01-27-2022 06:05 AM
Hello,
We recently have had issues of where IP tracking was causing some Windows PCs and IOT devices to detect (falsely) that another device was using the same IP, and so in the case of Windows the user would see a duplicate IP message, and in the case of the IoT device, it would drop from the network for an hour.
We opened a TAC case and they showed us how to disable IP tracking so those problems are gone.
BUT!!
From a DNA center perspective what are losing by disabling IP tracking?
Thanks for any advice or ideas you can share.
Pete
01-27-2022 10:34 AM
From a DNA center perspective what are losing by disabling IP tracking?
-Adding some opinions here. IMO disabling IPDT does not gain you much, if anything it hurts you. IPDT is a critical feature that enables snooping and device tracking. IPDT is a key component in device context visibility. Not only does it learn an endpoint's IP, but it allows the ability to do the following too: Map IPs to access sessions, plays a role in dacls/acls, plays a role in device profiling, and url redirection among other items. See here for more info (section Device Tracking): ISE Secure Wired Access Prescriptive Deployment Guide - Cisco Community
Lastly, I personally think IPDT aides in troubleshooting. HTH!
01-27-2022 02:23 PM
I didn't think IPDT would have any influence on end hosts since it's just a database stored in the switch, and not as if the host can access that information in anyway. So I did some research and found:
which explains:
"If the switch sends out an ARP Probe for the client while the host (for example, a Microsoft Windows PC) is in its Duplicate-Address Detection phase, the host detects the probe as a duplicate IP address and presents the user with a message that a duplicate IP address was found on the network. The PC might not obtain an address, and the user must manually release/renew the address, disconnect and reconnect to the network, or reboot the PC in order to gain network access.'
With a recommendation of configuring a delay for the probes: "ip device tracking probe delay 10"
Did you try that command already? That sounds like a nice option so that you can keep IPDT enabled.
01-28-2022 02:06 AM
After looking around, we found that disabling IP tracking wasn't necessary with these two commands:
New format (newer switches):
device-tracking tracking auto-source fallback 0.0.0.1 255.255.255.0
Old format (older switches):
ip device tracking probe auto-source fallback 0.0.0.1 255.255.255.0
This gave us everything we wanted. Keep IP Tracking enabled and stopped the IoT devices from dropping off the network.
At first we tried creating a policy and attached it to the interface where IoT devices lived and the trunks, but we were worried how this would affect other devices. It worked in stopping the errors from the IoT devices but we weren't sure if other devices were also being affected.
device-tracking policy IPDT_disable
trusted-port
device-role switch
Attach policy:
interface X
device-tracking attach-policy IPDT_disable
We hope this will help someone else someday
10-19-2023 01:02 AM
Hi Pete,
about "device-tracking tracking auto-source fallback 0.0.0.1 255.255.255.0"
was the switch a layer 2 only switch or did it provided layer 3 functionalities as default gateway for the attached devices?
Regards
MM
10-19-2023 02:04 AM
10-19-2023 02:48 AM
Thanks for the reply!
My aim is to reproduce the same behavior that I used to see on first IOS-XE switches before SISF introduction.
On old IOS-XE switches running legacy IPDT, device tracking was enebled by default on 802.1x configured ports and we had to arrange probe timers in order to avoid the 0.0.0.0 duplicate address issue.
On the newer switches device tracking is not enabled when configuring 802.1x on an access port.
What I do is to configure a very simple policy
device-tracking policy IPDEVTRACK
no protocol udp
tracking enable
and attach it just to access ports on which we enabled 802.1x.
We do not explicitally disable tracking on trunk ports.
What I am seeng is that:
1)No issues about duplicate ip address even on thw switches on which
we forgot to use
device-tracking tracking auto-source fallback 0.0.0.1 255.255.255.0
2)No issues on CPU
To be honest I am not able to understand why every thing is working (dhcp snooping is disabled).
Regards
MM
11-21-2023 05:27 PM
Late to the party here but according to release notes, the newer SIFS has the probe delay "Set to the default value, and cannot be changed."
I am guessing the default value is the recommended 10 second delay to avoid issues with Windows without having to deal with sourcing from a different SVI/unique IP. I am guessing @Pete89 is running an older version which does not implement the delay properly. There are some older IOS 15 configuration guides which mention the probe delay being preferred over the source interface configuration so it makes sense that this would be default otherwise the default DNA configuration of IPDT would cause a ton of issues.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide