I can confirm this bug, and i can confirm that was not present on
lenny's arpwatch version, appeared only on squeeze (2.1a15-1.1).

As possible, i've worked out the trouble at switch level, modifying the
configuration and removing at the source unwanted traffic.

But there's no possible to do that generally, and i've had to disable
arpwatch on some server to prevent logfile hog, because i've a ''duble
LAN configuration, one on a phisical interface (eth0) and one on a vlan
over that (eth0.666).


I hope it will be fixed soon.


I don't know if there's some iptables rule that are able to filter
VLAN-ed ARP request on the main interface, without breaking all the ARP
resolution protocol. ;-)

Thanks.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to