Skip to main content

How to detect Multicast traffic flooding a switched network

Multicast traffic specially the one generated by Microsoft's NLB Cluster can flood the network even if it is switched network. Network engineers will often feel the switches acting like a classic hub completely defeating the purpose of switched networks. Microsoft intentially did this in their NLB Cluster by design to achieve the load balancing or express delivery or response to network traffic dealt by their load balancers.

In order to track or detect symptoms you will have to trace network packets across network from any port. This can be done using Wireshark on Windows and Snoop on Solaris Unix systems.

Packet trace will usually be carried out on one of the network interface connected to VLAN or network in question. In below example we are using Unix snoop command but we would also use other commands to determine what is required.

$ bash # access the Bash Shell
$ ifconfig -a # list the interface details and write down the interface you want to investigate.

Now we are going to run the snoop on one of the interfaces we wanted to investigate.

snoop -c e1000g -v arp 2>&1 > /tmp/e1000g.txt

If you have more than one interface you may have to run below at the same time.

snoop -c e1000g1 -v arp 2>&1 > /tmp/e1000g1.txt & snoop -c e1000g2 -v arp 2>&1 > /tmp/e1000g2.txt

Break the connection using Ctrl+C or Break and inspect the output files to find any multicast packet.

You can also run below command to see the live traffic with word multicast in filter.
snoop -c e1000g -v arp | grep multicast

Initially you will have to ensure that suspected IP Addresses are resolving ARP entries while you do the trace. If they are already learned they may not appear in arp trace.

List the arp entries by using following command.
arp -an | egrep "|192.168.1|etc"

In order to delete specific arp entries uses below.
arp -d || arp -d "another ip address"

Now issue a ping while you are tracing the packets.
ping && ping && etc

More to come, however above should be sufficient for you ....

Popular posts from this blog

Useful website performance and load testing tools

Copy files and folders using SCP with spaces in path

Copying data from one system to other with file or folder names that contain spaces in path can be achieved using this guide. In this case I am copying data from Macbook to Windows 10 computer. In order to copy the data easily it is better to use bash commands. Windows computer can support WSL (Windows subsystem for Linux) and you can run one of few linux distributions to use shell commands. I have Ubuntu set up within my Windows 10 using WSL. If you do not have WSL, you can set it up using my guide here . The copy can be performed in two ways: 1) Using SCP Source (MacOs) path: /home/Users/username/Documents/data extract from 2020/ First of all you add escape sequence to the path so it will become:  /home/Users/me/Documents/data\ extract\ from\ 2020/ . While this works on local system for SCP you'll have to double the escape sequences by replacing \ with \\, as below. Figure out your source computer IP address using "ifconfig" command. Now using scp command on target syst

TrueCrypt on macOS X Mojave 10.14

If you have updated your macOS recently to Mojave otherwise known as verison 10.14 you may not be able to install the last version of Truecrypt in order to access your old volumes encrypted with Truecrypt software. This article will guide you to get this working on your MacOS v10.14 (Mjoave) . Download the package from  or . Find downloaded package using Finder in your HDD/Users/username/Downloads folder and will look like  TrueCrypt 7.1a Mac OS X.dmg . Open file location in Finder and open or double click on  TrueCrypt 7.1a Mac OS X.dmg . This will mount Truecrypt 7.1a and will have Truecrypt 7.1a.mpkg in it. Drag the package T rueCrypt 7.1a.mpkg and drop in your Downloads folder. From Locations in Finder you can eject your TrueCrypt mount. Now go to your Downloads location, find the file  TrueCrypt 7.1a.mpkg , right click and select Show Package Contents . Find the file Contents/distribution.di