I have had the same issue in the past. The best fix for this has been to
set the Layer2/3 aging timers to be the same.

Matthew Huff wrote:
> Unicast flooding is a common occurrence in large datacenters especially with 
> asymmetrical paths caused by different first hop routers (via HSRP, VRRP, 
> etc). We ran into this some time ago. Most arp sensitive systems such as 
> clusters, HSRP, content switches etc are smart enough to send out gratuitous 
> arps which eliminates the worries of increasing the timeouts. We haven't had 
> any issues since we made the changes.
>
> After debugging the problem we added "mac-address-table aging-time 14400" to 
> our data center switches. That syncs the mac aging time to the same timeout 
> value as the ARP timeout 
>
> ----
> Matthew Huff       | One Manhattanville Rd
> OTA Management LLC | Purchase, NY 10577
> http://www.ox.com  | Phone: 914-460-4039
> aim: matthewbhuff  | Fax:   914-460-4139
>
>
>   
>> -----Original Message-----
>> From: Brian Shope [mailto:blackwolf99...@gmail.com]
>> Sent: Wednesday, June 17, 2009 5:33 PM
>> To: nanog@nanog.org
>> Subject: Unicast Flooding
>>
>> Recently while running a packet capture I came across some unicast
>> flooding
>> that was happening on my network.  One of our core switches didn't have
>> the
>> mac-address for a server, and was flooding all packets destined to that
>> server.  It wasn't learning the mac-address because the server was
>> responding to packets out on a different network card on a different
>> switch.  The flooding I was seeing wasn't enough to cause any network
>> issues, it was only a few megs, but it was something that I wanted to
>> fix.
>>
>> I've ran into this issue before, and solved it by statically entering
>> the
>> mac-address into the cam tables.
>>
>> I want to avoid this problem in the future, and I'm looking at two
>> different
>> things.
>>
>> The first is preventing it in the first place.  Along those lines, I've
>> seen
>> some recommendations on-line about changing the arp and cam timeouts to
>> be
>> the same.  However, there seems to be a disagreement on which is
>> better,
>> making the arp timeouts match the cam table timeouts, or vice versa.
>> Also,
>> when talking about this, everyone seems to be only considering routers,
>> but
>> what about the timers on a firewall?  I'm worried that I might cause
>> other
>> issues by changing these timers.
>>
>> The second thing I'm considering is monitoring.  I'd like to setup
>> something
>> to monitor for any excessive unicast flooding in the future.  I
>> understand
>> that a little unicast flooding is normal, as the switch has to do a
>> little
>> bit of flooding to find out where people are.  While looking for a way
>> to
>> monitor this, I came across the 'mac-address-table unicast-flood'
>> command on
>> Cisco switches.  This looked perfect for what I needed, but apparently
>> it is
>> currently not an option on 6500 switches with Sup720s.  Since there
>> doesn't
>> appear to be an option on Cisco that monitors specificaly for unicast
>> floods, I thought that maybe I could setup a server with a network card
>> in
>> promiscuous mode and then keep stats of all packets received that
>> aren't
>> destined for the server and that also aren't legitimate broadcasts or
>> multicasts.  The only problem with that is that I don't want to have to
>> completely custom build my own solution.  I was hoping that someone may
>> have
>> already created something like this, or that maybe there is a good
>> reporting
>> tool for wireshark or something that could generate the report that I
>> want.
>>
>> Anyone have any suggestions on either prevention/monitoring?
>>
>> Thanks!!
>>
>> -Brian
>>     
>
>   

-- 
Steve King

Network Engineer - Liquid Web, Inc.
Cisco Certified Network Associate
CompTIA Linux+ Certified Professional
CompTIA A+ Certified Professional


Reply via email to