- Static ARP entries can be manually configured (never age out)
- Table size limited by device memory - older entries removed when full
Viewing ARP Information
show arp- displays ARP table on Cisco devicesarp -a- Windows/Linux command to view local ARP cache- Entries show IP address, MAC address, interface, and age
Vocabulary
- ARP Cache/Table: Local storage of IP-to-MAC address mappings on each device
- Gratuitous ARP: Unsolicited ARP announcement sent when device boots or IP changes
- Proxy ARP: Router responds to ARP requests on behalf of devices on different subnets
- ARP Aging: Process of removing old entries from ARP table after timeout period
Security Considerations
- ARP has no authentication mechanism - devices trust any ARP reply received
- Vulnerable to ARP spoofing/poisoning attacks where malicious device claims another’s IP
- ARP storms can occur in poorly designed networks with loops
- Used in man-in-the-middle attacks on local networks
Notes
- ARP is only used for IPv4 - IPv6 uses Neighbor Discovery Protocol (NDP) instead
- No ARP traffic crosses routers - each subnet maintains its own ARP communications
- Switches learn MAC addresses from ARP traffic to populate their CAM tables
- High ARP traffic can indicate network issues, loops, or security problems