I've got a Cisco Catalyst 6500 running IOS 12.2(33)SXH4, the latest supported
by its supervisor card. We're using port-security for at least four reasons: to
allow floating devices, to avoid the delay imposed by 802.1X MAB timeout, to
avoid blocking clients who happen to have 802.1X configured badly, and to fail
open-for-last-seen-MAC-address if the PF server is down. We have a bunch of
mostly Catalyst 3750 switches working just fine.
Clients recently (at least, I think it's only recently) started losing
connectivity because the switch is seeing and reporting phantom MAC addresses.
We get flapping between the real client MAC address and the phantom, then VALID
REGISTERED devices get stuck forever in the registration VLAN with log entries
including:
Jul 25 09:09:09 pfsetvlan(4) INFO: secureMacAddrViolation trap received on
10.2.64.40 ifIndex 75 for 00:00:01:1a:00:00 (main::handleTrap)
Jul 25 09:09:09 pfsetvlan(4) INFO: Will try to check on this node's previous
switch if secured entry needs to be removed. Old Switch IP: 10.2.64.40
(main::do
_port_security)
Jul 25 09:09:10 pfsetvlan(4) INFO: authorizing 00:00:01:1a:00:00 (old entry
40:6c:8f:2c:d3:6e) at new location 10.2.64.40 ifIndex 75 (main::handleTrap)
Jul 25 09:09:13 pfsetvlan(6) INFO: secureMacAddrViolation trap received on
10.2.64.40 ifIndex 75 for 40:6c:8f:2c:d3:6e (main::handleTrap)
Jul 25 09:09:14 pfsetvlan(6) INFO: authorizing 40:6c:8f:2c:d3:6e (old entry
00:00:01:1a:00:00) at new location 10.2.64.40 ifIndex 75 (main::handleTrap)
Jul 25 09:48:28 pfsetvlan(10) INFO: secureMacAddrViolation trap received on
10.2.64.40 ifIndex 90 for 00:00:01:29:00:00 (main::handleTrap)
Jul 25 09:48:28 pfsetvlan(10) INFO: authorizing 00:00:01:29:00:00 (old entry
bc:5f:f4:73:06:54) at new location 10.2.64.40 ifIndex 90 (main::handleTrap)
Jul 25 09:48:28 pfsetvlan(10) INFO: MAC: 00:00:01:29:00:00 is of status unreg;
belongs into registration VLAN (pf::vlan::getRegistrationVlan)
Jul 25 09:50:56 pfsetvlan(12) INFO: secureMacAddrViolation trap received on
10.2.64.40 ifIndex 90 for 00:00:01:29:00:00 (main::handleTrap)
Jul 25 09:50:56 pfsetvlan(12) INFO: Will try to check on this node's previous
switch if secured entry needs to be removed. Old Switch IP: 10.2.64.40 (main::d
o_port_security)
Jul 25 09:50:56 pfsetvlan(12) INFO: MAC: 00:00:01:29:00:00 is of status unreg;
belongs into registration VLAN (pf::vlan::getRegistrationVlan)
Jul 25 09:50:56 pfsetvlan(12) INFO: authorizing 00:00:01:29:00:00 (old entry
bc:5f:f4:73:06:54) at new location 10.2.64.40 ifIndex 90 (main::handleTrap)
Jul 25 09:51:00 pfsetvlan(14) INFO: secureMacAddrViolation trap received on
10.2.64.40 ifIndex 90 for bc:5f:f4:73:06:54 (main::handleTrap)
Jul 25 09:51:00 pfsetvlan(14) INFO: authorizing bc:5f:f4:73:06:54 (old entry
00:00:01:29:00:00) at new location 10.2.64.40 ifIndex 90 (main::handleTrap)
Jul 25 09:51:00 pfsetvlan(14) INFO: MAC: bc:5f:f4:73:06:54, PID: ****, Status:
reg. Returned VLAN: 226 (pf::vlan::fetchVlanForNode)
Jul 25 09:52:54 redir.cgi(0) INFO: bc:5f:f4:73:06:54 being redirected
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_html_captive_2dportal_redir_2ecgi::handler
)
Jul 25 09:52:54 redir.cgi(0) INFO: Updating node bc:5f:f4:73:06:54 user_agent
with useragent: 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64;
Tride
nt/6.0)' (pf::web::web_node_record_user_agent)
To sum up, ifIndex 75 has real MAC address 40:6c:8f:2c:d3:6e and phantom
00:00:01:1a:00:00. ifIndex 90 has real MAC address bc:5f:f4:73:06:54 and
phantom 00:00:01:29:00:00. Interestingly, hex 0x11a - 0x129 = decimal 15, same
as the ifIndex offset. This is also true for other ports in this state.
I am inclined to hack at the PF3 code (I'll look at PF4 soon) to ignore
port-security traps for the bogus MAC addresses 0000.****.0000, but can anyone
explain this behavior?
Here's my switch config and the port security events as logged on the switch.
interface GigabitEthernet5/27
switchport
switchport access vlan 965 (registration vlan)
switchport mode access
switchport port-security
switchport port-security violation restrict
# This version of IOS does not include port-security mac address in "show runn"
but the feature does work
no snmp trap link-status
power inline never
flowcontrol receive on
spanning-tree portfast
spanning-tree bpduguard enable
!
Jul 25 15:16:45: %PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation
occurred, caused by MAC address 0000.00c8.0000 on port GigabitEthernet4/9.
(c8 = 200)
Jul 25 15:44:53: %PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation
occurred, caused by MAC address 0000.00cf.0000 on port GigabitEthernet4/16.
(cf = 207)
Jul 25 17:58:45: %PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation
occurred, caused by MAC address 0000.00d3.0000 on port GigabitEthernet4/20.
(d3 = 211)
Jul 25 15:36:59: %PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation
occurred, caused by MAC address 0000.011a.0000 on port GigabitEthernet5/27.
(11a = 282)
Jul 25 19:58:27: %PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation
occurred, caused by MAC address 0000.0129.0000 on port GigabitEthernet5/42.
(129 = 297)
--
Rich Graves http://claimid.com/rcgraves
Carleton.edu Sr UNIX and Security Admin
CMC135: 507-222-7079 Cell: 952-292-6529
------------------------------------------------------------------------------
See everything from the browser to the database with AppDynamics
Get end-to-end visibility with application monitoring from AppDynamics
Isolate bottlenecks and diagnose root cause in seconds.
Start your free trial of AppDynamics Pro today!
http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users