home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.dcom.sys.cisco
- Path: sparky!uunet!usc!elroy.jpl.nasa.gov!sdd.hp.com!saimiri.primate.wisc.edu!caen!spool.mu.edu!agate!boulder!recnews
- From: Donald R. Proctor (510/596-3828) <sybase!donp@Sun.COM>
- Subject: Re: ARP Cache Timeout Value
- In-Reply-To: Your message of Tue, 15 Dec 92 21:24:33 -0800.
- <9212160524.AA19106@wolf.cisco.com>
- Message-ID: <724545101.11648@news.Colorado.EDU>
- Sender: news
- Date: 16 Dec 92 08:58:33 -0800
- Approved: news
- Content-Length: 1746
- X-Note1: mail msgid was <9212161658.AA08326@ubu.sybgate.sybase.com>
- X-Note2: message-id generated by recnews
- Lines: 39
-
-
- > The reason the default is set to 4 hours is simply that's what seemed like
- > a reasonable value when the ARP code was written (5 or 6 years ago). Some
- > tens of thousands of routers later, after very few questions about that
- > default value, it still seems reasonable for a default. I don't see any
- > problem with lowering your timeout to 15 minutes.
-
- > If your hosts were conformant to the Host Requirements (RFC-1123), you
- > could change them at will, and not worry about the ARP timeout at all,
- > because RFC-1123 calls for hosts to send a 'gratuitous' Broadcast ARP reply
- > upon startup. That way if they've had their MAC address change since their
- > last presence on the net, cached values will be update> d. Our routers do
- > this when we startup and when we change our interface MAC addresses (e.g.,
- > when DECNet is configured).
-
- > -- Jim
-
- I've found 1800 seconds (30 minutes) to be a good compromise for the
- arp cache timeout.
-
- In a large network, you are bound to have "duplicate IP address" problems
- every once in a while.
-
- For example, if someone tries to boot a "rogue" machine on that for some
- reason happens to be configured with the IP address of a legitimate host
- elsewhere on the network, the router will replace the legitimate host's
- hardware address with the hardware address of the rogue machine.
-
- Interestingly, this will occur if the "rogue" machine is booted on _any_
- network that is directly attached to a router that has an interface on
- the legitimate host's network (assuming that the rogue host is RFC1123-
- compliant!).
-
- Under these circumstances, four hours is a rather stiff penalty to pay for
- a moment of well-meaning insanity. 30 minutes is just painful enough in
- most cases.
-
- Don Proctor
- Sybase, Inc.
-