I ran into the IP device tracking issue where clients/servers were seeing duplicate IP addresses. My question is, would turning off gratuitous ARP resolve the issue? It seems to me like the server sends out an ARP packet and receives a response from my switch. Is that what is causing the issue? I have seen posts where people are disabling IPDT with nmsp attach suppress, or ip device tracking maximum 0.
How would turning off gratuitous ARP on a layer 2 switch effect the network? It seems to me like we really don't need or want gratuitous ARP on, and that would also resolve the duplicate ip address detection problem. I look forward to any comments.
i havent tested this so i cant be sure but reading your post and checking against others it looks like a similar issue is known and there is a workaround , the link i provided earlier shows something related
The 'keepalive' probe sent by the switch is a L2 check. As such from the switch's point of view, the IP addresses used as source in the ARPs are not important: this feature can be used on devices with no IP address configured at all, so the IP source of 0.0.0.0 is not relevant.
When the host receives this messages, it replies back and populates the destination IP field with the only IP address available in the received packet, which is its own IP address. This can cause false duplicate IP address alerts, because the host that replies sees its own IP address as both the source and the destination of the packet; refer to the Duplicate IP Address 0.0.0.0. Error Message Troubleshoot article for more information about the duplicate IP address scenario.
Then it links off to this document explaining the duplication further
The OSPF Type-2 LSA is one of the misunderstanding LSA among all the popular LSAs in OSPF , most people learns that this kind of LSA (Type-2) is generated by DR the Designated Router in a broadcast segment, for example when two or more than two routers ar...
Table of Contents
RADIUS has been the de-facto protocol for Remote Access Authentication for decades. RADIUS/UDP as defined by RFC 2865 has traditionally used MD5 for authentication and integrity. Unfortunately, successful attacks ...
Since 2008, the ASR 1000 platforms have dramatically changed the WAN edge router’s capabilities. With its very own QuantumFlow Processor (QFP) innovation, the data plane was powered to offer advanced scalable services along with high performance. Fast for...
Traditionally Cisco has used several different methods for storing passwords and keys in IOS. The older methods are Type 5 (MD5 hash) & Type7 (Vigenere obfuscation). We enabled Type 7 encryption with the CLI service password-encryption...
AI spoofing detection is a feature in AI Endpoint Analytics released in Cisco DNA Center v126.96.36.199, that identifies endp...