Solved

Network Problem - IGMPv2 Storm

Posted on 2016-10-07
16
78 Views
Last Modified: 2016-11-13
Hi all,

We are currently suffering from an IGMPv2 storm on our network on a single VLAN across multiple HP switches. Wireshark records over 2000000 IGMP packets within a few seconds. Unsurprisingly clients are unable to get network access while this is happening. We have roughly 50 WAP's on this VLAN and some client PC's. I'm struggling to tell which WAP / client is causing the issue as the traffic all seems to relate to the clients responding to the IGMP packets. I don't know how to work out which one is causing them to all respond.

A snapshot of the wireshark log is attached. The destination address's appear to be multicast and can be 224.0.0.252, 224.0.0.2 or 224.0.0.113

I've tried physically unplugging switches one by one to try and work out which one has the offending client but I can't get a definitive answer. I assume because packets are moving throughout the network. When I do this the storm will "calm down" but be back within a few hours.


Any help in working out what's going on would be greatly appreciated.


Max.
Wireshark-Conversation-Snapshot.PNG
Wireshark-Snapshot-IGMP.PNG
0
Comment
Question by:stmonica
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
  • 4
  • +1
16 Comments
 
LVL 46

Expert Comment

by:Craig Beck
ID: 41834470
Is IGMP snooping configured? It doesn't sound like it.
0
 
LVL 62

Expert Comment

by:gheist
ID: 41834688
If you google for those IPs - it must be Cisco routers chatting.
IGMP is normal network traffic if you use multicast.
0
 
LVL 46

Expert Comment

by:Craig Beck
ID: 41834760
It's PIM traffic. Can you post the switch configs?
0
Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

 
LVL 62

Expert Comment

by:gheist
ID: 41834983
Switches dont do PIM talk. It is routers.
0
 
LVL 46

Expert Comment

by:Craig Beck
ID: 41835218
Layer 3 switches do, and other network devices (such as routers) do. The configs will help us to understand what the network looks like.
0
 
LVL 62

Expert Comment

by:gheist
ID: 41836038
Layer 3 is not switches. It is a router.
0
 
LVL 62

Expert Comment

by:gheist
ID: 41836050
0
 
LVL 40

Expert Comment

by:noci
ID: 41836140
Destination is Multicast (ie subscribers).
The source address is where is comes from.
1
 
LVL 62

Expert Comment

by:gheist
ID: 41836158
Souce MAC should be traceable.
0
 
LVL 46

Expert Comment

by:Craig Beck
ID: 41836169
Gheist, why are you arguing? Have you never heard of a layer3 switch?
0
 
LVL 40

Expert Comment

by:noci
ID: 41836188
A layer 3 switch more or less is a router bolted onto a switch. And layer-3 is by definition where routing takes place.
So there is no need for arguing by any one. A L3 switch also does everything a L2 switch does, it has to as part of the stuff in networks is done on L2.
1
 
LVL 46

Expert Comment

by:Craig Beck
ID: 41836208
Exactly my point, noci. I don't understand the confusion.

I've asked for configs to see whether the switches are configured for snooping, amongst other things. Can we see configs please, stmonica?
0
 
LVL 40

Expert Comment

by:noci
ID: 41836678
Now on IGMP....

An IGMP membership announcement is done (a few times to be sure, on a lossy protol like UDP)  when a multicast port is opened on a computer (host), indicating to an upstream router (and possibly switches [ IGMP-Snooping ] ) that it wants to receive multicast traffic.  The Leave is sent when the port is closed.
(A router that manages Multicast traffic can then selectively pass on Multicast traffic, same for switches that do IGMP-Snooping that can select to only forward to ports that need it in stead of all ports). So snooping is a performance option, where systems not interested in multicast will not get the traffic as well.

Is there software active that only runs for short times that happens to use multicast traffic? That can explain a lot of enter/leave group messages.
The other option is that you run a farm of systems that use multicast:  to address 224.0.0.113?
At least the systems *.48, *.31, *.32, *.33, *.34 and *.35 are active on that channel.
The 224.0.0.2 traffic is an indication of the amount of announcements.. for IGMP, for the number of times ports are closed. The opens should be to the whole group all hosts.
Due to it's nature Multicast is meant for longer duration of massive amounts of traffic from one source to multiple subscribers.
(TV & Radio broadcast are equivalent technologies).

224.0.0.2 - is All Routers... (As such it can be used to announce a host that is interested on the network. So PIM in a router can take note of the registration).
224.0.0.113 used to be used by the ALLJoyn framework, but shouldn't be now. as it also uses the mDNS group for that.
0
 
LVL 40

Expert Comment

by:noci
ID: 41840339
btw. 1Mbps seems a lot, but is roughly 0.1% of a 1Gbps line.
0
 

Accepted Solution

by:
stmonica earned 0 total points
ID: 41878723
Enabling DHCP snooping crashed the switches almost instantly. The problem turned out to be a bug in the firmware of a TP-Link access point connected to the network. Upgraded the firmware and the issue is no longer present.
0
 

Author Closing Comment

by:stmonica
ID: 41885198
other comments did not resolve the issue.
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question