<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Fraggle Attack Enterasys S4 in ExtremeSwitching (EOS)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57161#M986</link>
    <description>I am getting these HostDos Attack ( fraggle ) detected on vlan.0.x (tons of different vlans).  Is this something to be worried about?  I can't track it down to a source.  They are coming in roughly 24 per second.  They look like this:&lt;BR /&gt;
&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;Oct 26 16:06:40 10.0.1.1 HostDoS[6] Attack ( fraggle ) detected on vlan.0.56 [ InPort(lag.0.8) LEN(100) DA(FF:FF:FF:FF:FF:FF) SA(18:A9:05:F2:49:D9) C-TAG(8100:0038) ETYPE(0800) SIP(10.5.6.31) DIP(10.5.6.255) VER(4) HLEN(5) TOTALLEN(78) PROTO(17) TOS(0) TTL(128) UDP_DST(137) UDP_SRC(137) ]&lt;BR /&gt;
&lt;/BLOCKQUOTE&gt;                  &lt;BLOCKQUOTE&gt;Oct 26 16:06:33 10.0.1.1 HostDoS[2] Attack ( fraggle ) detected on vlan.0.53 [ InPort(lag.0.6) LEN(100) DA(FF:FF:FF:FF:FF:FF) SA(2C:44:FD:64:1C:41) C-TAG(8100:0035) ETYPE(0800) SIP(10.5.3.41) DIP(10.5.3.255) VER(4) HLEN(5) TOTALLEN(78) PROTO(17) TOS(0) TTL(128) UDP_DST(137) UDP_SRC(137) ]&lt;BR /&gt;
Oct 26 16:06:33 10.0.1.1 HostDoS[2] Attack ( fraggle ) detected on vlan.0.700 [ InPort(lag.0.2) LEN(100) DA(FF:FF:FF:FF:FF:FF) SA(00:50:56:95:7E:5C) C-TAG(8100:02BC) ETYPE(0800) SIP(10.6.49.29) DIP(10.6.49.255) VER(4) HLEN(5) TOTALLEN(78) PROTO(17) TOS(0) TTL(128) UDP_DST(137) UDP_SRC(137) ]&lt;/BLOCKQUOTE&gt;</description>
    <pubDate>Mon, 26 Oct 2015 21:15:00 GMT</pubDate>
    <dc:creator>Jeremy_Gibbs</dc:creator>
    <dc:date>2015-10-26T21:15:00Z</dc:date>
    <item>
      <title>Fraggle Attack Enterasys S4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57161#M986</link>
      <description>I am getting these HostDos Attack ( fraggle ) detected on vlan.0.x (tons of different vlans).  Is this something to be worried about?  I can't track it down to a source.  They are coming in roughly 24 per second.  They look like this:&lt;BR /&gt;
&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;Oct 26 16:06:40 10.0.1.1 HostDoS[6] Attack ( fraggle ) detected on vlan.0.56 [ InPort(lag.0.8) LEN(100) DA(FF:FF:FF:FF:FF:FF) SA(18:A9:05:F2:49:D9) C-TAG(8100:0038) ETYPE(0800) SIP(10.5.6.31) DIP(10.5.6.255) VER(4) HLEN(5) TOTALLEN(78) PROTO(17) TOS(0) TTL(128) UDP_DST(137) UDP_SRC(137) ]&lt;BR /&gt;
&lt;/BLOCKQUOTE&gt;                  &lt;BLOCKQUOTE&gt;Oct 26 16:06:33 10.0.1.1 HostDoS[2] Attack ( fraggle ) detected on vlan.0.53 [ InPort(lag.0.6) LEN(100) DA(FF:FF:FF:FF:FF:FF) SA(2C:44:FD:64:1C:41) C-TAG(8100:0035) ETYPE(0800) SIP(10.5.3.41) DIP(10.5.3.255) VER(4) HLEN(5) TOTALLEN(78) PROTO(17) TOS(0) TTL(128) UDP_DST(137) UDP_SRC(137) ]&lt;BR /&gt;
Oct 26 16:06:33 10.0.1.1 HostDoS[2] Attack ( fraggle ) detected on vlan.0.700 [ InPort(lag.0.2) LEN(100) DA(FF:FF:FF:FF:FF:FF) SA(00:50:56:95:7E:5C) C-TAG(8100:02BC) ETYPE(0800) SIP(10.6.49.29) DIP(10.6.49.255) VER(4) HLEN(5) TOTALLEN(78) PROTO(17) TOS(0) TTL(128) UDP_DST(137) UDP_SRC(137) ]&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Mon, 26 Oct 2015 21:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57161#M986</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2015-10-26T21:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fraggle Attack Enterasys S4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57162#M987</link>
      <description>It could be a DoS attack of NetBIOS because it's send to all host in your subnet. It could crash very old Windows Systems because their NetBIOS service can become frozen.</description>
      <pubDate>Mon, 26 Oct 2015 22:48:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57162#M987</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2015-10-26T22:48:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fraggle Attack Enterasys S4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57163#M988</link>
      <description>Jeremy,&lt;BR /&gt;
Tracking down the end systems can take some time but the message includes clues to help.&lt;BR /&gt;
SA(18:A9:05:F2:49:D9) C-TAG(8100:0038) ETYPE(0800) SIP(10.5.6.31) The host in this one has an IP of 10.5.6.31 with a Macadress of 18:A9:05:F2:49:D9 on vlan 56.  &lt;BR /&gt;
It is likely an older microsoft OS though DoS attack is a possibility. The host of the switch is hardened against these.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Oct 2015 00:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57163#M988</guid>
      <dc:creator>Daniel_Coughlin</dc:creator>
      <dc:date>2015-10-30T00:04:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fraggle Attack Enterasys S4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57164#M989</link>
      <description>I am seeing these messages for every single vlan.  99.99% of computers are windows 7.1 or newer etc.  I can find the source computer, but doing a packet capture doesn't show me anything interesting.  Virus scan etc shows nothing.</description>
      <pubDate>Fri, 30 Oct 2015 02:57:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57164#M989</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2015-10-30T02:57:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fraggle Attack Enterasys S4</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57165#M990</link>
      <description>What happens if you disconnect the suspicious host(s)?&lt;BR /&gt;
&lt;BR /&gt;
With the command&lt;BR /&gt;
show mac address xx:xx:xx:xx:xx:xxon the switch(s) behind the corresponding LAG(s) you can identify the host port(s).&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Oct 2015 14:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/fraggle-attack-enterasys-s4/m-p/57165#M990</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2015-10-30T14:38:00Z</dc:date>
    </item>
  </channel>
</rss>

