cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1288
Views
0
Helpful
5
Replies

high cpu due to ipv6 multicast traffic from clients in cisco 4506-E switch

vijay kumar
Level 2
Level 2

Hi Folks ,

We are facing high cpu (always 99%) in our cisco 4506-E switches. Then found that huge ipv6 multicast packets are hitting to switch CPU.

 

Index 1:

36 days 18:9:45:440850 - RxVlan: 102, RxPort: Te1/1

Priority: Normal, Tag: Dot1Q Tag, Event: 21, Flags: 0x40, Size: 90

Eth: Src A0:48:1C:86:78:7A

Index 2:

36 days 18:9:45:442373 - RxVlan: 102, RxPort: Te1/1

Priority: Normal, Tag: Dot1Q Tag, Event: 21, Flags: 0x40, Size: 90

Eth: Src F0:92:1C:F2:91:CE Dst 33:33:FF:27:F3:C2 Type/Len 0x86DD

Index 3:

 

 

Is there a way that we can configure in switch to not process theese packets. Or only way to disable IPV6 functionality in clients?

 

Thanks,

Vijay.

 

5 Replies 5

LJ Gabrillo
Level 5
Level 5

Hi Vijay,

I doubt that the cause of that high CPU is the multicast addresses. There might be a loop in your network. 
Kindly do isolation of each of your backbones.

one-by-one, remove your backbones from the different switches, while constantly doing "show processes cpu" 

Once you hit a backbone that suddenly decreases the CPU, your loop is in that segment. Try to find it.

Hi Isgabrillo ,

 

Thanks for your suggestion .We didn't see any STP TCN in our switches . The  debug previously I have posted has packets from uplink. But we able to see lot of traffic from access ports (Connected with end machines) also.All the packets destined to IPV6 multicast address 33:33:FF:27:F3:C2.

 

ndex 1:
36 days 17:47:37:910324 - RxVlan: 102, RxPort: Gi4/27
Priority: Normal, Tag: No Tag, Event: 21, Flags: 0x40, Size: 90
Eth: Src A0:48:1C:86:38:97 Dst 33:33:FF:27:F3:C2 Type/Len 0x86DD

 

Index 4:
36 days 17:47:37:921663 - RxVlan: 102, RxPort: Gi4/29
Priority: Normal, Tag: Dot1Q Tag, Event: 21, Flags: 0x40, Size: 90
Eth: Src A0:48:1C:86:7A:BE Dst 33:33:FF:27:F3:C2 Type/Len 0x86DD

Hi

I would recommend tracking down whoever owns that mac address: 33:33:FF:27:F3:C2
a show arp should do the trick

Now, try removing that host/server for a short time, see if the CPU improves (like to normal levels)
worse case that MAC may be a security/virus beach considering it continually asks other hosts for data.

i would suggest create an acl to drop this mac address to prevent the high cpu quickly.

use vacl right away.

Hello. I have same issue with 4500. I found port that send traffic, shutdown it and cpu load normalized.

User said that some time before he send pc to sleep.

Is you found any reason of traffic? 

Review Cisco Networking for a $25 gift card