What is ARP?

ARP stands for Address Resolution Protocol and is a network protocol that translates an IP address into a MAC address, enabling communication within a local network (LAN).

ARP is essential in Ethernet-based networks — without ARP, a device with an IP address cannot send data over Layer 2 (MAC-based) communication.


🧠 How does ARP work?

  1. A device wants to communicate with an IP address within the local subnet
  2. The device first checks whether the MAC address is known in its ARP cache
  3. If not, it sends an ARP request (broadcast): “Who has IP x.x.x.x?”
  4. The device with that IP address sends an ARP reply containing its MAC address
  5. The sending device uses this MAC address to transmit an Ethernet frame

ARP only operates within the local subnet; a router is required for external networks.


🏭 Use of ARP in industrial networks

  • Support for BOOTP/DHCP: ARP enables communication once an IP address has been assigned
  • Diagnostics: tools such as arp -a, Wireshark or SCADA logs use ARP to identify devices
  • Management of HMIs, PLCs and IO modules that communicate over Ethernet
  • Switches and Firewalls use ARP tables to route traffic correctly

In OT networks, an ARP resolution failure can lead to connectivity issues between critical devices.


🔍 ARP vs. DNS

Aspect ARP DNS
Purpose IP → MAC (Layer 2 identification) Name → IP (Layer 3 identification)
Scope Within the local network (LAN) For communication inside and outside the LAN
Protocol type Network protocol (OSI Layer 2/3) Application protocol (OSI Layer 7)
Caching ARP cache on each host DNS cache per system or server
Vulnerabilities Spoofing, poisoning Spoofing, cache poisoning

🔐 Security considerations

  • ARP Spoofing / ARP poisoning is an attack in which a malicious actor sends forged ARP replies to redirect traffic
  • Can lead to Man-In-The-Middle attacks or network outages
  • Use static ARP entries on critical devices (such as Safety PLCs)
  • Implement Port Security, VLAN isolation and IDS to detect and limit ARP attacks
  • Monitoring with tools such as Wireshark or SIEM is essential in sensitive OT networks

ARP is simple and powerful, but also vulnerable without additional security measures.