<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unicast Flooding network-wide in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707455#M24302</link>
    <description>Hi Jeffery,&lt;BR /&gt;&lt;BR /&gt;I hope you have resolved.&lt;BR /&gt;&lt;BR /&gt;Another thought, you may want to enable the Instrumentation Monitor feature and view results. Not that this is a DOS attack, however I have read that DOS attacks can cause a CPU to take to long to respond to new events, which can lead to a breakdown of Spanning Tree or other features. A delay of several seconds typically indicates a problem. Information on this can be found in the HP ProCurve Switch Software Access Security Guide.&lt;BR /&gt;&lt;BR /&gt;I hope this helps and look forward to reading resolution to this.&lt;BR /&gt;</description>
    <pubDate>Tue, 02 Nov 2010 12:41:39 GMT</pubDate>
    <dc:creator>Peter Tobin</dc:creator>
    <dc:date>2010-11-02T12:41:39Z</dc:date>
    <item>
      <title>Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707453#M24300</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;We are seeing some strange behaviour in our fully HP-switched Layer-2 network.&lt;BR /&gt;&lt;BR /&gt;Basically our setup is as follows: We have a ring of 5 core-switches (8212zl), connecting into our datacenters to a wide variety of rackswitches (anything from 1800 to 28xx series)&lt;BR /&gt;For a while now, we are seeing unicast packets to be flooded out of all the core-ports.&lt;BR /&gt;&lt;BR /&gt;I recently connected a linux-box straight into on of our core-routers and ran a tcpdump, and i am seeing all traffic for any specific vlan to be sniffed by tcpdump. Source and destination mac-addresses are known in the core, so these should not be passed to this linux box.&lt;BR /&gt;&lt;BR /&gt;On a side-note, we are also seeing a spanning-tree topology change every 42 seconds on the switches. It will be hard to track down where this change occurs (?)&lt;BR /&gt;&lt;BR /&gt;Anyone has any clue where to begin?</description>
      <pubDate>Mon, 01 Nov 2010 13:07:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707453#M24300</guid>
      <dc:creator>Jeffrey Belles</dc:creator>
      <dc:date>2010-11-01T13:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707454#M24301</link>
      <description>Since topology changes will cause unicast flooding, I would try to track those down first.&lt;BR /&gt;&lt;BR /&gt;I would start by looking at the logs on the core switches, see if either the root or the blocked link move around. You have the root on one of the 8212zl switches?&lt;BR /&gt;&lt;BR /&gt;If that's OK, you could try temporarily disabling spanning tree on individual (simply connected) edge parts of your network with bpdu-filter. That forces the port to forwarding and drops BPDUs. You might be able to isolate the fault that way.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Nov 2010 17:52:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707454#M24301</guid>
      <dc:creator>Richard Brodie_1</dc:creator>
      <dc:date>2010-11-01T17:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707455#M24302</link>
      <description>Hi Jeffery,&lt;BR /&gt;&lt;BR /&gt;I hope you have resolved.&lt;BR /&gt;&lt;BR /&gt;Another thought, you may want to enable the Instrumentation Monitor feature and view results. Not that this is a DOS attack, however I have read that DOS attacks can cause a CPU to take to long to respond to new events, which can lead to a breakdown of Spanning Tree or other features. A delay of several seconds typically indicates a problem. Information on this can be found in the HP ProCurve Switch Software Access Security Guide.&lt;BR /&gt;&lt;BR /&gt;I hope this helps and look forward to reading resolution to this.&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Nov 2010 12:41:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707455#M24302</guid>
      <dc:creator>Peter Tobin</dc:creator>
      <dc:date>2010-11-02T12:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707456#M24303</link>
      <description>Thanks,&lt;BR /&gt;&lt;BR /&gt;Pretty sure it is not a DOS attack, since our Arbor doesnt see any of this.&lt;BR /&gt;It will be very hard to track down the constant toplology changes I think.&lt;BR /&gt;The network consists of over 300 rackswitches, all connecting to the 5 core-switches.&lt;BR /&gt;&lt;BR /&gt;Shutting down portions of the spanning-tree topology will not work i'm afraid.&lt;BR /&gt;&lt;BR /&gt; -J</description>
      <pubDate>Tue, 02 Nov 2010 12:44:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707456#M24303</guid>
      <dc:creator>Jeffrey Belles</dc:creator>
      <dc:date>2010-11-02T12:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707457#M24304</link>
      <description>Further on this.&lt;BR /&gt;All rackswitches are dual-connected to at least 2 core-switches, so starting to filter bpdu's will create loops...</description>
      <pubDate>Tue, 02 Nov 2010 12:46:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707457#M24304</guid>
      <dc:creator>Jeffrey Belles</dc:creator>
      <dc:date>2010-11-02T12:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707458#M24305</link>
      <description>That does sound like it's going to be tricky. My choice would be to script SNMP queries across several boxes see what you can see is flapping.&lt;BR /&gt;&lt;BR /&gt;Finding where:&lt;BR /&gt;dot1dStpRootCost or dot1dStpRootPort are changing might be a place to start.&lt;BR /&gt;&lt;BR /&gt;Good hunting!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Nov 2010 13:19:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707458#M24305</guid>
      <dc:creator>Richard Brodie_1</dc:creator>
      <dc:date>2010-11-02T13:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707459#M24306</link>
      <description>Jeffrey, start by looking at the log file of the core switches. They should give you some indication on what's going on (show logg -r).&lt;BR /&gt;&lt;BR /&gt;Olaf&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Nov 2010 20:57:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707459#M24306</guid>
      <dc:creator>Olaf Borowski</dc:creator>
      <dc:date>2010-11-02T20:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707460#M24307</link>
      <description>I'm not HP Networking, but out of semi-idle curiousity, just how many distinct MAC addresses are there in this layer-2 network?  The 8212's seem to sport a rather large forwarding table of 64,000 entries, but thought I might check - particularly if there are lots of virtual machines, or in the unlikely event there is a node or three deliberately trying to overwhelm the forwarding tables.</description>
      <pubDate>Tue, 02 Nov 2010 21:23:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707460#M24307</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2010-11-02T21:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707461#M24308</link>
      <description>Gents,&lt;BR /&gt;Many thanks for your replies.&lt;BR /&gt;Managed to track down the evil by issueing a:&lt;BR /&gt;"show spann debug &lt;PORT&gt; instance &amp;lt;1&amp;gt;" on the DR switch and looking for increasing counters for received TCN packets. Followed all the way down untill we hit it.&lt;BR /&gt;&lt;BR /&gt;Turned out to be a buggy Dell-blade switch who was in a constant reboot-loop, causing a continuous topology change.&lt;BR /&gt;(for what it's worth: Dell's take exactly 42 seconds to reboot:-))&lt;BR /&gt;&lt;BR /&gt;Shut down the links and all is stable again.&lt;BR /&gt;&lt;BR /&gt;PS: there are roughyly 3000 Mac-adresses in the table. Not cool to flush them every 40 seconds.&lt;BR /&gt;&lt;BR /&gt;Thanks for your responses, it's all quiet on the western front now.&lt;BR /&gt;&lt;BR /&gt; -J&lt;/PORT&gt;</description>
      <pubDate>Tue, 02 Nov 2010 21:30:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707461#M24308</guid>
      <dc:creator>Jeffrey Belles</dc:creator>
      <dc:date>2010-11-02T21:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707462#M24309</link>
      <description>Nice debugging work.  I guess the Dell switch was the exception to your "fully HP-switched Layer-2 network" assertion in the initial post?&lt;BR /&gt;&lt;BR /&gt;If you like I'd be more than happy to try to get you in touch with an HP sales type to help you replace that nasty, buggy Dell equipment :)</description>
      <pubDate>Tue, 02 Nov 2010 21:39:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707462#M24309</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2010-11-02T21:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unicast Flooding network-wide</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707463#M24310</link>
      <description>haha.&lt;BR /&gt;well, yes, there are a few exception.We have a few Dell blade-servers, and they connect through built-in blade-switches (only a few)&lt;BR /&gt;&lt;BR /&gt;Thanks anyway :-)</description>
      <pubDate>Tue, 02 Nov 2010 21:43:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/unicast-flooding-network-wide/m-p/4707463#M24310</guid>
      <dc:creator>Jeffrey Belles</dc:creator>
      <dc:date>2010-11-02T21:43:22Z</dc:date>
    </item>
  </channel>
</rss>

