<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: EXOS Using new feature &amp;quot;Mirroring to Remote IP Addresses&amp;quot; in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22129#M1401</link>
    <description>&lt;P&gt;Working more and more with that feature - very powerfull!&lt;/P&gt;&lt;P&gt;But what about if the packet which needs to be mirrored is at maximum mtu ?&lt;/P&gt;&lt;P&gt;Then the switch is not able to build GRE header around this !&lt;/P&gt;&lt;P&gt;Packets are silently dropped!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That’s very bad for an analysis tool.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it help to enable jumbo frames from mirror switch to mirror destination ?&lt;/P&gt;&lt;P&gt;But careless if it would work that’s not practicable in the field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See here an example:&lt;/P&gt;&lt;P&gt;Classic mirror:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6616ab3c693c4ed7a392e963e96046d9_a86fd081-e8e0-4b2d-81ac-643efac86d5e.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3617iB1E6A2ABE20D2F5B/image-size/large?v=v2&amp;amp;px=999" role="button" title="6616ab3c693c4ed7a392e963e96046d9_a86fd081-e8e0-4b2d-81ac-643efac86d5e.jpg" alt="6616ab3c693c4ed7a392e963e96046d9_a86fd081-e8e0-4b2d-81ac-643efac86d5e.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ERSPAN:&lt;/P&gt;&lt;P&gt;big data packets are silently dropped - only ACK are seen&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6616ab3c693c4ed7a392e963e96046d9_3858a309-865a-49a9-8178-112dec7fd925.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4802iCE498FF13676B643/image-size/large?v=v2&amp;amp;px=999" role="button" title="6616ab3c693c4ed7a392e963e96046d9_3858a309-865a-49a9-8178-112dec7fd925.jpg" alt="6616ab3c693c4ed7a392e963e96046d9_3858a309-865a-49a9-8178-112dec7fd925.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Oct 2020 21:28:00 GMT</pubDate>
    <dc:creator>M_Nees</dc:creator>
    <dc:date>2020-10-15T21:28:00Z</dc:date>
    <item>
      <title>EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22121#M1393</link>
      <description>How can i use this new 22.4 EXOS feature ?&lt;BR /&gt;
&lt;BR /&gt;
It sounds perfect to troubleshoot / debug unknown client problems from a remote switch. &lt;BR /&gt;
&lt;BR /&gt;
I configure this on a EXOS switch in the field and grep the data directly on netsight ubuntu appliance via tcpdump. Unfortunately EXOS encapsulated this traffic into GRE Tunnel.&lt;BR /&gt;
&lt;BR /&gt;
* Slot-1 12.125.37 # sh mirror&lt;BR /&gt;
DefaultMirror   (Enabled)&lt;BR /&gt;
    Description:    Default Mirror Instance, created automatically&lt;BR /&gt;
    Mirror to remote IP: 10.2.0.34          VR        : VR-Default&lt;BR /&gt;
    From IP            : 10.1.12.125        Ping check: On&lt;BR /&gt;
    Status             : Up&lt;BR /&gt;
    Source filter instances used :  1&lt;BR /&gt;
        Port 1:40, all vlans, ingress only&lt;BR /&gt;
&lt;BR /&gt;
Mirrors defined:          1&lt;BR /&gt;
Mirrors enabled:          1 (Maximum 4)&lt;BR /&gt;
HW filter instances used: 1 (Maximum 128)&lt;BR /&gt;
HW mirror instances used: 1 ingress, 0 egress (Maximum 4 total, 2 egress)&lt;BR /&gt;
* Slot-1 12.125.38 #09:55:18.931614 IP (tos 0x0, ttl 62, id 0, offset 0, flags [none], proto GRE (47), length 84)&lt;BR /&gt;
    10.1.12.125 &amp;gt; 10.2.0.34: GREv0, Flags [none], length 64&lt;BR /&gt;
        gre-proto-0x88be&lt;BR /&gt;
09:55:18.931642 IP (tos 0xc0, ttl 64, id 58906, offset 0, flags [none], proto ICMP (1), length 112)&lt;BR /&gt;
    10.2.0.34 &amp;gt; 10.1.12.125: ICMP 10.2.0.34 protocol 47 unreachable, length 92&lt;BR /&gt;
        IP (tos 0x0, ttl 62, id 0, offset 0, flags [none], proto GRE (47), length 84)&lt;BR /&gt;
    10.1.12.125 &amp;gt; 10.2.0.34: GREv0, Flags [none], length 64&lt;BR /&gt;
        gre-proto-0x88be&lt;BR /&gt;
09:55:18.947159 IP (tos 0x0, ttl 62, id 0, offset 0, flags [none], proto GRE (47), length 84)&lt;BR /&gt;
    10.1.12.125 &amp;gt; 10.2.0.34: GREv0, Flags [none], length 64&lt;BR /&gt;
        gre-proto-0x88be&lt;BR /&gt;
Is there a (easy) way to look into this GRE Tunnel - prefered with tcpdump ? On Netsight ?&lt;BR /&gt;
&lt;BR /&gt;
I am looking for a fast troubleshooting way without any graphical GUI and without needing Analytics License - just for analysing packets with tcpdump (but remotely from a EXOS Switch)&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Matthias&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Feb 2018 17:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22121#M1393</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2018-02-28T17:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22122#M1394</link>
      <description>if you send the GRE to the Analytics Engine, then the GRE is decapsulated there. probably you can configure GRE on any linux includinging XMC (NetSight). sorry for not giving detailed answer.</description>
      <pubDate>Wed, 28 Feb 2018 19:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22122#M1394</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2018-02-28T19:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22124#M1396</link>
      <description>Hi James,&lt;BR /&gt;
&lt;BR /&gt;
i try that on standard XMC like this:&lt;BR /&gt;
&lt;BR /&gt;
But it seems tcpdump have also a problem (like wireshark) to decode the GRE &lt;BR /&gt;
tunnel payload:&lt;BR /&gt;
ip tunnel add sniffer mode gre local 10.0.1.51 remote 10.1.0.4 dev eth0&lt;BR /&gt;
&lt;BR /&gt;
# ip tunnel&lt;BR /&gt;
gre0: gre/ip  remote any  local any  ttl inherit  nopmtudisc&lt;BR /&gt;
sniffer: gre/ip  remote 10.1.0.4  local 10.0.1.51  dev eth0  ttl inherit&lt;BR /&gt;
&lt;BR /&gt;
tcpdump -ni sniffer&lt;BR /&gt;
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;
listening on sniffer, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes&lt;BR /&gt;
10:44:15.354690 IP6 fe80::5efe:a00:133 &amp;gt; ff02::2: ICMP6, router solicitation, length 16&lt;BR /&gt;
10:44:19.362724 IP6 fe80::5efe:a00:133 &amp;gt; ff02::2: ICMP6, router solicitation, length 16&lt;BR /&gt;
10:45:29.746336  In ethertype Unknown (0x88be), length 258:&lt;BR /&gt;
        0x0000:  68f7 28db 16fc 085b 0e24 eca1 8100 0014  h.(....[.$......&lt;BR /&gt;
        0x0010:  0800 4500 00e0 6077 0000 3811 d4ba 4fe7  ..E...'w..8...O.&lt;BR /&gt;
        0x0020:  de4d 0a01 14a6 1194 1194 00cc 0000 1eaa  .M..............&lt;BR /&gt;
        0x0030:  baac 0000 00ee 7266 478d 1a33 c5a8 815c  ......rfG..3...\&lt;BR /&gt;
        ...       &lt;BR /&gt;
10:45:29.747665  In ethertype Unknown (0x88be), length 578:&lt;BR /&gt;
        0x0000:  68f7 28db 16fc 085b 0e24 eca1 8100 0014  h.(....[.$......&lt;BR /&gt;
        0x0010:  0800 4500 0220 6079 0000 3811 d378 4fe7  ..E...'y..8..xO.&lt;BR /&gt;
        0x0020:  de4d 0a01 14a6 1194 1194 020c 0000 1eaa  .M..............&lt;BR /&gt;
        0x0030:  baac 0000 00ef e307 8601 82a4 abc7 b80b  ................&lt;BR /&gt;
        0x0040:  acfd aeaa e360 5207 40c2 1321 1921 4754  .....'R.@..!.!GT&lt;BR /&gt;
        ...10:45:29.747849  In ethertype Unknown (0x88be), length 210:&lt;BR /&gt;
        0x0000:  68f7 28db 16fc 085b 0e24 eca1 8100 0014  h.(....[.$......&lt;BR /&gt;
        0x0010:  0800 4500 00b0 607b 0000 3811 d4e6 4fe7  ..E...'{..8...O.&lt;BR /&gt;
        0x0020:  de4d 0a01 14a6 1194 1194 009c 0000 1eaa  .M..............&lt;BR /&gt;
        ...</description>
      <pubDate>Fri, 02 Mar 2018 12:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22124#M1396</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2018-03-02T12:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22125#M1397</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
i see that Wireshark natively support to decode GRE tunnel.&lt;BR /&gt;
&lt;BR /&gt;
So i miror the captured packets directly to my pc. &lt;BR /&gt;
BUT see the following results:&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="9841920d03e145ed984a28e2a39c4ccf_RackMultipart20180302-19825-1wtfcqp-1_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2566i1DE18EEEF4A44B9B/image-size/large?v=v2&amp;amp;px=999" role="button" title="9841920d03e145ed984a28e2a39c4ccf_RackMultipart20180302-19825-1wtfcqp-1_inline.png" alt="9841920d03e145ed984a28e2a39c4ccf_RackMultipart20180302-19825-1wtfcqp-1_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
Wireshark recognize this as (Ciscos) ERSPAN and cannot decapsulate it.&lt;BR /&gt;
&lt;BR /&gt;
Is there a chance that wireshark can handle this GRE packets ?&lt;BR /&gt;
&lt;BR /&gt;
If yes this would be much more easier than configuring a GRE Tunnel on XMC or Analytics, just to have the chance to look into mirror packets.</description>
      <pubDate>Fri, 02 Mar 2018 16:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22125#M1397</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2018-03-02T16:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22126#M1398</link>
      <description>Aruba handle the same issue with this:&lt;BR /&gt;
&lt;BR /&gt;
Cause : By default, Aruba uses GRE mode 0 which doesn't allow wireshark to decrypt the contents.&lt;BR /&gt;
&lt;BR /&gt;
  Solution : Set the GRE mode to 25944 on both the ends of the tunnel:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://community.arubanetworks.com/t5/Controller-Based-WLANs/How-can-we-see-the-packets-tunneled-inside-the-GRE-tunnel/ta-p/184910" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.arubanetworks.com/t5/Controller-Based-WLANs/How-can-we-see-the-packets-tunneled-in...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
But there must be a change in EXOS Code to modify GRE Mode number ...&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Mar 2018 16:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22126#M1398</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2018-03-02T16:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22127#M1399</link>
      <description>Did you have to change any settings in Wireshark, or did you just point the remote ip to your PC and start a capture?&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Mar 2018 16:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22127#M1399</guid>
      <dc:creator>Adam_Yedlin</dc:creator>
      <dc:date>2018-03-02T16:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22128#M1400</link>
      <description>You should be able to see the GRE traffic from wireshark.&lt;BR /&gt;
&lt;BR /&gt;
Within wireshark, if you  right-click on the ERSPAN header, there is a “protocol preferences” option  where you can set “Force to decode fake ERSPAN frame”.  This will allow  the inner frame to be properly decoded in wireshark. &lt;BR /&gt;</description>
      <pubDate>Wed, 21 Mar 2018 16:44:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22128#M1400</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2018-03-21T16:44:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22129#M1401</link>
      <description>&lt;P&gt;Working more and more with that feature - very powerfull!&lt;/P&gt;&lt;P&gt;But what about if the packet which needs to be mirrored is at maximum mtu ?&lt;/P&gt;&lt;P&gt;Then the switch is not able to build GRE header around this !&lt;/P&gt;&lt;P&gt;Packets are silently dropped!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That’s very bad for an analysis tool.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it help to enable jumbo frames from mirror switch to mirror destination ?&lt;/P&gt;&lt;P&gt;But careless if it would work that’s not practicable in the field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See here an example:&lt;/P&gt;&lt;P&gt;Classic mirror:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6616ab3c693c4ed7a392e963e96046d9_a86fd081-e8e0-4b2d-81ac-643efac86d5e.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3617iB1E6A2ABE20D2F5B/image-size/large?v=v2&amp;amp;px=999" role="button" title="6616ab3c693c4ed7a392e963e96046d9_a86fd081-e8e0-4b2d-81ac-643efac86d5e.jpg" alt="6616ab3c693c4ed7a392e963e96046d9_a86fd081-e8e0-4b2d-81ac-643efac86d5e.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ERSPAN:&lt;/P&gt;&lt;P&gt;big data packets are silently dropped - only ACK are seen&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6616ab3c693c4ed7a392e963e96046d9_3858a309-865a-49a9-8178-112dec7fd925.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4802iCE498FF13676B643/image-size/large?v=v2&amp;amp;px=999" role="button" title="6616ab3c693c4ed7a392e963e96046d9_3858a309-865a-49a9-8178-112dec7fd925.jpg" alt="6616ab3c693c4ed7a392e963e96046d9_3858a309-865a-49a9-8178-112dec7fd925.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 21:28:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22129#M1401</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2020-10-15T21:28:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS Using new feature "Mirroring to Remote IP Addresses"</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22130#M1402</link>
      <description>&lt;P&gt;Just a short like what the cisco guys do …&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They support truncation:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Configures the MTU size for truncation.&lt;BR /&gt;AnySPAN packet that is larger than the configured mtu size is truncated to the configured size with a 4-byte offset.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 21:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/exos-using-new-feature-quot-mirroring-to-remote-ip-addresses/m-p/22130#M1402</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2020-10-15T21:31:00Z</dc:date>
    </item>
  </channel>
</rss>

