ā06-25-2019 05:46 AM - edited ā06-25-2019 05:59 AM
We've configured port security in a 3650 switch using switchport port-security maximum 2, just a day after the configuration people started to state there is no network
investigating with show interfaces status showed error-disabled for some ports
checking show mac address-table interface gigabitEthernet x/x/x on the disabled ports gave a 2 mac addresses one of them is the intended machine and the other is not, say the intened is FF:F1 and then non intended is AA:AA
checking the mac address table on the other ports with the error-disabled status also showed the intended mac for the machine say FF:F2 but also has the second mac AA:AA
*each disabled port showed the the right machine and the AA:AA mac
for curiosity we changed config to switchport port-security maximum 3, and shutdown then no shutdown, this locked the ports again and shows the intended mac FF:F1 and the unintended AA:A1 and another unintended AA:A2
we added the maximum to 5 and we get a variety of nice fake/unintended mac addresses, the environment is large and its hard to check if the unintended mac is a real machine with an issue
also arp -a on the computers doesn't show the fake mac address
the issue is with stacked pairs of catalyst 3650 switches
the environment have citrix VDI running on HP thin-clients, printers and normal computers
the port security config is
per port:
switchport port-security
switchport port-security maximum 2
global config:
errdisable recovery cause bpduguard
errdisable recovery cause link-flap
errdisable recovery cause psecure-violation
errdisable recovery cause mac-limit
errdisable recovery interval 1800
the version of the IOS running is:
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
* 1 28 WS-C3650-24PD 03.03.05SE cat3k_caa-universalk9 INSTALL
the question is, how do i troubleshoot this issue?
Solved! Go to Solution.
ā07-17-2019 04:08 AM
it seems that we have found the culprit, we are still testing the issue so nothing is sure yet
here's the link for the thread:
i'd recommend checking it out for anyone facing the same issue that we had
ā07-25-2019 03:16 AM
well as @moe52689 stated the problem was actually a feature from sccm
quote:
"The redirection is achieved by the manager computer broadcasting an Ethernet frame that uses the sleeping computerās MAC address as the source address. This makes the network switch behave as if the sleeping computer has moved to the same port that the manager computer is on. The manager computer also sends ARP packets for the sleeping computers to keep the entry fresh in the ARP cache. The manager computer will also respond to ARP requests on behalf of the sleeping computer and reply with the MAC address of the sleeping computer.
Warning:
During this process, the IP-to-MAC mapping for the sleeping computer remains the same. Wake-up proxy works by informing the network switch that a different network adapter is using the port that was registered by another network adapter. However, this behavior is known as a MAC flap and is unusual for standard network operation. Some network monitoring tools look for this behavior and can assume that something is wrong. Consequently, these monitoring tools can generate alerts or shut down ports when you use wake-up proxy.
Do not use wake-up proxy if your network monitoring tools and services do not allow MAC flaps"
after disabling this feature the network went normal and this issue never emerged anymore.
ā06-25-2019 06:02 AM
Hello
What device is connected to that port(s) - The OUI suggests an HP device
ā06-25-2019 11:30 PM
a HP computer but hte NIC is realtech lan card with another mac address, same goes to the rest of the ports
ā06-25-2019 06:03 AM
Hi
that software is 5 years old should be updated to something newer and more stable, could be buggy behavior but i would check the OUI of these fake MACs what exactly it belongs too the vendor may give an idea where there coming from , the fact VDI is running may be the cause or if virtual systems are been ran on the PCs themselves so the 2 macs would be increased significantly
ā06-25-2019 11:33 PM
we agree about the old IOS, the OUI of the mac stated an HP card but we dont have HP nics in the network, ports with vdi machines are set to 2 max mac adresses which is sufficient i suppose
ā06-26-2019 07:52 AM
ā06-25-2019 07:36 AM
Hello AMACOMX,
to see the same MAC address on several ports is unlikely (unless virtual machine are cloned including their MAC address).
Also when you increase the MAC limit additional MAC addresses are seen.
The IOS XE version is quite old and I agree with Mark you need to upgrade the IOS XE as first step.
You need also to verify how many MAC addresses per port are used with VDI if any virtual machine is running on the clients you may need more MACs allowed per port.
Hope to help
Giuseppe
ā06-25-2019 11:39 PM
guess i'll start with discussing the IOS upgrade with the decision makers, and about the VDI i think 2-3 mac adresses are ok, but when we raised max to 5 it was populated with mac addresses. another point taken while we were investigating, when we removed port security and restarted the switch, each port have one (the right) mac address, this behavior happens only when the port security is configured
ā06-27-2019 03:58 AM - edited ā06-27-2019 04:08 AM
ā06-27-2019 04:28 AM
Hello moe52689,
the initial switches were C3650?
you have moved to a stack of C2960 with a different IOS version and you still have the same issue?
Hope to help
Giuseppe
ā06-27-2019 05:02 AM
The switch is a single it's not a stacked switch, but yes we changed the switch from C3650 to C2960X and we are still facing the same issue
same configuration as @AMACOMX have posted before
Bare in mind that i have port fast and BPDU guard Configured on that switch per port
ā06-27-2019 09:33 AM - edited ā06-27-2019 09:35 AM
Hello,
can you setup a SPAN session with source a port with this configuration to see if these "fake" MAC addresses are real or not ?
I am not sure that is possible to use a port with port security as a source port for a SPAN session but I would try.
If you can demonstrate that those MAC addresses are not seen on wire you can say there is an issue on the switch side.
Hope to help
Giuseppe
ā07-02-2019 12:03 AM
we are currently searching more into the problem and so far there are other posts with issues appealingly like our's, we are reading more into the span session to understand it more
ā07-02-2019 01:08 AM
Hello,
on a side note, you might be undergoing some sort of MAC and/or ARP spoofing attack. You could try and enable DAI (Dynamic ARP Inspection) on your switches, and check if the behavior changes. Below is a sample config:
2960#conf t
2960(config)#ip arp inspection vlan x
2960(config)#interface range FastEthernet0/1 - 24
2960(config-if-range)#ip arp inspection trust
ā07-11-2019 12:58 AM
we currently updated a switch's IOS to 3.6.10E, and renabled port security, so far 2 days the behavior didn't happen, but we didnt put the port security on the ports with citrix thinclients and printers yet. we are adding them phase by phase currently
so thank you all about recommending the IOS update... we will update you again when we add the port security on all ports and again when we test on another switch stack
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide