<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to Diagnose and Troubleshoot Unicast Flooding in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/how-to-diagnose-and-troubleshoot-unicast-flooding/m-p/41856#M75</link>
    <description>Article ID: 5322&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
How to troubleshoot unicast flooding&lt;BR /&gt;
Find mac address&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
Unicast flooding&lt;BR /&gt;
Seeing half of conversation in sniffer trace&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
From the perspective of a passive sniffer, a non-mirrored switch port should be seen to transmit just broadcasts, multicasts, and unknowns. If sorting a sniffer Host Table analysis (in, for example, Sniffer Pro) by "In Packets", shows that any station that received packets was not seen to transmit them, or vice versa; you likely have a unicast flooding problem.&lt;BR /&gt;
&lt;BR /&gt;
Though unicast flooding will not prevent delivery of network traffic, it can be a concern from both efficiency and security perspectives.&lt;BR /&gt;
&lt;BR /&gt;
Unicast flooding on switches running in traditional mode is normally due to the lack of a Source Address Table (SAT) entry on the switch, for the destination MAC. With an unknown destination, the packet is flooded. The reasons for the lack of SATable entry, on the other hand, are not quite as clear-cut.&lt;BR /&gt;
&lt;BR /&gt;
Possible flooding scenarios: &lt;OL&gt; &lt;B&gt;Loadsharing NICs or servers&lt;/B&gt;&lt;UL&gt;using asymmetrical transmit and receive policies. 
It is not a simple matter to predict Loadsharing NIC characteristics/operation, as there are a variety of similar products in existence which are designed for load sharing and redundancy. Each of them, in turn, may have a variety of configuration options which change their functional characteristics. 
 
Many of these products do not operate well (the attached switch fails to learn its forwarding information, or mis-learns it, or continually re-learns it on different trunk ports) in a non-proprietary switched environment, but some do. 
 
Given the variety of possibilities and the fact that these products, as with just about anything in the networking world, are always evolving and thus present a moving target; we have made no comprehensive attempt to document them. 
 
However, if functional details can be provided, such as whether each of the NICs in each cluster transmits and/or receives, the source MAC structure on layer 2 of each transmitted packed, and the source MAC/IP structure on layers 3 &amp;amp; 4 of each transmitted packet, we can assess how well they would function with switches not specifically designed to accommodate them. 
 
In the absence of these details, then a perhaps 30-second Sniffer Pro-readable sniffer trace local to each of the separate NICs in the cluster should tell the tale. &lt;B&gt;UDP traffic&lt;/B&gt;&lt;UL&gt;doesn't require acknowledgements, so knowledge of the destination MAC could time out during a long file transfer.&lt;/UL&gt; &lt;B&gt;Multiple routers in a redundantly routed network&lt;/B&gt;&lt;UL&gt;can send both ends of a conversation through different paths, resulting in an asymmetric flow of traffic, isolating some switches from knowledge of certain end stations.&lt;UL&gt; 
&lt;LI&gt;Using both a centrally based router serving as a default gateway,&lt;I&gt;and&lt;/I&gt; a firewall router that &lt;I&gt;also has direct access&lt;/I&gt; to the local stations' network; what can happen is that outgoing traffic will first hit the central router, which will map to the firewall router, and out of the network. The return trip will first go to the firewall router, which will then talk directly to the local station, bypassing the central router. 
&lt;/LI&gt;&lt;LI&gt;When using a standby router protocol such as VRRP or HSRP, even if there is no failover, there are not necessarily any guarantees (especially in a multipath, equal-cost scenario) as to how the traffic will be &lt;I&gt;returned&lt;/I&gt; from the remote side of load-sharing routers. If the "wrong" path is chosen, we again have an asymmetric flow.&lt;/LI&gt;&lt;/UL&gt;Additional points to consider, regarding layer 3 behavior: &lt;UL&gt; 
&lt;LI&gt;If in examining the layer 2 information of flooded frames, either source or destination MAC consistently references a router&lt;B&gt;;&lt;/B&gt; or, in examining layer 3 you find that the source and destination networks consistently differ&lt;B&gt;;&lt;/B&gt; or you see multiple router MACs bound to a single IP address&lt;B&gt;;&lt;/B&gt; then asymmetrical routing is a good possibility. 
&lt;/LI&gt;&lt;LI&gt;Is there more than one layer 3 router with direct access to the layer 2 fabric in question? A simple test would be to examine primary and secondary IP network numbers for all router ports in the network. 
&lt;/LI&gt;&lt;LI&gt;IP Routers generally, by default, send out an ICMP Redirect frame to an originating station, if they know of a more preferable path than themselves. Do the routers have ICMP redirect enabled, and are they running a routing awareness protocol such as RIP? What are the statically configured routes? 
If an end station has a self-referencing default gateway, it will ignore ICMP redirects. In that event, it will also need a router running proxy ARP, in order to communicate out of the local network.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt; &lt;B&gt;Asymmetrical VLAN flow / Port Overlapping&lt;/B&gt;&lt;UL&gt;(cross-vlan, within a switch) using separate FIDs for each VLAN. Unicast flooding would be likely if the VLAN used in one direction of traffic flow differs from the VLAN used in the opposite direction of traffic flow.&lt;/UL&gt; &lt;B&gt;Overflowing Source Address tables.&lt;/B&gt;&lt;UL&gt;Most devices have a capacity for at least 4000 addresses.&lt;/UL&gt; &lt;B&gt;STP Aging Time (&lt;I&gt;&lt;/I&gt;&lt;/B&gt;&lt;PRE&gt;&lt;B&gt;&lt;I&gt;dot1dTpAgingTime&lt;/I&gt;&lt;/B&gt;&lt;/PRE&gt;) is consistently being flushed&lt;UL&gt;down from 300 seconds to 15 seconds, as a result of Spanning Tree Topology Change events.&lt;/UL&gt;&lt;/UL&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Possibilities: &lt;UL&gt; 
&lt;LI&gt;Use Loadsharing/Teaming software that utilizes a Multicast (rather than Unicast) destination MAC, and scope that traffic to a VLAN or to a set of ports (&lt;A href="http://bit.ly/1r9B2Zl" target="_blank" rel="nofollow noreferrer noopener"&gt;5708&lt;/A&gt;). 
&lt;/LI&gt;&lt;LI&gt;Ensure that the firewall router goes back through the central router in order to access the local network. 
&lt;/LI&gt;&lt;LI&gt;Plug both routers into the same switch. 
&lt;/LI&gt;&lt;LI&gt;Take advantage of the fact that both routers and end stations have to keep an active ARP entry of the next hop. If you set the ARP timeout of the router (20 minutes by default, on the X-Pedition router) or affected end station (10 minutes by default, on UNIX machines) similar to the SAT timeout of the switches (usually 5 minutes by default), there will be sufficient knowledge of the whereabouts of end stations to prevent flooding. 
&lt;/LI&gt;&lt;LI&gt;Set up a UNIX &lt;PRE&gt;cron&lt;/PRE&gt; job to periodically ping out of the "silent" station (using the "silent" MAC!) to a non-existent IP host on its subnet, thereby ARPing to all devices, making them aware of its location. 
&lt;/LI&gt;&lt;LI&gt;Set up a UNIX &lt;PRE&gt;cron&lt;/PRE&gt; job to periodically ping the "silent" station. 
&lt;/LI&gt;&lt;LI&gt;Use a common FID - SVL mode - among VLANs that share traffic within a switch.&lt;/LI&gt;&lt;/UL&gt;Supporting documentation: &lt;UL&gt; 
&lt;LI&gt;&lt;A href="http://bit.ly/1nN0jbl" target="_blank" rel="nofollow noreferrer noopener"&gt;2839&lt;/A&gt;, "Flooding Unicast Traffic due to Load-sharing NICs" 
&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://bit.ly/1iwHISK" target="_blank" rel="nofollow noreferrer noopener"&gt;4918&lt;/A&gt;, "In 802.1Q, what is the difference between IVL and SVL? 
&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://bit.ly/1qBRX96" target="_blank" rel="nofollow noreferrer noopener"&gt;3460&lt;/A&gt;, "Changing Source Address Time-out on Switches and Bridges" 
&lt;/LI&gt;&lt;LI&gt;For a switch, use SPEL/EMAN's &lt;I&gt;Device / Find Source Address&lt;/I&gt; to query for a MAC address. The SATable source port will blink. 
&lt;/LI&gt;&lt;LI&gt;For a switch, use SPEL/EMAN's &lt;I&gt;Device / Bridge Status / Bridge / Filtering Database&lt;/I&gt;to view the SATable, and/or to configure a 'Static Filtering Database' entry. 
&lt;/LI&gt;&lt;LI&gt;For a SmartSwitch 2nd/3rd Gen running 5.01.33 firmware or higher, the &lt;PRE&gt;Network Tools&lt;/PRE&gt; command '&lt;PRE&gt;show mac&lt;/PRE&gt;' can be used to view the SAT, including FID identifier; plus it has sub-commands for granularity. 
&lt;/LI&gt;&lt;LI&gt;Use SPEL/EMAN's &lt;I&gt;Device / System Group / Other Groups / Net to Media Table&lt;/I&gt; to view the ARP Cache, aka &lt;I&gt;ipNetToMediaTable&lt;/I&gt; (this might help). 
&lt;/LI&gt;&lt;LI&gt;For a SmartSwitch, the &lt;PRE&gt;Network Tools&lt;/PRE&gt; command '&lt;PRE&gt;show ip&lt;/PRE&gt;' can be used to view the ARP Cache, aka &lt;I&gt;ipNetToMediaTable&lt;/I&gt;, plus other misc data.&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;</description>
    <pubDate>Sat, 28 Jun 2014 00:05:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2014-06-28T00:05:00Z</dc:date>
    <item>
      <title>How to Diagnose and Troubleshoot Unicast Flooding</title>
      <link>https://community.extremenetworks.com/t5/faqs/how-to-diagnose-and-troubleshoot-unicast-flooding/m-p/41856#M75</link>
      <description>Article ID: 5322&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
How to troubleshoot unicast flooding&lt;BR /&gt;
Find mac address&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
Unicast flooding&lt;BR /&gt;
Seeing half of conversation in sniffer trace&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
From the perspective of a passive sniffer, a non-mirrored switch port should be seen to transmit just broadcasts, multicasts, and unknowns. If sorting a sniffer Host Table analysis (in, for example, Sniffer Pro) by "In Packets", shows that any station that received packets was not seen to transmit them, or vice versa; you likely have a unicast flooding problem.&lt;BR /&gt;
&lt;BR /&gt;
Though unicast flooding will not prevent delivery of network traffic, it can be a concern from both efficiency and security perspectives.&lt;BR /&gt;
&lt;BR /&gt;
Unicast flooding on switches running in traditional mode is normally due to the lack of a Source Address Table (SAT) entry on the switch, for the destination MAC. With an unknown destination, the packet is flooded. The reasons for the lack of SATable entry, on the other hand, are not quite as clear-cut.&lt;BR /&gt;
&lt;BR /&gt;
Possible flooding scenarios: &lt;OL&gt; &lt;B&gt;Loadsharing NICs or servers&lt;/B&gt;&lt;UL&gt;using asymmetrical transmit and receive policies. 
It is not a simple matter to predict Loadsharing NIC characteristics/operation, as there are a variety of similar products in existence which are designed for load sharing and redundancy. Each of them, in turn, may have a variety of configuration options which change their functional characteristics. 
 
Many of these products do not operate well (the attached switch fails to learn its forwarding information, or mis-learns it, or continually re-learns it on different trunk ports) in a non-proprietary switched environment, but some do. 
 
Given the variety of possibilities and the fact that these products, as with just about anything in the networking world, are always evolving and thus present a moving target; we have made no comprehensive attempt to document them. 
 
However, if functional details can be provided, such as whether each of the NICs in each cluster transmits and/or receives, the source MAC structure on layer 2 of each transmitted packed, and the source MAC/IP structure on layers 3 &amp;amp; 4 of each transmitted packet, we can assess how well they would function with switches not specifically designed to accommodate them. 
 
In the absence of these details, then a perhaps 30-second Sniffer Pro-readable sniffer trace local to each of the separate NICs in the cluster should tell the tale. &lt;B&gt;UDP traffic&lt;/B&gt;&lt;UL&gt;doesn't require acknowledgements, so knowledge of the destination MAC could time out during a long file transfer.&lt;/UL&gt; &lt;B&gt;Multiple routers in a redundantly routed network&lt;/B&gt;&lt;UL&gt;can send both ends of a conversation through different paths, resulting in an asymmetric flow of traffic, isolating some switches from knowledge of certain end stations.&lt;UL&gt; 
&lt;LI&gt;Using both a centrally based router serving as a default gateway,&lt;I&gt;and&lt;/I&gt; a firewall router that &lt;I&gt;also has direct access&lt;/I&gt; to the local stations' network; what can happen is that outgoing traffic will first hit the central router, which will map to the firewall router, and out of the network. The return trip will first go to the firewall router, which will then talk directly to the local station, bypassing the central router. 
&lt;/LI&gt;&lt;LI&gt;When using a standby router protocol such as VRRP or HSRP, even if there is no failover, there are not necessarily any guarantees (especially in a multipath, equal-cost scenario) as to how the traffic will be &lt;I&gt;returned&lt;/I&gt; from the remote side of load-sharing routers. If the "wrong" path is chosen, we again have an asymmetric flow.&lt;/LI&gt;&lt;/UL&gt;Additional points to consider, regarding layer 3 behavior: &lt;UL&gt; 
&lt;LI&gt;If in examining the layer 2 information of flooded frames, either source or destination MAC consistently references a router&lt;B&gt;;&lt;/B&gt; or, in examining layer 3 you find that the source and destination networks consistently differ&lt;B&gt;;&lt;/B&gt; or you see multiple router MACs bound to a single IP address&lt;B&gt;;&lt;/B&gt; then asymmetrical routing is a good possibility. 
&lt;/LI&gt;&lt;LI&gt;Is there more than one layer 3 router with direct access to the layer 2 fabric in question? A simple test would be to examine primary and secondary IP network numbers for all router ports in the network. 
&lt;/LI&gt;&lt;LI&gt;IP Routers generally, by default, send out an ICMP Redirect frame to an originating station, if they know of a more preferable path than themselves. Do the routers have ICMP redirect enabled, and are they running a routing awareness protocol such as RIP? What are the statically configured routes? 
If an end station has a self-referencing default gateway, it will ignore ICMP redirects. In that event, it will also need a router running proxy ARP, in order to communicate out of the local network.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt; &lt;B&gt;Asymmetrical VLAN flow / Port Overlapping&lt;/B&gt;&lt;UL&gt;(cross-vlan, within a switch) using separate FIDs for each VLAN. Unicast flooding would be likely if the VLAN used in one direction of traffic flow differs from the VLAN used in the opposite direction of traffic flow.&lt;/UL&gt; &lt;B&gt;Overflowing Source Address tables.&lt;/B&gt;&lt;UL&gt;Most devices have a capacity for at least 4000 addresses.&lt;/UL&gt; &lt;B&gt;STP Aging Time (&lt;I&gt;&lt;/I&gt;&lt;/B&gt;&lt;PRE&gt;&lt;B&gt;&lt;I&gt;dot1dTpAgingTime&lt;/I&gt;&lt;/B&gt;&lt;/PRE&gt;) is consistently being flushed&lt;UL&gt;down from 300 seconds to 15 seconds, as a result of Spanning Tree Topology Change events.&lt;/UL&gt;&lt;/UL&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Possibilities: &lt;UL&gt; 
&lt;LI&gt;Use Loadsharing/Teaming software that utilizes a Multicast (rather than Unicast) destination MAC, and scope that traffic to a VLAN or to a set of ports (&lt;A href="http://bit.ly/1r9B2Zl" target="_blank" rel="nofollow noreferrer noopener"&gt;5708&lt;/A&gt;). 
&lt;/LI&gt;&lt;LI&gt;Ensure that the firewall router goes back through the central router in order to access the local network. 
&lt;/LI&gt;&lt;LI&gt;Plug both routers into the same switch. 
&lt;/LI&gt;&lt;LI&gt;Take advantage of the fact that both routers and end stations have to keep an active ARP entry of the next hop. If you set the ARP timeout of the router (20 minutes by default, on the X-Pedition router) or affected end station (10 minutes by default, on UNIX machines) similar to the SAT timeout of the switches (usually 5 minutes by default), there will be sufficient knowledge of the whereabouts of end stations to prevent flooding. 
&lt;/LI&gt;&lt;LI&gt;Set up a UNIX &lt;PRE&gt;cron&lt;/PRE&gt; job to periodically ping out of the "silent" station (using the "silent" MAC!) to a non-existent IP host on its subnet, thereby ARPing to all devices, making them aware of its location. 
&lt;/LI&gt;&lt;LI&gt;Set up a UNIX &lt;PRE&gt;cron&lt;/PRE&gt; job to periodically ping the "silent" station. 
&lt;/LI&gt;&lt;LI&gt;Use a common FID - SVL mode - among VLANs that share traffic within a switch.&lt;/LI&gt;&lt;/UL&gt;Supporting documentation: &lt;UL&gt; 
&lt;LI&gt;&lt;A href="http://bit.ly/1nN0jbl" target="_blank" rel="nofollow noreferrer noopener"&gt;2839&lt;/A&gt;, "Flooding Unicast Traffic due to Load-sharing NICs" 
&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://bit.ly/1iwHISK" target="_blank" rel="nofollow noreferrer noopener"&gt;4918&lt;/A&gt;, "In 802.1Q, what is the difference between IVL and SVL? 
&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://bit.ly/1qBRX96" target="_blank" rel="nofollow noreferrer noopener"&gt;3460&lt;/A&gt;, "Changing Source Address Time-out on Switches and Bridges" 
&lt;/LI&gt;&lt;LI&gt;For a switch, use SPEL/EMAN's &lt;I&gt;Device / Find Source Address&lt;/I&gt; to query for a MAC address. The SATable source port will blink. 
&lt;/LI&gt;&lt;LI&gt;For a switch, use SPEL/EMAN's &lt;I&gt;Device / Bridge Status / Bridge / Filtering Database&lt;/I&gt;to view the SATable, and/or to configure a 'Static Filtering Database' entry. 
&lt;/LI&gt;&lt;LI&gt;For a SmartSwitch 2nd/3rd Gen running 5.01.33 firmware or higher, the &lt;PRE&gt;Network Tools&lt;/PRE&gt; command '&lt;PRE&gt;show mac&lt;/PRE&gt;' can be used to view the SAT, including FID identifier; plus it has sub-commands for granularity. 
&lt;/LI&gt;&lt;LI&gt;Use SPEL/EMAN's &lt;I&gt;Device / System Group / Other Groups / Net to Media Table&lt;/I&gt; to view the ARP Cache, aka &lt;I&gt;ipNetToMediaTable&lt;/I&gt; (this might help). 
&lt;/LI&gt;&lt;LI&gt;For a SmartSwitch, the &lt;PRE&gt;Network Tools&lt;/PRE&gt; command '&lt;PRE&gt;show ip&lt;/PRE&gt;' can be used to view the ARP Cache, aka &lt;I&gt;ipNetToMediaTable&lt;/I&gt;, plus other misc data.&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;</description>
      <pubDate>Sat, 28 Jun 2014 00:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/how-to-diagnose-and-troubleshoot-unicast-flooding/m-p/41856#M75</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-06-28T00:05:00Z</dc:date>
    </item>
  </channel>
</rss>

