1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-06 14:39:03 +00:00

Add the --disable-arp-ping option.

This option disables implicit ARP and ND host discovery (the implicit
discovery that would happen even if you used -Pn or IP-based discovery.)
This commit is contained in:
david
2012-07-16 18:11:21 +00:00
parent 31bbb65c07
commit 129ebc4634
3 changed files with 37 additions and 2 deletions

View File

@@ -508,7 +508,7 @@ you would expect.</para>
<para>For machines on a local ethernet network, ARP
scanning will still be performed (unless
<option>--send-ip</option> is specified) because Nmap needs
<option>--disable-arp-ping</option> or <option>--send-ip</option> is specified) because Nmap needs
MAC addresses to further scan target hosts. In previous
versions of Nmap, <option>-Pn</option> was
<option>-P0</option><indexterm><primary><option>-P0</option></primary><seealso><option>-Pn</option></seealso></indexterm>
@@ -865,7 +865,7 @@ you would expect.</para>
<option>-PS</option>) are specified, Nmap uses ARP instead
for any of the targets which are on the same LAN. If you
absolutely don't want to do an ARP scan, specify
<option>--send-ip</option>.</para>
<option>--disable-arp-ping</option>.</para>
<para>For IPv6 (-6 option), <option>-PR</option> uses ICMPv6
Neighbor Discovery instead of ARP. Neighbor Discovery, defined
@@ -874,6 +874,28 @@ you would expect.</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>--disable-arp-ping</option> (No ARP or ND Ping)
<indexterm><primary><option>--disable-arp-ping</option></primary></indexterm>
</term>
<listitem>
<para>Nmap normally does ARP or IPv6 Neighbor Discovery (ND)
discovery of locally connected ethernet hosts, even if other
host discovery options such as <option>-Pn</option> or
<option>-PE</option> are used. To disable this implicit
behavior, use the <option>--disable-arp-ping</option>
option.</para>
<para>The default behavior is normally faster, but this option
is useful on networks using proxy ARP, in which a router
speculatively replies to all ARP requests, making every target
appear to be up according to ARP scan.</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>--traceroute</option> (Trace path to host)