<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic X480 bcast flood in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43245#M10382</link>
    <description>Hi, all!&lt;BR /&gt;
&lt;BR /&gt;
Have X480 as border.&lt;BR /&gt;
Yesterday begin big bcast flood in local network.&lt;BR /&gt;
Investigate show that it was scanning for local net from Internet, so IP addresses which wasn't in IP-ARP table was asked by X480 - ARP who is xx.xx.xx.xx in local. As there big local network, and a lot of IP-addresses wasn't active - X480 made big bcast flood.&lt;BR /&gt;
&lt;BR /&gt;
As workaroung we can &lt;BR /&gt;
- increase time of keeping arp in table&lt;BR /&gt;
&lt;BR /&gt;
Any more ideas?&lt;BR /&gt;
&lt;BR /&gt;
I receive advice - to make arp-passive mode (X480 transmit bcast arp query only when client from local net give arp query) - how I can configure this?&lt;BR /&gt;
&lt;BR /&gt;
Thank you!</description>
    <pubDate>Wed, 02 Dec 2015 17:15:00 GMT</pubDate>
    <dc:creator>Alexandr_P</dc:creator>
    <dc:date>2015-12-02T17:15:00Z</dc:date>
    <item>
      <title>X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43245#M10382</link>
      <description>Hi, all!&lt;BR /&gt;
&lt;BR /&gt;
Have X480 as border.&lt;BR /&gt;
Yesterday begin big bcast flood in local network.&lt;BR /&gt;
Investigate show that it was scanning for local net from Internet, so IP addresses which wasn't in IP-ARP table was asked by X480 - ARP who is xx.xx.xx.xx in local. As there big local network, and a lot of IP-addresses wasn't active - X480 made big bcast flood.&lt;BR /&gt;
&lt;BR /&gt;
As workaroung we can &lt;BR /&gt;
- increase time of keeping arp in table&lt;BR /&gt;
&lt;BR /&gt;
Any more ideas?&lt;BR /&gt;
&lt;BR /&gt;
I receive advice - to make arp-passive mode (X480 transmit bcast arp query only when client from local net give arp query) - how I can configure this?&lt;BR /&gt;
&lt;BR /&gt;
Thank you!</description>
      <pubDate>Wed, 02 Dec 2015 17:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43245#M10382</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-12-02T17:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43246#M10383</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
can you use static ARP ? For example you can check ip-security function like "learn ARP from DHCP".&lt;BR /&gt;
&lt;BR /&gt;
--&lt;BR /&gt;
Jarek&lt;BR /&gt;</description>
      <pubDate>Wed, 02 Dec 2015 18:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43246#M10383</guid>
      <dc:creator>Jarek</dc:creator>
      <dc:date>2015-12-02T18:56:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43247#M10384</link>
      <description>You can try access-list with the action "deny-cpu". Like this: &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt; x460.3 # show policy CoPP Policies at Policy Server: Policy: CoPP entry arp {  if match all {      ethernet-type 0x806 ; } then {     permit  ; } } entry ssh {  if match all {      source-zone zone-mgm ;     protocol tcp ;     destination-port 22 ; } then {     permit  ; } entry bgp_src {  if match all {      source-zone zone-bgp ;     protocol tcp ;     source-port 179 ; } then {     permit  ; } ##########  [skip] ########## Other protocols entry deny_other {  if match all {  } then {     deny-cpu  ; } } &lt;/PRE&gt;&lt;/DIV&gt;  &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt; x460 # show configuration | include CoPP configure access-list CoPP any ingress &lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 02 Dec 2015 19:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43247#M10384</guid>
      <dc:creator>Sergey_Okun</dc:creator>
      <dc:date>2015-12-02T19:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43248#M10385</link>
      <description>I can't deny arp requests - because in my case swich work correct.&lt;BR /&gt;
But in case when somebody scan my network, disconnected clients -&amp;gt; arp table in X480 haven't their MAC/IP records -&amp;gt; send a lot of bcast arp-who_is messages -&amp;gt; big load of network</description>
      <pubDate>Wed, 02 Dec 2015 19:43:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43248#M10385</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-12-02T19:43:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43249#M10386</link>
      <description>You have customers that  obtaining address via DHCP or use a static IP ?&lt;BR /&gt;
&lt;BR /&gt;
--&lt;BR /&gt;
Jarek</description>
      <pubDate>Wed, 02 Dec 2015 19:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43249#M10386</guid>
      <dc:creator>Jarek</dc:creator>
      <dc:date>2015-12-02T19:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43250#M10387</link>
      <description>Via DHCP from external server, not switch dhcp.</description>
      <pubDate>Wed, 02 Dec 2015 20:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43250#M10387</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-12-02T20:04:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43251#M10388</link>
      <description>They using dynamic IP addresses or static ?&lt;BR /&gt;
&lt;BR /&gt;
Maybe you can use ip-security function.&lt;BR /&gt;
When host get address via switch relay, switch creates a  ip-security dhcp-snooping entries.&lt;BR /&gt;
This can add a static arp also with ip-security arp learning learn-from-dhcp</description>
      <pubDate>Wed, 02 Dec 2015 20:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43251#M10388</guid>
      <dc:creator>Jarek</dc:creator>
      <dc:date>2015-12-02T20:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43252#M10389</link>
      <description>Thank's for all!&lt;BR /&gt;
&lt;BR /&gt;
I thnk it would be the best decision.</description>
      <pubDate>Wed, 02 Dec 2015 20:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43252#M10389</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-12-02T20:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43253#M10390</link>
      <description>Check also an arp validation funcion and &lt;BR /&gt;
you can  add an ACL on vlan ingress to filter junk packets/frames.&lt;BR /&gt;
&lt;BR /&gt;
I have also in my ingress vlan  acl meter to rate-limit packets to switch IP address and IP's on core+distribution used for connection between switches/routers,&lt;BR /&gt;
because sometimes customers try to kill your equipment  intentionally or not  (viruses, etc..)&lt;BR /&gt;
&lt;BR /&gt;
--&lt;BR /&gt;
Jarek&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 02 Dec 2015 20:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43253#M10390</guid>
      <dc:creator>Jarek</dc:creator>
      <dc:date>2015-12-02T20:36:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43254#M10391</link>
      <description>Can you, please, tell me in details about " have also in my ingress vlan  acl meter to rate-limit packets to switch IP address and IP's on core+distribution used for connection between switches/routers"&lt;BR /&gt;
&lt;BR /&gt;
Thank you!</description>
      <pubDate>Wed, 02 Dec 2015 20:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43254#M10391</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-12-02T20:36:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43255#M10392</link>
      <description>For example you have:&lt;BR /&gt;
&lt;BR /&gt;
SW Core ==&amp;gt; 192.168.1.0/30 &amp;lt;== Distribution custom vlan  lan1 IP 192.168.100.1/24 ==&amp;gt; to L2 switch&lt;BR /&gt;
&lt;I&gt;&lt;BR /&gt;
&lt;/I&gt;Network 192.168.1.0/24 is used for connection&lt;I&gt; &lt;/I&gt;between distr.&lt;I&gt; &lt;/I&gt;and core&lt;I&gt;.&lt;BR /&gt;
&lt;BR /&gt;
&lt;/I&gt;On distribution switch:&lt;I&gt;&lt;BR /&gt;
&lt;/I&gt;create meter ICMP_Limit &lt;BR /&gt;
configure meter ICMP_Limit committed-rate 128 Kbps max-burst-size 32 Kb out-actions drop &lt;BR /&gt;
&lt;BR /&gt;
ACL for ingress vlan lan1.pol&lt;BR /&gt;
&lt;BR /&gt;
entry toCore_ICMP { if {          destination-address 192.168.1.0/24;&lt;BR /&gt;
&lt;BR /&gt;
 } then {&lt;BR /&gt;
&lt;BR /&gt;
         permit;&lt;BR /&gt;
&lt;BR /&gt;
         meter ICMP_Limit;&lt;BR /&gt;
&lt;BR /&gt;
 }}&lt;BR /&gt;
&lt;BR /&gt;
entry toGW_Lan1_ICMP { if match all {     destination-address 192.168.100.1/32 ;&lt;BR /&gt;
&lt;BR /&gt;
     protocol icmp;&lt;BR /&gt;
&lt;BR /&gt;
 } then {&lt;BR /&gt;
&lt;BR /&gt;
     permit ;&lt;BR /&gt;
&lt;BR /&gt;
     meter ICMP_Limit;&lt;BR /&gt;
&lt;BR /&gt;
 } }&lt;BR /&gt;
&lt;BR /&gt;
  &lt;BR /&gt;
  You can also deny udp and tcp to this address from customer vlan.&lt;BR /&gt;
&lt;BR /&gt;
--&lt;BR /&gt;
Jarek&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 02 Dec 2015 20:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43255#M10392</guid>
      <dc:creator>Jarek</dc:creator>
      <dc:date>2015-12-02T20:36:00Z</dc:date>
    </item>
    <item>
      <title>RE: X480 bcast flood</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43256#M10393</link>
      <description>Thank you!</description>
      <pubDate>Wed, 02 Dec 2015 20:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x480-bcast-flood/m-p/43256#M10393</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-12-02T20:36:00Z</dc:date>
    </item>
  </channel>
</rss>

