SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
Nafeez Islam
Assistant Manager
NovoCom Limited
▪ Once in a while network engineers working in IIGs or ISPs in Bangladesh have to face
a phenomenon: a switching loop . In our part of the network backbone which is
switch based ,we have all the recommended loop prevention mechanisms. Even
after that sometimes broadcast storm takes places. The paper discusses my findings
on what may have caused this occurrences and my recommendations. I wrote about
this topic for the first time 14 months back on LinkedIn as an article. I believe the
topic is still relevant.
▪ In our NovoCom and InterCloud’s networks, at the switching backbone we have RSTP
running.
▪ Furthermore the switching network has a tree like topology, there are no rings.So
even with STP disabled, there is no scope of loop occurring.
▪ But no matter how unlikely it seems ,sometimes we face broadcast storms.
▪ These broadcasts come to us from our partner networks. The affected devices are
our partner/client facing switches.
▪ More often than not, we are compelled to connect to our clients or partners at their
switches rather than their routers.
▪ These networks may be fully switch-based and may connect to other
uplinks/partners/clients through their switches. They even might have their STP
disabled .
▪ When the loop occurs, one or multiple of our switches have almost 100 CPU
utilization, management IPs become unreachable and all clients in these devices
face up to 100 percent packet loss.
▪ With this 100 CPU utilization, it does not remain possible to check logs and interface
traffics to isolate what traffic is causing this outage.
▪ Upon accessing the switches we have to manually/ or physically shut down clients
and partners to see that disconnecting which network makes things normal again.
▪ Very time consuming process.
▪ It is quite frustrating to see our network being affected even after having the
recommended design and configurations.
▪One interesting matter: we come to know in real time or
later that several service providers are facing the same
issue at exactly the same time.
▪In the earlier days ,we used to think something like this is
happening :
▪ But even if the networks are
physically connected in this manner,
loop should not take place.
▪ It is because in our network we follow
a strict policy of allowing specific
VLANs in client-connected interfaces
and a specific VLAN is never
repeated.
▪ So in the diagram, VLANs allowed at
Interface A do not exist at Interface Z.
▪ Therefore broadcast domains are
completely separated.
▪ To understand it, I performed some very simple tests with BDCOM switches. I used
BDCOM(tm) S5612 Software, Version 2.2.0C Build 42666. Here are a few of the
findings:
▪ When intentionally loops are created, BDCOM switches can detect and prevent loops
just fine with STP running.
▪ I used a ring of 4 switches to create loop for specific VLANs, running STP even at
only 1 of the switches still prevented loops by blocking certain interfaces.
▪But the problem occurs when the scenario is
something like this in my lab test:
▪ I created loop intentionally at A and B
to see how it affects Switch Z.
▪ Here the circled portion replicates a
network which is connected to us but
we have no control over their
STP/VLAN policies.
▪ But our focus is switch Z . Switch Z
resembles our device which is
connected to client/partner.
▪ A single ping to a non-existent IP
creates a broadcast storm at switches
A and B and takes CPU utilization to
100 percent.
▪ The broadcast storm is occurring in
VLANs 1 and 200.But Switch Z should
be discarding every packet which do
not have tag of VLAN 500.
▪ So switch Z itself is not taking part in
the loop. But it still gets unreachable,
and CPU utilization becomes 100
percent.
▪ Switch Z could have saved itself if STP
could block the port connected to
switch A. But a switch detects loops
(when STP is enabled) when it sends
out BPDU and receives that BPDU on
another port.
▪ But switch Z is not getting its own
BPDU back from switch A via interface
Z which it had sent out through other
interfaces.
▪ So there is no reason for STP to
conclude that there is any loop, and
so does not take the interface into
BLK mode.
▪ A single ping from switch A/B to a
non-existent IP creates about 600
Mbps traffic at the connected
interface of Switch Z.
▪ Switch Z is supposed to discard these
broadcast packets as the packets do
not belong to VLAN 500,but it still has
to check every frame,check VLAN tag
and then drop. Dealing with so many
broadcasts leads to CPU utilization of
100 percent.
▪ I captured packets from interface Z
and they are all broadcasts
▪ Afterwards I replaced BDCOM with
Cisco Me3400 and used it as Switch Z.
The result is the same , a spike in CPU
utilization over 95 percent.
▪ When a router receives a broadcast,
the router simply drops it. Even if I
connect a router (a Mikrotik CCR
1016-12G for my test) , it results in
very high CPU utilization.
▪ And all of these are happening from a
broadcast storm which was created by
just 1 single ping.
▪So what actually happens to affect
several service provider networks at the
same time is something like this:
▪ Not only the broadcast storm
originator network,but all the
attached networks are affected.
▪ During real L2 looping incidents, we
find multiple of our switches getting
unreachable.
▪ But in my lab setup, when I connect
another switch X with switch Z shown
in diagram below, only switch Z gets
unreachable ,switch X is not affected.
▪ An explanation to this in my opinion
is, in my LAB tests and in our own
production environment, we allow
only specific VLANs at all interfaces
▪ . Therefore although the directly
connected switch has 100 percent
CPU utilization, it does not propagate
the broadcasts to the next switch.
▪ But my assumption is that many networks may leave all the trunk interfaces at
default config and allow all VLANS including vlan 1.
▪ If a network Q is such network and is connected to a broadcast storm originator
network P, then a broadcast storm from its neighbor network P will not only affect
its edge switch, but will reach farthest corner of its network.
▪ As a result all other networks are connected to different switches of network Q are
also affected.
▪ May be this why the looping incidents are on such a large scale and takes down so
many networks at the same time.
▪ (1 )Never disable STP in your switching network.
▪ It is almost never advisable to disable STP. If you want to make STP convergence
faster you can use the Portfast and BPDU Guard commands at the interfaces where
routers/servers/PCs are connected. But disabling STP all together is not
recommended.
▪ One reason for keeping STP disabled I assume is, having many VLANs in the network
and having a complete control of the traffic flow direction.
▪ (1 )Never disable STP in your switching network.
▪ Another reason of STP disabling could be efficient use of all device ports and
links,because STP may keep some ports blocked.
▪ However this can be done by using PVST+ and manually changing primary root
bridges and secondary root bridges for each VLAN.
▪ For this an extensive and thorough planning is required, but this will enable you to
dictate traffic flow for each VLAN as per your preferences.
▪ (2)Connect with your client/partner/peer at their routers rather than their
switches.
▪
▪ Running STP will not save you if your directly connected network is the broadcast
storm originator. So try to persuade your client/partner so that you can connect at
their router. Your switch will never have to face a storm.
▪ (3) Using keepalive command:
▪ It is advised to apply the ‘keepalive’ command at the client facing interfaces.
▪ If the neighboring switch has 100 percent CPU utilization due to broadcast storm, it
will be unable to return back the keepalive query. This command then shuts the
interface down and protects itself.
▪ In my lab tests, the keepalive command worked in 4 out of 6 cases to shut down the
interface before being affected by broadcast storm.
▪ These conclusions are based on my own observations and studies.
▪ Findings from lab tests.
▪ Many other factors may contribute in production environment.
▪ Even after deploying all loop prevention mechanisms ,you may still face broadcast
storms.
▪ These broadcast storms would originate in your neighbor network over which you
have no control .
▪ Will affect your directly connected devices.
▪ Following the recommendations may save you in such scenarios.

Más contenido relacionado

La actualidad más candente

High Speed Fiber Services and Challenges to the Core Network by Seiichi Kawamura
High Speed Fiber Services and Challenges to the Core Network by Seiichi KawamuraHigh Speed Fiber Services and Challenges to the Core Network by Seiichi Kawamura
High Speed Fiber Services and Challenges to the Core Network by Seiichi Kawamura
MyNOG
 
Wn0708 additions2
Wn0708 additions2Wn0708 additions2
Wn0708 additions2
abhinav268
 
Airtel ES Case Study 2
Airtel ES Case Study 2Airtel ES Case Study 2
Airtel ES Case Study 2
Airtel India
 
09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem 09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem
William Norton
 
Understanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetUnderstanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the Internet
William Norton
 

La actualidad más candente (20)

Broad Sky SD-WAN September 2018
Broad Sky SD-WAN September 2018Broad Sky SD-WAN September 2018
Broad Sky SD-WAN September 2018
 
Services of btcl
Services of btclServices of btcl
Services of btcl
 
IPv6 Deployment Update
IPv6 Deployment UpdateIPv6 Deployment Update
IPv6 Deployment Update
 
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
 
High Speed Fiber Services and Challenges to the Core Network by Seiichi Kawamura
High Speed Fiber Services and Challenges to the Core Network by Seiichi KawamuraHigh Speed Fiber Services and Challenges to the Core Network by Seiichi Kawamura
High Speed Fiber Services and Challenges to the Core Network by Seiichi Kawamura
 
Wn0708 additions2
Wn0708 additions2Wn0708 additions2
Wn0708 additions2
 
Airtel ES Case Study 2
Airtel ES Case Study 2Airtel ES Case Study 2
Airtel ES Case Study 2
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 
Beginners: Different Types of Service Providers (SPs)
Beginners: Different Types of Service Providers (SPs)Beginners: Different Types of Service Providers (SPs)
Beginners: Different Types of Service Providers (SPs)
 
Smsdg layout & functioning
Smsdg layout & functioningSmsdg layout & functioning
Smsdg layout & functioning
 
PLNOG 8: Robert Shore - Dynamic Optical Networking
PLNOG 8: Robert Shore - Dynamic Optical Networking PLNOG 8: Robert Shore - Dynamic Optical Networking
PLNOG 8: Robert Shore - Dynamic Optical Networking
 
Internet peering, graphics only
Internet peering, graphics onlyInternet peering, graphics only
Internet peering, graphics only
 
Simplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTESimplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTE
 
wp244
wp244wp244
wp244
 
09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem 09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem
 
Understanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetUnderstanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the Internet
 
Traffic Engineering for CDNs
Traffic Engineering for CDNsTraffic Engineering for CDNs
Traffic Engineering for CDNs
 
The Future of Internet Exchange Points - NANOG 47
The Future of Internet Exchange Points - NANOG 47The Future of Internet Exchange Points - NANOG 47
The Future of Internet Exchange Points - NANOG 47
 
The Stories of IXP Development and the Way Forward by Che-Hoo Cheng
The Stories of IXP Development and the Way Forward by Che-Hoo ChengThe Stories of IXP Development and the Way Forward by Che-Hoo Cheng
The Stories of IXP Development and the Way Forward by Che-Hoo Cheng
 
The VoLTE User Experience--Better or Worse
The VoLTE User Experience--Better or WorseThe VoLTE User Experience--Better or Worse
The VoLTE User Experience--Better or Worse
 

Similar a Broadcast storms in service provider network, Nafeez Islam

Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
irbas
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
irbas
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 
Securing networks with private vla ns and vlan access control lists
Securing networks with private vla ns and vlan access control listsSecuring networks with private vla ns and vlan access control lists
Securing networks with private vla ns and vlan access control lists
1 2d
 

Similar a Broadcast storms in service provider network, Nafeez Islam (20)

Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routing
 
Inter vlan routing plus configuration
Inter vlan routing plus configurationInter vlan routing plus configuration
Inter vlan routing plus configuration
 
LI Bank Network Infrastructure cursory review
LI Bank Network Infrastructure cursory reviewLI Bank Network Infrastructure cursory review
LI Bank Network Infrastructure cursory review
 
23.pptx
23.pptx23.pptx
23.pptx
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
 
3 2
3 23 2
3 2
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
 
An Introduction to Network Switches : Notes
An Introduction to Network Switches : NotesAn Introduction to Network Switches : Notes
An Introduction to Network Switches : Notes
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
 
23.pptx
23.pptx23.pptx
23.pptx
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwarding
 
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
 
Securing networks with private vla ns and vlan access control lists
Securing networks with private vla ns and vlan access control listsSecuring networks with private vla ns and vlan access control lists
Securing networks with private vla ns and vlan access control lists
 
OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?
 

Más de Bangladesh Network Operators Group

Más de Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 

Último

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Último (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 

Broadcast storms in service provider network, Nafeez Islam

  • 2. ▪ Once in a while network engineers working in IIGs or ISPs in Bangladesh have to face a phenomenon: a switching loop . In our part of the network backbone which is switch based ,we have all the recommended loop prevention mechanisms. Even after that sometimes broadcast storm takes places. The paper discusses my findings on what may have caused this occurrences and my recommendations. I wrote about this topic for the first time 14 months back on LinkedIn as an article. I believe the topic is still relevant.
  • 3. ▪ In our NovoCom and InterCloud’s networks, at the switching backbone we have RSTP running. ▪ Furthermore the switching network has a tree like topology, there are no rings.So even with STP disabled, there is no scope of loop occurring. ▪ But no matter how unlikely it seems ,sometimes we face broadcast storms.
  • 4.
  • 5. ▪ These broadcasts come to us from our partner networks. The affected devices are our partner/client facing switches. ▪ More often than not, we are compelled to connect to our clients or partners at their switches rather than their routers. ▪ These networks may be fully switch-based and may connect to other uplinks/partners/clients through their switches. They even might have their STP disabled .
  • 6. ▪ When the loop occurs, one or multiple of our switches have almost 100 CPU utilization, management IPs become unreachable and all clients in these devices face up to 100 percent packet loss. ▪ With this 100 CPU utilization, it does not remain possible to check logs and interface traffics to isolate what traffic is causing this outage.
  • 7. ▪ Upon accessing the switches we have to manually/ or physically shut down clients and partners to see that disconnecting which network makes things normal again. ▪ Very time consuming process. ▪ It is quite frustrating to see our network being affected even after having the recommended design and configurations.
  • 8. ▪One interesting matter: we come to know in real time or later that several service providers are facing the same issue at exactly the same time. ▪In the earlier days ,we used to think something like this is happening :
  • 9.
  • 10. ▪ But even if the networks are physically connected in this manner, loop should not take place. ▪ It is because in our network we follow a strict policy of allowing specific VLANs in client-connected interfaces and a specific VLAN is never repeated.
  • 11. ▪ So in the diagram, VLANs allowed at Interface A do not exist at Interface Z. ▪ Therefore broadcast domains are completely separated.
  • 12. ▪ To understand it, I performed some very simple tests with BDCOM switches. I used BDCOM(tm) S5612 Software, Version 2.2.0C Build 42666. Here are a few of the findings: ▪ When intentionally loops are created, BDCOM switches can detect and prevent loops just fine with STP running. ▪ I used a ring of 4 switches to create loop for specific VLANs, running STP even at only 1 of the switches still prevented loops by blocking certain interfaces.
  • 13. ▪But the problem occurs when the scenario is something like this in my lab test:
  • 14.
  • 15. ▪ I created loop intentionally at A and B to see how it affects Switch Z. ▪ Here the circled portion replicates a network which is connected to us but we have no control over their STP/VLAN policies. ▪ But our focus is switch Z . Switch Z resembles our device which is connected to client/partner.
  • 16. ▪ A single ping to a non-existent IP creates a broadcast storm at switches A and B and takes CPU utilization to 100 percent. ▪ The broadcast storm is occurring in VLANs 1 and 200.But Switch Z should be discarding every packet which do not have tag of VLAN 500. ▪ So switch Z itself is not taking part in the loop. But it still gets unreachable, and CPU utilization becomes 100 percent.
  • 17. ▪ Switch Z could have saved itself if STP could block the port connected to switch A. But a switch detects loops (when STP is enabled) when it sends out BPDU and receives that BPDU on another port.
  • 18. ▪ But switch Z is not getting its own BPDU back from switch A via interface Z which it had sent out through other interfaces. ▪ So there is no reason for STP to conclude that there is any loop, and so does not take the interface into BLK mode.
  • 19. ▪ A single ping from switch A/B to a non-existent IP creates about 600 Mbps traffic at the connected interface of Switch Z. ▪ Switch Z is supposed to discard these broadcast packets as the packets do not belong to VLAN 500,but it still has to check every frame,check VLAN tag and then drop. Dealing with so many broadcasts leads to CPU utilization of 100 percent. ▪ I captured packets from interface Z and they are all broadcasts
  • 20.
  • 21. ▪ Afterwards I replaced BDCOM with Cisco Me3400 and used it as Switch Z. The result is the same , a spike in CPU utilization over 95 percent.
  • 22. ▪ When a router receives a broadcast, the router simply drops it. Even if I connect a router (a Mikrotik CCR 1016-12G for my test) , it results in very high CPU utilization. ▪ And all of these are happening from a broadcast storm which was created by just 1 single ping.
  • 23. ▪So what actually happens to affect several service provider networks at the same time is something like this:
  • 24.
  • 25. ▪ Not only the broadcast storm originator network,but all the attached networks are affected.
  • 26.
  • 27. ▪ During real L2 looping incidents, we find multiple of our switches getting unreachable. ▪ But in my lab setup, when I connect another switch X with switch Z shown in diagram below, only switch Z gets unreachable ,switch X is not affected.
  • 28. ▪ An explanation to this in my opinion is, in my LAB tests and in our own production environment, we allow only specific VLANs at all interfaces ▪ . Therefore although the directly connected switch has 100 percent CPU utilization, it does not propagate the broadcasts to the next switch.
  • 29. ▪ But my assumption is that many networks may leave all the trunk interfaces at default config and allow all VLANS including vlan 1. ▪ If a network Q is such network and is connected to a broadcast storm originator network P, then a broadcast storm from its neighbor network P will not only affect its edge switch, but will reach farthest corner of its network. ▪ As a result all other networks are connected to different switches of network Q are also affected. ▪ May be this why the looping incidents are on such a large scale and takes down so many networks at the same time.
  • 30. ▪ (1 )Never disable STP in your switching network. ▪ It is almost never advisable to disable STP. If you want to make STP convergence faster you can use the Portfast and BPDU Guard commands at the interfaces where routers/servers/PCs are connected. But disabling STP all together is not recommended. ▪ One reason for keeping STP disabled I assume is, having many VLANs in the network and having a complete control of the traffic flow direction.
  • 31. ▪ (1 )Never disable STP in your switching network. ▪ Another reason of STP disabling could be efficient use of all device ports and links,because STP may keep some ports blocked. ▪ However this can be done by using PVST+ and manually changing primary root bridges and secondary root bridges for each VLAN. ▪ For this an extensive and thorough planning is required, but this will enable you to dictate traffic flow for each VLAN as per your preferences.
  • 32. ▪ (2)Connect with your client/partner/peer at their routers rather than their switches. ▪ ▪ Running STP will not save you if your directly connected network is the broadcast storm originator. So try to persuade your client/partner so that you can connect at their router. Your switch will never have to face a storm.
  • 33. ▪ (3) Using keepalive command: ▪ It is advised to apply the ‘keepalive’ command at the client facing interfaces. ▪ If the neighboring switch has 100 percent CPU utilization due to broadcast storm, it will be unable to return back the keepalive query. This command then shuts the interface down and protects itself. ▪ In my lab tests, the keepalive command worked in 4 out of 6 cases to shut down the interface before being affected by broadcast storm.
  • 34. ▪ These conclusions are based on my own observations and studies. ▪ Findings from lab tests. ▪ Many other factors may contribute in production environment.
  • 35. ▪ Even after deploying all loop prevention mechanisms ,you may still face broadcast storms. ▪ These broadcast storms would originate in your neighbor network over which you have no control . ▪ Will affect your directly connected devices. ▪ Following the recommendations may save you in such scenarios.