Answer the question
In order to leave comments, you need to log in
What can be done to avoid Unicast-flood?
We have a server with virtualization based on libvirt, virtual interfaces are in the bridge, at the moments when there is a flood on the IP address, example:
17:21:55.773491 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 44574+ A? 17FyFh1d.asus.com. (35)
17:21:55.773994 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 35700+ A? B5kNtUhz.asus.com. (35)
17:21:55.774435 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 48282+ A? 7IySjYHY.asus.com. (35)
17:21:55.774964 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 7106+ A? sN2c7Rsg.asus.com. (35)
17:21:55.775386 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 39958+ A? OMUj7mRD.asus.com. (35)
17:21:55.775917 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 30218+ A? mTgSmay5.asus.com. (35)
17:21:55.776378 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 29452+ A? CTTk9PUW.asus.com. (35)
17:21:55.776854 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 751+ A? T360Nv6T.asus.com. (35)
17:21:55.777246 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 39873+ A? YrFGRylE.asus.com. (35)
17:21:55.777747 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 31386+ A? IFYzDYVr.asus.com. (35)
17:21:55.778284 IP 94.41.XX.XX.3090 > 109.XX.XX.XX.53: 55326+ A? Otnb2tdw.asus.com. (35)
Answer the question
In order to leave comments, you need to log in
And at the same time turn off the server, the flood develops into a Unicast flood and spreads to all virtual interfaces on the server, in some cases to the entire vlan,If I understand you correctly, it means unknown unicast flood.
What can be done on the active equipment side to avoid such problems in automatic mode?I do not understand your focus on the active equipment. In my opinion, it is more constructive to first try to solve the problem at the virtualization level. It seems that the virtualization environment provides more convenient tools for automation (ie various scripts and/or APIs). If the above (setting a static entry in the mapping table MAC address <-> switch interface; setting a filtering entry in the same table, see the cisco analogue mac address-table static MACADDRESS vlan VLANID drop; filtering based on L3 data) will not work to implement on a virtualization server, you can try to filter traffic up to 109.XX.XX.XX.53 on higher-level equipment, but I doubt that this can be conveniently automated.
In the example, it meant that 109.XX.XX.XX is IP, 53 is port,Sorry, I overlooked. This is exactly why I don't like tcpdump output and prefer dumping pcap files.
network engineers of the Data Center say that they have set the setting for vlan and switches in the DC "mac-address-table aging-time = 14400"It is this, in my opinion, that makes the most significant contribution to the problem. When you turn off your server, the DC switch will send you traffic addressed to the server for another 4 hours. The value of 14400 was chosen, most likely, in order to avoid the problems of inconsistency between the arp table and the MAC address table when using ECMP and FHRP (a fairly common problem in a DC environment). This is the default value for the lifetime of an arp entry in cisco devices, if my memory serves me.
The situation is saved by a request to block the attacked IP on the active equipment, or you can use ebtables to prohibit forwarding packets to the attacked IP address, then the traffic will simply go to the main interface of the physical server without affecting the virtual servers. Both options are not an option since they require the constant presence of both network engineers in the DC, and bring problems on the physical server, and therefore I would like to know if it is possible to automatically avoid such problems from the network equipment.I have not yet figured out what problems filtering traffic with ebtables leads to on a physical server. You need to understand that either this traffic (malicious, junk) somehow filters the DC (for this, it must first identify this malicious traffic by some criteria, and it’s not a fact that its criteria will match yours), most likely for additional money (anti-DDoS service), or this traffic reaches the equipment under your control, and then you already filter it as you see fit.
No traffic can be filtered because this is not our traffic, but traffic towards the client who rented the VDS. For the same reason, you cannot block someone for incoming packets,I don't understand why you can't filter client traffic. Almost everyone does this. When a server rented for $100 a month receives 10 gigabits/s of traffic or more, as a rule, the traffic to it is blocked for the simple reason that the traffic costs exceed the income from the client. In addition, often such traffic threatens the infrastructure itself. You asked a question regarding anti-DDoS. What is it, if not traffic filtering?
If I understand this whole thread correctly, then the following happens:
1. You had traffic to a certain mac-address xxxx.yyyy.zzzz Everything was ok.
2. At some point in time, the client turns off the machine with this mac-address
3. Traffic arrives at the switch, sees the entry "look for the mac-address xxxx.yyyy.zzzz on such and such a port." Sends this traffic to the server. Everything is legal. (and will send this traffic until this mac is expired)
4. Traffic arriving at the server comes to the bridge. Apparently your bridge is configured in such a way that unknown unicast traffic begins to poke into all subinterfaces / interfaces to find - what if there is a receiver for this address. That is, this traffic begins to multiply.
5. If you have a double connection to the switch, then the traffic can fly back to the vlan, and pretty much multiplied.
How to solve the problem. I can say for sure - this is not a problem with L2 and L3 equipment. This is a linux bridge issue. Deal with the bridge and do not touch the DC engineers.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question