cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
844
Views
0
Helpful
3
Replies

Nexus 6k ICMP Copp Violations: Identifying the Source IPs

CiscoMedMed
Level 1
Level 1

I ran into ping responsiveness problems on my Nexus 6ks last week. I think I know the cause - waiting for a change window to address that. But in the meantime I'd like to know - what's the least impactful means of finding out what the sources addresses are of those ICMP Copp policy violations? IP accounting? Access lists with permits and logs? Some command for Copp that would output say 500 samplings of the violation traffic? Thank you. 

1 Accepted Solution

Accepted Solutions

CiscoMedMed
Level 1
Level 1

The answer was to use ethanalyzer to see what was hitting the control plane..

 

CORE01# ethanalyzer local interface inbound-low display-filter icmp limit-captured-frames 10000 write bootflash:icmp_cap.pcap
 
copy bootflash:icmp_cap.pcap tftp://10.1.10.15/

View solution in original post

3 Replies 3

balaji.bandi
Hall of Fame
Hall of Fame

you can do control place policy these kind of ping/ ssh /telenet attacks to the device from Local known network also, not necesary from outside network, so you can limit only certain rest can be drop and logged to syslog server and take action like send email or alerts to admin if that is exceeded.

 

example : 7K example same works nexus code.

 

https://community.cisco.com/t5/networking-documents/icmp-ping-drops-when-pinging-from-nexus-7000/ta-p/3125996

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

I'd spoken with TAC and they recommended not modifying anything about copp policies nor moving off the default. I think to log the violations I'd had to add a new policy and move off the default. No? 

CiscoMedMed
Level 1
Level 1

The answer was to use ethanalyzer to see what was hitting the control plane..

 

CORE01# ethanalyzer local interface inbound-low display-filter icmp limit-captured-frames 10000 write bootflash:icmp_cap.pcap
 
copy bootflash:icmp_cap.pcap tftp://10.1.10.15/