arping.8 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. .\" This manpage has been automatically generated by docbook2man
  2. .\" from a DocBook document. This tool can be found at:
  3. .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/>
  4. .\" Please send any bug reports, improvements, comments, patches,
  5. .\" etc. to Steve Cheng <steve@ggi-project.org>.
  6. .TH "ARPING" "8" "24 Mayıs 2011" "iputils-101006" "System Manager's Manual: iputils"
  7. .SH NAME
  8. arping \- send ARP REQUEST to a neighbour host
  9. .SH SYNOPSIS
  10. \fBarping\fR [ \fB-AbDfhqUV\fR] [ \fB-c \fIcount\fB\fR] [ \fB-w \fIdeadline\fB\fR] [ \fB-s \fIsource\fB\fR] \fB-I \fIinterface\fB\fR \fB\fIdestination\fB\fR
  11. .SH "DESCRIPTION"
  12. .PP
  13. Ping \fIdestination\fR on device \fIinterface\fR by ARP packets,
  14. using source address \fIsource\fR.
  15. .SH "OPTIONS"
  16. .TP
  17. \fB-A\fR
  18. The same as \fB-U\fR, but ARP REPLY packets used instead
  19. of ARP REQUEST.
  20. .TP
  21. \fB-b\fR
  22. Send only MAC level broadcasts. Normally \fBarping\fR starts
  23. from sending broadcast, and switch to unicast after reply received.
  24. .TP
  25. \fB-c \fIcount\fB\fR
  26. Stop after sending \fIcount\fR ARP REQUEST
  27. packets. With
  28. \fIdeadline\fR
  29. option, \fBarping\fR waits for
  30. \fIcount\fR ARP REPLY packets, until the timeout expires.
  31. .TP
  32. \fB-D\fR
  33. Duplicate address detection mode (DAD). See
  34. RFC2131, 4.4.1.
  35. Returns 0, if DAD succeeded i.e. no replies are received
  36. .TP
  37. \fB-f\fR
  38. Finish after the first reply confirming that target is alive.
  39. .TP
  40. \fB-I \fIinterface\fB\fR
  41. Name of network device where to send ARP REQUEST packets. This option
  42. is required.
  43. .TP
  44. \fB-h\fR
  45. Print help page and exit.
  46. .TP
  47. \fB-q\fR
  48. Quiet output. Nothing is displayed.
  49. .TP
  50. \fB-s \fIsource\fB\fR
  51. IP source address to use in ARP packets.
  52. If this option is absent, source address is:
  53. .RS
  54. .TP 0.2i
  55. \(bu
  56. In DAD mode (with option \fB-D\fR) set to 0.0.0.0.
  57. .TP 0.2i
  58. \(bu
  59. In Unsolicited ARP mode (with options \fB-U\fR or \fB-A\fR)
  60. set to \fIdestination\fR.
  61. .TP 0.2i
  62. \(bu
  63. Otherwise, it is calculated from routing tables.
  64. .RE
  65. .TP
  66. \fB-U\fR
  67. Unsolicited ARP mode to update neighbours' ARP caches.
  68. No replies are expected.
  69. .TP
  70. \fB-V\fR
  71. Print version of the program and exit.
  72. .TP
  73. \fB-w \fIdeadline\fB\fR
  74. Specify a timeout, in seconds, before
  75. \fBarping\fR
  76. exits regardless of how many
  77. packets have been sent or received. In this case
  78. \fBarping\fR
  79. does not stop after
  80. \fIcount\fR
  81. packet are sent, it waits either for
  82. \fIdeadline\fR
  83. expire or until
  84. \fIcount\fR
  85. probes are answered.
  86. .SH "SEE ALSO"
  87. .PP
  88. \fBping\fR(8),
  89. \fBclockdiff\fR(8),
  90. \fBtracepath\fR(8).
  91. .SH "AUTHOR"
  92. .PP
  93. \fBarping\fR was written by
  94. Alexey Kuznetsov
  95. <kuznet@ms2.inr.ac.ru>.
  96. It is now maintained by
  97. YOSHIFUJI Hideaki
  98. <yoshfuji@skbuff.net>.
  99. .SH "SECURITY"
  100. .PP
  101. \fBarping\fR requires CAP_NET_RAWIO capability
  102. to be executed. It is not recommended to be used as set-uid root,
  103. because it allows user to modify ARP caches of neighbour hosts.
  104. .SH "AVAILABILITY"
  105. .PP
  106. \fBarping\fR is part of \fIiputils\fR package
  107. and the latest versions are available in source form at
  108. http://www.skbuff.net/iputils/iputils-current.tar.bz2.