When you connect to the internet, you get a logical identifier for your device called an IP address. However, for actual communication to happen within a local area network, the MAC address of a device is needed.
The Address Resolution Protocol (ARP) is a fundamental network communication protocol used within LANs to discover the MAC address of a device using its known IP address. The ARP protocol operates at the Data Link layer of the OSI model.
Various IT roles — network administrators, cybersecurity analysts, system administrators, IT technicians, and penetration testers — need to have a good understanding of this concept.
Let’s take a look.
In the early 1980s, Ethernet was becoming a popular local area network (LAN) technology operating at the Data Link layer, dealing with MAC addresses. Meanwhile, TCP/IP operated at the Network layer, using IP addresses.
Because of this separation, a dynamic solution was required to resolve and maintain IP-to-MAC address associations. Developed in 1982 by researchers David C. Plummer and Bill Simpson, ARP was introduced to map IP addresses to MAC addresses in local networks.
Local area networks (LANs) are a very common network configuration. The following image shows a LAN where Machine A wants to communicate with Machine B.
Using this example, let's understand how ARP works.
Here, Machine A wants to communicate with Machine B. Suppose Machine A already knows the IP address of Machine B. However, for this communication to take place, Machine A still needs Machine B’s MAC address.
Machine A will first look at its internal list — called the ARP cache — to see if Machine B’s IP address has a matching MAC address. If no entries are found, Machine A can use the known IP address of Machine B to locate the specific device on the network.
To do that, Machine A will send out a broadcast message to all the machines on the network, asking every device which machine has this particular IP address and requesting its associated MAC address.
The machine with the matching IP address will respond back and share its MAC address with Machine A. Once Machine A receives Machine B’s MAC address, communication can take place.
Based on the above example, I’ve translated how ARP works into these clear steps.
Step 1: Initial cache check. When a sender wishes to communicate with a receiver, it first checks its ARP cache to determine if it already contains the MAC address associated with the receiver’s IP address. If the MAC address is present, communication proceeds directly using that address.
Step 2: Preparing the ARP request. If the MAC address is not in the cache, the sender prepares an ARP request. This packet includes the sender’s MAC and IP addresses, with the receiver's IP address specified and the MAC address field left blank as it is unknown.
Step 3: Broadcasting the ARP request. The sender then broadcasts this ARP request across the local area network. Every device connected to the LAN receives this broadcast.
Step 4: ARP request evaluation by LAN devices. Upon receiving the ARP request, all the device compares the requested IP address by the host with its own.
Step 5: Responding to the ARP request. The device that contains the matching IP address prepares an ARP reply. This unicast message, containing both its IP and MAC addresses, is sent directly back to the sender.
Step 6: Updating the ARP cache. Once the sender receives this ARP reply, it updates its ARP cache with the new MAC address information. This update allows the sender to communicate directly with the receiver using the resolved MAC address.
Step 7: Communication. With the MAC address now known and recorded in the ARP cache, the sender can send data packets directly to the receiver.
The following image shows the main components that an ARP message consists of.
We can recognize different types of ARP based on how they have been implemented and the use cases they have in different scenarios.
Dynamic ARP entries are commonly used in local area networks (LANs). These entries are automatically created and managed by the ARP protocol during normal network communication.
These entries have a limited lifespan and will expire after a certain period if not used again.
Network administrators use Static ARP when they want to manually set fixed IP-to-MAC address mappings. These entries do not expire or get affected by the typical updating processes of dynamic ARP.
This stability increases security and is particularly useful in preventing ARP spoofing attacks.
Proxy ARP enables a Layer 3 device, such as a router, to respond to ARP requests on behalf of another device that is on a different subnet. This method involves the router mapping its own MAC address to the IP address of the target device, thereby misleading the sender into believing it has reached its intended destination directly.
Network administrators commonly use proxy ARP to:
Gratuitous ARP is a proactive broadcast by a device to update other devices on the network about its IP-to-MAC address mapping. Gratuitous ARP has two purposes:
When a device broadcasts a Gratuitous ARP request for its own IP address, if no responses are received, it confirms that no other device is using the same IP. However, if a response is received, it indicates that another device is using that IP which leads to address conflicts.
Thus, Gratuitous ARP helps maintain network integrity and prevent IP address duplication.
Advantages | Challenges |
Increases the efficiency of network communication by translating IP addresses to MAC addresses. | Susceptible to security vulnerabilities such as ARP spoofing. |
Automatically updates its cache to adapt to network changes. | ARP requests can lead to network congestion, especially in large networks. |
ARP enables dynamic mapping between IP and MAC addresses. This simplifies network administration and allows easy addition or removal of devices without manual setup. | Lacks mechanisms to authenticate and verify device identities. |
The IP-to-MAC address mappings feature of ARP helps network administrators identify and resolve connectivity issues. |
(Related reading: network monitoring, the network operations center & network security.)
There is a set of ARP commands that can be used to deal with the ARP cache. Network administrators need to know these commands as they help diagnose and resolve network connectivity issues related to ARP.
Here are some ARP commands:
User:>arp
This command displays the cache, including the IP address, physical address, and type of each entry in the cache.
User:>arp -s 172.16.1.10 00-11-55-33-66-44
Use the -s option to add an entry to the cache.
User:>arp -d 172.16.1.10
Here -d option is used to delete an entry available in the cache.
User:>arp -a
Here -a option displays the machine’s ARP cache. The output lists IP addresses, MAC addresses, and the type of each entry which can be either dynamic or static.
I mentioned ARP Spoofing earlier. Common in man in the middle attacks, ARP spoofing is a technique where attackers intercept communication between network devices. In this scenario, an attacker who has access to the network will send false ARP messages. The purpose is to link their own MAC address with the IP address of a device on the network.
By using this technique, attackers can misdirect data meant for another device to their own device. Attackers could use this method to steal sensitive information like login details.
Despite its major role in facilitating communication between devices, ARP also brings the challenge of ARP spoofing. To avoid and mitigate such issues, all relevant parties working with ARP need to follow best practices and use ARP security appliances and software to monitor ARP traffic and ensure its security.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.