
И, между другото:
ip@[!]srcmac [mac]
Similarly to above, but when receiving ARP-requests, the entire sender-address (IP and MAC) will
be compared against the ip and srcmac values. This setting affects packets from intruders only;
ip-sentinel will not generate replies when ip is requested.
When the srcmac is negated with "!", only addresses from this ip which are not having this mac
will be matching.
Examples are: "10.0.0.1@0:1:2:3:4:5" or "10.0.0.2@!a:b:c:d:e:f".
Оказа се, че проблема се решава с добавяне на IP@!MAC на интерфейса, на който слуша и ip-sentinel. След като добавих и него всичко тръгна без проблеми.