This protocol does the exact opposite of ARP; given a MAC address, it tries to find the corresponding IP address.
In the early years of 1980 this protocol was used for address assignment for network hosts. Due to its limited capabilities it was eventually superseded by BOOTP.
RARP is available for several link layers, some examples:
Other protocols in the LanProtocolFamily: RARP can use other LAN protocols as transport protocols as well, using SNAP encapsulation and the Ethernet type of 0x8035.
Frame 1 (60 bytes on wire, 60 bytes captured) [...] Ethernet II, Src: Marquett_12:dd:88 (00:00:a1:12:dd:88), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Destination: Broadcast (ff:ff:ff:ff:ff:ff) Source: Marquett_12:dd:88 (00:00:a1:12:dd:88) Type: ARP (0x0806) Trailer: 000000000000000000000000000000000000 Address Resolution Protocol (reverse request) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: reverse request (0x0003) Sender MAC address: Marquett_12:dd:88 (00:00:a1:12:dd:88) Sender IP address: 0.0.0.0 (0.0.0.0) Target MAC address: Marquett_12:dd:88 (00:00:a1:12:dd:88) Target IP address: 0.0.0.0 (0.0.0.0)
The RARP dissector is part of the ARP dissector and fully functional.
There are no RARP specific preference settings.
SampleCaptures/rarp_request.cap The above RARP request.
There is no specific RARP filter, all is done by the ARP dissector, so the display filter fields for ARP and RARP are identical.
A complete list of ARP display filter fields can be found in the display filter reference
Show only the RARP (ARP) based traffic:
As RARP packets have the same format as ARP packets and the same Ethernet type as ARP packets (i.e., they are, in effect, ARP packets with RARP-specific opcodes), the same capture filters that can be used for ARP can be used for RARP.
Imported from https://wiki.wireshark.org/RARP on 2020-08-11 23:23:49 UTC