Could you possibly run
http://www.sysinternals.com/ntw2k/freeware/procexp.shtml
then start a trace/capture from your system, and see who's the
"perpetrator"? It would also be nice if you could run a second trace,
from a  system with no IP address associated with it (*nix/*BSD?!?),
sniffing traffic on the same switch(es) your Win-based system tends to
"steal" IPs from, to understand what is exactly the process of ARP
response, "seen" from a "neutral" system?!?

Stef

On Tue, 30 Nov 2004 10:30:39 +0200, Matthew Tagg <[EMAIL PROTECTED]> wrote:
>  
> 1. The refresh period is never generally > 5 minutes, and the problem
> existed much longer than that. 
> 2. We cleared ARP tables on the managed switch constantly. 
> 3. We also cleared ARP on the windows machine "ARP -D *" 
<snip>


==================================================================
 This is the WinPcap users list. It is archived at
 http://www.mail-archive.com/winpcap-users@winpcap.polito.it/

 To unsubscribe use 
 mailto: [EMAIL PROTECTED]
==================================================================

Reply via email to