Diagnose your network topology with SonicWall built-in Packet Monitor (layer 2 loops)
03/26/2020 101 13945
DESCRIPTION: Diagnose your network topology with SonicWall built-in Packet Monitor (layer 2 loops)
Having the same subnets connected to two physical interfaces is not supported, unless the following Mode / IP assigment options are used on the interface:
Transparent IP Mode
Layer 2 Bridged Mode
The following problems may show up with layer 2 loops:
Unit becomes unstable due to high CPU usage:
Unit becomes unreachable due to missing ARP entry
Unit crashes randomly
Unit has a suspicious number of active connections
IP spoof messages are reported by the Intrusion Prevention module
Some devices connected to the SonicWall become unreachable randomly
Please note that ARP timeout is 10 minutes (by default).
Procedure for checking your network:
Step 1: Set up a packet capture: System | Packet Monitor | Configure
Under Monitor Filter: Clear all the fields, set 'Ether Type' to 'ARP', Enable Bidirectional Address and Port Matching.
Under Display filter: Clear all the fields, Enable Bidirectional Address and Port Matching, Enable 'Forwarded', 'Generated', 'Consumed' and 'Dropped''.
Under Advanced Monitor filter: Enable all options.
Accept your Packet Capture settings.
Step 2: Start the packet capture using the 'Start Capture' option and wait for it to get some data.
Depending on the size of your network, it may take more than 20 minutes to get a full picture of what is going on. Usually it should be much faster. (If you are a experienced SonicWall user, you may use the 'Send Gratitious ARP' diagnostic option to generate some ARP traffic on demand) Stop the packet capture using the 'Stop Capture' option and hit the 'Refresh' button.
Step 3: At this point you should be able to see the ARP traffic captured, similiarly to:
In general (to verify if a loop is present) we will be looking for:
Packets with the 'Source IP' from a subnet different than the subnet configured on the 'Ingress' interface.
Identical packets arriving on two different 'Ingress' interfaces at the same time.
Additionally, you may be able to see:
Packets with the 'Source IP' 169.254.1.0 to 169.254.254.255 (inclusive). These are hosts not able to reach a DHCP server - trying auto configuration.
Packets with the 'Source IP' 0.0.0.0 (ARP generated by some network stacks).
Step 4: In order to get a clear view, use Configure | Display Filter to show dropped packets only:
Filtered the packet capture:
Step 5: Compare captured traffic with your network settings (Network | Interfaces):
As per example, we may see the following networks: 126.96.36.199 connected to X2 188.8.131.52 connected to X3 184.108.40.206 connected to X6
Filtered packet capture (Step 4) shows: 220.127.116.11 (X2 subnet) arriving on X3 (#89) and X6 (#90) 18.104.22.168 (X3 subnet) arriving on X2 (#96) and X6 (#98) 22.214.171.124 (X6 subnet) arriving on X1 (#108) and X2 (#110)
which indicates that X2, X3 and X6 are bridged.
Please note, that packets from a VLAN tagged interfaces should also be limited to their VLAN interfaces. F.i.: 126.96.36.199 host on X2:V11 should not be visible on X2:V16. Vlan tagged packets should not show up on non-vlan interfaces.
Resolution steps are listed below:
Check if your switches are connected properly.
Check if VLAN tagging is set up properly in your network.
Check NAT policies on the SonicWall, specify inbound and outbound interfaces for each policy, if possible.
Check if servers connected to multiple subnets are not bridging ARP traffic.
Check if PCs/laptops connected to multiples subnets are not bridging ARP traffic (especially users connected simultaneously via WiFi and Cable).
Check if there is any source of multicast traffic in the network.