Vielen Dank nochmal!
Wie/Wo lösche ich den arp-cache eintrag? Ich könnte das natürlich googlen, aber das Netz ist so langsam dass das ewig bräuchte....
hier die erneuten Ausgaben:
ping -c 15 192.168.2.1
PING 192.168.2.1 (192.168.2.1) 56(84) bytes of data.
64 bytes from 192.168.2.1: icmp_seq=1 ttl=64 time=0.429 ms
64 bytes from 192.168.2.1: icmp_seq=2 ttl=64 time=0.444 ms
64 bytes from 192.168.2.1: icmp_seq=3 ttl=64 time=0.394 ms
64 bytes from 192.168.2.1: icmp_seq=4 ttl=64 time=0.399 ms
64 bytes from 192.168.2.1: icmp_seq=5 ttl=64 time=0.422 ms
64 bytes from 192.168.2.1: icmp_seq=6 ttl=64 time=0.420 ms
64 bytes from 192.168.2.1: icmp_seq=7 ttl=64 time=0.362 ms
64 bytes from 192.168.2.1: icmp_seq=8 ttl=64 time=0.365 ms
64 bytes from 192.168.2.1: icmp_seq=9 ttl=64 time=0.360 ms
64 bytes from 192.168.2.1: icmp_seq=10 ttl=64 time=0.357 ms
64 bytes from 192.168.2.1: icmp_seq=12 ttl=64 time=0.365 ms
64 bytes from 192.168.2.1: icmp_seq=13 ttl=64 time=0.406 ms
64 bytes from 192.168.2.1: icmp_seq=14 ttl=64 time=0.381 ms
64 bytes from 192.168.2.1: icmp_seq=15 ttl=64 time=0.365 ms
--- 192.168.2.1 ping statistics ---
15 packets transmitted, 14 received, 6% packet loss, time 13998ms
rtt min/avg/max/mdev = 0.357/0.390/0.444/0.036 ms
sudo tcpdump -vvveni eth0 host 192.168.2.1 and icmp
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
11:20:36.076086 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 33364, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 1, length 64
11:20:36.076501 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27061, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 1, length 64
11:20:37.075089 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 33591, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 2, length 64
11:20:37.075516 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27062, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 2, length 64
11:20:38.074109 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 33722, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 3, length 64
11:20:38.074483 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27063, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 3, length 64
11:20:39.074112 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 33870, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 4, length 64
11:20:39.074491 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27064, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 4, length 64
11:20:40.074112 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34069, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 5, length 64
11:20:40.074514 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27065, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 5, length 64
11:20:41.074109 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34309, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 6, length 64
11:20:41.074509 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27066, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 6, length 64
11:20:42.074107 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34558, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 7, length 64
11:20:42.074449 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27067, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 7, length 64
11:20:43.074110 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34721, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 8, length 64
11:20:43.074456 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27068, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 8, length 64
11:20:44.074108 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34918, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 9, length 64
11:20:44.074448 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27069, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 9, length 64
11:20:45.074102 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34959, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 10, length 64
11:20:45.074442 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27070, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 10, length 64
11:20:46.074112 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 34971, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 11, length 64
11:20:47.074104 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 35045, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 12, length 64
11:20:47.074450 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27071, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 12, length 64
11:20:48.074114 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 35088, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 13, length 64
11:20:48.074500 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27072, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 13, length 64
11:20:49.074108 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 35290, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 14, length 64
11:20:49.074470 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27073, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 14, length 64
11:20:50.074106 bc:5f:f4:36:9a:df > 18:83:bf:04:6f:b6, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 35393, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.2.171 > 192.168.2.1: ICMP echo request, id 3195, seq 15, length 64
11:20:50.074451 18:83:bf:04:6f:b6 > bc:5f:f4:36:9a:df, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 27074, offset 0, flags [none], proto ICMP (1), length 84)
192.168.2.1 > 192.168.2.171: ICMP echo reply, id 3195, seq 15, length 64
^C
29 packets captured
29 packets received by filter
0 packets dropped by kernel
sudo nmap -sU -p 67 --script=dhcp-discover 192.168.2.1
Starting Nmap 6.40 ( http://nmap.org ) at 2015-01-31 11:21 CET
Nmap scan report for 192.168.2.1
Host is up (0.00023s latency).
PORT STATE SERVICE
67/udp open dhcps
| dhcp-discover:
| DHCP Message Type: DHCPACK
| Server Identifier: 192.168.2.1
| Subnet Mask: 255.255.255.0
| Broadcast Address: 192.168.2.255
| Router: 192.168.2.1
|_ Domain Name Server: 192.168.2.1
MAC Address: 18:83:BF:04:6F:B6 (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 13.70 seconds
arp -av
easy.box (192.168.2.1) at 18:83:bf:04:6f:b6 [ether] on eth0
Entries: 1 Skipped: 0 Found: 1
sudo arping -c 10 -w 5 -b -f -I eth0 -s 192.168.2.171 192.168.2.1
ARPING 192.168.2.1 from 192.168.2.171 eth0
Unicast reply from 192.168.2.1 [18:83:BF:04:6F:B6] 0.783ms
Sent 2 probes (2 broadcast(s))
Received 1 response(s)
sudo tcpdump -vvveni any arp
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes
11:22:41.850401 Out bc:5f:f4:36:9a:df ethertype ARP (0x0806), length 44: Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.2.1 (ff:ff:ff:ff:ff:ff) tell 192.168.2.171, length 28
11:22:42.850454 Out bc:5f:f4:36:9a:df ethertype ARP (0x0806), length 44: Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.2.1 (ff:ff:ff:ff:ff:ff) tell 192.168.2.171, length 28
11:22:42.850670 In 18:83:bf:04:6f:b6 ethertype ARP (0x0806), length 62: Ethernet (len 6), IPv4 (len 4), Reply 192.168.2.1 is-at 18:83:bf:04:6f:b6, length 46
^C
3 packets captured
3 packets received by filter
0 packets dropped by kernel