rarpd - Reverse address resolution protocol (RARP) daemon
/usr/sbin/rarpd [interface] [-v] [-n] [-f filename]
Specifies the system's network interface. Causes rarpd to
operate in verbose mode. This option logs details of RARP
to syslog. The instance of a RARP request and its response
are also logged. Disables checking of the ethers(4) file.
By default, rarpd checks the ethers file once every ten
minutes, and, if the file was modified, rarpd rereads the
file. If you specify the -n option rarpd scans the
/etc/ethers file once at startup time. Reads an alternate
Ethernet address file.
The rarpd daemon maps the Ethernet address of a machine to
the machine's Internet Protocol (IP) address.
When rarpd is invoked, it reads the /etc/ethers file (by
default) and waits to process a RARP request. The
/etc/ethers file is checked every ten minutes for any
changes. If the file has been modified, rarpd reads it
again. You can disable this feature with the -n option.
You can force a scan of the /etc/ethers file by sending
the rarpd daemon a SIGHUP signal. See signal(2) for more
information on SIGHUP.
The format of the /etc/ethers file is described in
ethers(4). You can specify a file other than /etc/ethers
with the -f option. The interface is the network interface
on which the rarpd daemon should listen. The command
netstat -i shows the correct interface or interfaces for
your system. The rarpd daemon uses the first interface it
finds, if you do not specify an interface. See the netstat(1) reference page for more information.
Because the rarpd daemon has been implemented with the
Ethernet Packet Filter (see packetfilter(7)), you must
configure your kernel with the packet filter option in
order for rarpd to function properly. The packet filter
detects RARP broadcast packets and passes them to rarpd
for processing. The filter priority for rarpd is set to
All messages from the rarpd daemon are directed to syslog.
The rarpd daemon ignores all ARP requests sent encapsulated
within a RARP packet. ARP requests are handled
directly by the kernel.
The machine for which an IP address is being requested
must be present in the server's /etc/hosts file.
If the Packet Filter is not configured in your kernel, the
following message is displayed on the console window and
logged to syslog: PACKETFILTER is not configured in /vmunix
Database that maps Ethernet addresses to hostnames
Commands: arp(8), ifconfig(8), syslogd(8)
Files: ethers(4), hosts(4), packetfilter(7)
[ Back ]