I just wanted to make every one aware, it would appear that there is an issue with these WF-RAC modules whereby they are performing an ARP spoofing attack on my network.
This was confirmed just now with support from my router manufacturer, TP-Link. 10.1 is my router and the A0:43 mac addresses are the WF-RAC adapters.
arp: 192.168.10.1 moved from 9c:a2:f4:57:6d:5e to a0:43:b0:5a:cb:82 on igb0
arp: 192.168.10.1 moved from 9c:a2:f4:57:6d:5e to a0:43:b0:5a:cc:48 on igb0
arp: 192.168.10.1 moved from 9c:a2:f4:57:6d:5e to a0:43:b0:5a:d7:85 on igb0
This is happening every hour for about 10 seconds for each WF-RAC unit.
Please check your networks for any suspicious activity.