{"id":1320,"date":"2018-01-15T10:41:55","date_gmt":"2018-01-15T08:41:55","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1320"},"modified":"2020-06-10T16:40:57","modified_gmt":"2020-06-10T13:40:57","slug":"set-up-static-arp-entry","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/set-up-static-arp-entry\/","title":{"rendered":"Set up static ARP entry"},"content":{"rendered":"<p>This article describes how to create a static ARP entry on Linux and Windows.\u00a0Static ARP entries for important network components in the same Layer 2 segment provide some protection against ARP spoofing.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/set-up-static-arp-entry\/#Ubuntu_Debian\" title=\"Ubuntu \/ Debian\">Ubuntu \/ Debian<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/set-up-static-arp-entry\/#Windows\" title=\"Windows\">Windows<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Ubuntu_Debian\"><\/span><span id=\"Ubuntu.2FDebian\" class=\"mw-headline\">Ubuntu \/ Debian<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In the following example we assume a gateway with the IP address 192.0.2.1 and the MAC address 00: XX: 0C: XX: DD: C1.\u00a0The network interface used is eth0.<\/p>\n<p>To create a static entry for this gateway, a file must be\u00a0<code>\/etc\/network\/if-up.d\/<\/code>created in.\u00a0This must be created as root user.<\/p>\n<p><b>\/etc\/network\/if-up.d\/add-my-static-arp<\/b><\/p>\n<pre>#! \/ Bin \/ sh\r\narp -i eth0 -s 192.0.2.1 00: XX: 0C: XX: DD: C1\r\n<\/pre>\n<p>After that the executable bit has to be set for this file.<\/p>\n<pre>chmod + x \/etc\/network\/if-up.d\/add-my-static-arp\r\n<\/pre>\n<p><code>ifup<\/code>The static entry is active\u00a0from the next\u00a0network interface.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Windows\"><\/span><span id=\"Windows\" class=\"mw-headline\">Windows<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In the following example we assume a gateway with the IP address 192.0.2.1 and the MAC address 00: XX: 0C: XX: DD: C1.\u00a0The network interface is &#8220;Local Area Connection&#8221;.<\/p>\n<p>In Windows Server 2008, the tool can be used\u00a0<code><b>netsh<\/b><\/code>for configuration.\u00a0This keeps the entries even after a reboot.<\/p>\n<p>To do this, start the command line and log in as administrator:<\/p>\n<pre>runas \/ user: Administrator netsh\r\n\r\nnetsh&gt; interface\r\nnetsh interface&gt; ipv4\r\nnetsh interface ipv4&gt; add neighbors \"Local Area Connection\" \"192.0.2.1\" \"00-XX-0C-XX-DD-C1\" store = persistent\r\n\r\nnetsh interface ipv4&gt; show neighbors\r\n\r\nInterface 1: Loopback Pseudo-Interface 1\r\n\r\n\r\nInternet Address Physical Address Type\r\n-------------------------------------------- ------ ----------- -----------\r\n224.0.0.22 Permanent\r\n\r\nInterface 11: Local Area Connection\r\n\r\n\r\nInternet Address Physical Address Type\r\n-------------------------------------------- ------ ----------- -----------\r\n192.0.2.1 00-xx-0c-xx-dd-c1 Permanent\r\n...\r\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>This article describes how to create a static ARP entry on Linux and Windows.\u00a0Static ARP entries for important network components in the same Layer 2 segment provide some protection against ARP spoofing. Ubuntu \/ Debian In the following example we assume a gateway with the IP address 192.0.2.1 and the<\/p>\n","protected":false},"author":4,"featured_media":1321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[3],"tags":[],"class_list":["post-1320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial-how-to"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/network_ARP_example.gif?fit=761%2C351&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-li","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1299,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/network-configuration-in-debian\/","url_meta":{"origin":1320,"position":0},"title":"Network configuration in Debian","author":"Daniel Draga","date":"January 8, 2018","format":false,"excerpt":"This article gives an overview of how the\u00a0network\u00a0configuration in\u00a0Debian\u00a0can be stored and modified\u00a0in the configuration file\u00a0\/ etc \/ network \/ interfaces\u00a0. Automatic activation at startup In order for certain interfaces to be activated automatically during the boot process, these must be entered with the auto parameter in the configuration file.The\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/debian7_xfce4_desktop.png?fit=1200%2C682&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/debian7_xfce4_desktop.png?fit=1200%2C682&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/debian7_xfce4_desktop.png?fit=1200%2C682&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/debian7_xfce4_desktop.png?fit=1200%2C682&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/debian7_xfce4_desktop.png?fit=1200%2C682&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3599,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-suricata-on-ubuntu-22-04\/","url_meta":{"origin":1320,"position":1},"title":"How to install Suricata on Ubuntu 22.04","author":"George B.","date":"June 22, 2023","format":false,"excerpt":"Introduction We will walk you through the installation of Suricata on Ubuntu 22.04 to ensure that you have a strong network defense mechanism in place. We'll go over everything from updating system packages to configuring Suricata and automating its startup. By the end of this guide, you will have a\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-Suricata-on-Ubuntu-22.04.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-Suricata-on-Ubuntu-22.04.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-Suricata-on-Ubuntu-22.04.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":792,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/stopping-malware-propagation\/","url_meta":{"origin":1320,"position":2},"title":"Stopping malware propagation","author":"Daniel Draga","date":"December 8, 2016","format":false,"excerpt":"The use of mobile devices in our everyday lives has become widespread. In recent years, the number of smartphones sold globally has surpassed the number of desktop computers sold. Malware authors have followed this and developed sophisticated malware addressed both at the mobile device platforms as well as desktop platforms.\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1098,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/connect\/","url_meta":{"origin":1320,"position":3},"title":"Connect","author":"Daniel Draga","date":"October 10, 2017","format":false,"excerpt":"Series:\u00a0Introduction to the MEAN Stack Part 1: Definition of the MEAN stack Part 2:\u00a0Setup of the MEAN stack Part 3:\u00a0Node.js Part 4:\u00a0npm Part 5:\u00a0Connect Part 6:\u00a0Express Part 7:\u00a0MongoDB Part 8:\u00a0Mongoose Part 9:\u00a0REST Part 10:\u00a0Baucis Part 11:\u00a0Bower Part 12:\u00a0AngularJS Part 13:\u00a0Restangular Connect\u00a0is a node framework\u00a0http\u00a0that builds\u00a0on the previously introduced\u00a0module and is\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/building-mvc-nodejs-apps-with-couchbase-server-couchbase-connect-2015-4-638.jpg?fit=638%2C359&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/building-mvc-nodejs-apps-with-couchbase-server-couchbase-connect-2015-4-638.jpg?fit=638%2C359&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/building-mvc-nodejs-apps-with-couchbase-server-couchbase-connect-2015-4-638.jpg?fit=638%2C359&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1253,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/","url_meta":{"origin":1320,"position":4},"title":"Unlock full-encrypted system via SSH","author":"Daniel Draga","date":"November 9, 2017","format":false,"excerpt":"A complete encryption of your own system is an excellent way to ensure the confidentiality of your own data.\u00a0The current Ubuntu installer offers a guided installation to encrypt the entire system with \"\u00a0encrypted LVMs\u00a0\".\u00a0For both the automated installation and the manual way, there are numerous detailed guides that explain the\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/dropbear-logo-walking_700_726_FFFFFF_c1.jpg?fit=700%2C726&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/dropbear-logo-walking_700_726_FFFFFF_c1.jpg?fit=700%2C726&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/dropbear-logo-walking_700_726_FFFFFF_c1.jpg?fit=700%2C726&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/dropbear-logo-walking_700_726_FFFFFF_c1.jpg?fit=700%2C726&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":913,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-set-up-a-firewall-with-ufw-on-ubuntu-16-04\/","url_meta":{"origin":1320,"position":5},"title":"How To Set Up a Firewall with UFW on Ubuntu 16.04","author":"Daniel Draga","date":"April 30, 2017","format":false,"excerpt":"Introduction UFW, or Uncomplicated Firewall,it\u2019s an interface to iptables , which simplifies the process of configuring a firewall.It\u2019s an difficulty for the beginners to learn how to use it to properly configure a firewall.Because iptables is a solid and flexible tool If you're looking to get started securing your network,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/04\/UFW-Firewall.jpeg?fit=320%2C240&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1320"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1320\/revisions"}],"predecessor-version":[{"id":1322,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1320\/revisions\/1322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1321"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}