On Tue, 22 Aug 2000, Chris Archer wrote:

> Group,
>    Is there a way to determine the MAC or IP address of a machine that is
> hogging a link? 

if its on a directly connected segment, then you stand a chance at getting
the MAC using sniffer software.  If its beyond a directly connected
segment, then you won't have that info (without going further downstream).

Typically, you would use flow-switching to get this type of info.  Its
quite simple.  You enable flow-switching on your interfaces and you send
the flow information to a server which runs software for groking the info,
such as CAIDA's cflowd (which we use here on linux and works quite well).


>    I had a T1 link that got flooded today and I was trying to find who the
> culprit was. I did not have a sniffer available so I was looking for a
> solution within IOS.

Flow would work well for this.  For example.  Here we have links to
Sprint, Cable and Wireless, UUnet, Frontier, and Quest.  If I wanted to
know who is sinking the most bandwidth from UUnet, I would do like so:

[root@compaq bin]# ./grok.pl uunet
(NOTE: grok.pl is just a perl script I wrote that makes things look all
nice and pretty.  The below data could be gotten from cflowd by doing the
following:

artsasagg -i 11-12 -I 11-12 /tmp/report 
/usr/local/arts/data/cflowd/208.206.76.1/arts.20000822
artsases -l 10 /tmp/report 

)

 Rank   srcAS   dstAS   Bytes           bits/sec        Netname
----    -----   -----   ----------      -----------     --------
1       10593   11881   1011518624      109650          AOL-DTC2
2       701     11881   848220591       91948           ALTERNET-AS
3       11486   11881   459922866       49856.1         WAN
4       12076   11881   402379207       43618.3         HOTMAIL-AS
5       2914    11881   339126476       36761.7         VERIO
6       6201    11881   325087196       35239.8         ATEXT
7       11305   11881   269238131       29185.7         INTERLAND-NET1
8       11855   11881   203917289       22104.9         ASN-INTERNAP-BLK
9       5662    11881   161969291       17557.6         ASN-TBS-1
10      2048    11881   146838350       15917.4         LANET-1

Ok, this breaks it apart by Autonomous System.  You may want more
granularity than that, which is totally possible.  Above you can see that
AS 10593, which is an AOL AS, is the biggest "offender" (I am AS
11881).  Ok, so to get more detail you do like so:

[root@compaq bin]# artsnetagg -i 11-12 -I 11-12 /tmp/report 
/usr/local/arts/data/cflowd/208.206.76.1/arts.20000822 
[root@compaq bin]# artsnets -l 50 /tmp/report 
router:  208.206.76.1 ifIndex: 0
period:  08/21/2000 18:58:50 - 08/22/2000 15:38:50 CDT
         Src Network         Dst Network           Pkts          Bytes
  ------------------  ------------------  -------------  -------------
    205.188.128.0/17    208.217.106.0/25         289686      144167922
     63.104.232.0/21    206.137.60.86/32         200866      139448248
    207.204.214.0/24    206.137.60.71/32         111533      112187813
    205.188.128.0/17     207.16.245.0/25         225001      109431161
    205.188.128.0/17   208.214.44.128/25         149394       88231330
     209.167.40.0/23   208.214.45.250/32          56674       79245682
      63.99.192.0/19  208.249.213.128/25          90825       75093818
      216.155.0.0/18   207.16.246.192/26         103320       71446667
    205.188.128.0/17     208.206.76.0/24         142908       69237861
      192.12.12.0/24   208.214.44.128/25         170178       65067122

So you can see that the #1 user is 208.217.106.0/25 and they are getting
it from 205.188.128.0/17.  Quick check reveals that 205.188.128.0/17 is
indeed part of the 10593 AS:

stargate#sh ip bgp 205.188.128.0/17
BGP routing table entry for 205.188.128.0/17, version 140064
Paths: (5 available, best #3, table Default-IP-Routing-Table)
  Not advertised to any peer
  3549 1668 10593
    206.57.5.13 from 206.57.5.13 (206.132.119.97)
      Origin IGP, localpref 100, valid, external
      Community: 3549:2826 3549:9840
.
.
.


>    I could see where the traffic was coming from but that was only good to
> localize it to a router and not an individual machine.

well the above would only help you as far as subnets as well.  But once
you have it working, its great because you can look at things like how
much of your traffic is http, ftp, nntp etc.  Is everything on your
network ethernet?  If so, most switches (if its switched) allow you to
poll usage data via SNMP, and graph it using say MRTG.  If its dialup,
then most dialup RAS's store usage data in RADIUS records.


Brian


>    Any input would be appreciated.
>  
> Thanks
> 
> Chris
> 
> ___________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> 

-----------------------------------------------
Brian Feeny, CCNA, CCDA       [EMAIL PROTECTED]   
Network Administrator         
ShreveNet Inc. (ASN 11881)            

___________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to