Description: | Symptom: ME-3400, acting as PPPoE Intermediate Agent, is wrongly processing PPPoE packets on: - port that is in STP blocking state, - vlan that is not allowed on a trunk.
This can trigger a loop and high CPU usage.
Conditions: 'pppoe intermediate-agent' configured.
Workaround: None
Further Problem Description: The following debug messages are seen when the issue occurs, using 'debug pppoe intermediate-agent packet'.
Oct 7 14:40:37.050 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.050 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/6) Oct 7 14:40:37.050 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/5) Oct 7 14:40:37.050 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.050 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.059 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/6) Oct 7 14:40:37.059 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/5) Oct 7 14:40:37.059 IST: %SW_MATM-4-MACFLAP_NOTIF: Host 0001.0700.0000 in vlan 10 is flapping between port Fa0/6 and port Fa0/5 Oct 7 14:40:37.059 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.059 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.067 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/6) Oct 7 14:40:37.067 IST: PPPOE_IA: received new PPPOE packet from inputinterface (FastEthernet0/5) Oct 7 14:40:37.067 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.067 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input inE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/6, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000 Oct 7 14:40:37.067 IST: PPPOE_IA: Process new PPPoE packet, Message type: PADI, input interface: Fa0/5, vlan : 10 MAC da: ffff.ffff.ffff, MAC sa: 0001.0700.0000
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
没有评论:
发表评论