[afnog] QoS setting verification

Antonio Godinho antonio at uem.mz
Fri Jul 21 15:44:16 EAT 2006


Unfortunately this network is at a remote location. The switch is not 
manageable, so no option of port mirroring. What usually happens is that one 
or other PC from time to time gets some malware or virus which generates 
this type of traffic for which I have put ACL's on the router but it seems 
that when this happens, the router somehow starts having problems with the 
voice traffic when it has to reject all these packets on the ethernet 
interface. If someone unplugs the ethernet cable then everything goes back 
to normal but the serial link is never affected. I thought at first that the 
voice traffic would never be affected by ethernet traffic since it "should" 
go from the voice interface through the router directly onto the serial 
interface but it seems that I was wrong. Somehow, the act of discarding 
unwanted packets at the ethernet interface affects the operation of VoIP.

Unfortunately at this point I can not measure the traffic before it hits the 
router since I am not on location (1.5 hour flight). There is also no one 
there who is knowledgable enough to do anything of the sort. Also they have 
no idea which PC is generating traffic. 

I was just wondering if there was any way I could minimise the effect of the 
ethernet problem on the router in order to have an acceptable VoIP 
connection. 

Cheers,

AG

On Fri, 21 Jul 2006 12:54:31 +0100, Brian Candler wrote
> On Fri, Jul 21, 2006 at 10:10:39AM +0200, Antonio Godinho wrote:
> > Actually the internal  network where PC1 and PC2 and PC3 are there is a 
> > switch. The router has an access list on the ethernet that will only 
allow 
> > certain type of traffic thus cutting off any other disallowed traffic. 
So 
> > you may find that PC1 is bombarding the router with traffic since the 
router 
> > is the default gateway and the router is trashing all this traffic 
because 
> > it is illegal traffic
> 
> That explanation doesn't make sense. If the router has an access 
> list which blocks a certain packet, then either:
> 
> (1) it will drop the packet on the floor, or
> (2) it will send back an ICMP "Admin Prohibited" message
> 
> But neither of these actions should cause the client to "bombard" 
> the router with additional traffic.
> 
> For example, If the client is trying to open a TCP session, then TCP 
> will retry at intervals - typically once after 3 seconds, again 
> after 6 seconds, again after 12 seconds etc. That's a tiny amount of 
> traffic.
> 
> If it's UDP (say a DNS request) then the client will retry a few 
> times, again at intervals of a few seconds.
> 
> If the client is running a ping, then it's unlikely to send more 
> than one ping every second. This is regardless of whether a response 
> is received or not.
> 
> None of these will generate a full ethernet's worth of traffic from 
> a single client.
> 
> So, I think you need to capture an example of this "bombardment" to 
> find out what's actually going on. If you know which client it's 
> coming from, then run ethereal/tcpdump on the client. If you don't,
>  then use port mirroring on the switch and capture everything to a 
> Unix box running tcpdump.
> 
> Maybe you have a broken piece of client software which floods the 
> link with traffic.
> 
> Regards,
> 
> Brian.


--
Antonio Godinho
B.Sc., MCP+I, MCSE, CCNA, CCNP
CIUEM
Maputo
Mozambique




More information about the afnog mailing list