cloud mode ap
switch ---- aps
A large number of AP frequent on-line and off-line problems;
the terminal can"t access the WLAN when the failure occurs, and the terminals are also unable to access the internet after accessing WLAN.
Through continuous use of the "display interface" command to inspect packet counts on the interface, we observed that the volume of abnormal unicast packets sent from the switch to the AP was approximately 2 million packets per second(pps).
It had been found a large number of abnormal unicast packets, being sent to the AP in the VLAN 10, causing disruption to normal AP operations.
After blocking VLAN 10, the AP returned to normal operation. To ensure that wired and wireless devices used different VLANs: wireless VLAN 11 and wired VLAN 40.
Another surge in AP disconnections few days later. It was traced to the AP receiving a large number of unknown unicast packets on VLAN 11.
During the issue, it was observed that the MAC address "****-****-****" of the abnormal terminal frequently drifted between two long-distance aps.
<h3c> dis mac-address | in ****-****-****
And at the same time, it was sending large number of unknown unicast packets to the network, causing the disruption to normal AP operations. Find the source mac and destination mac in packet capture.
While threre is a fake mac-address which is not exist in the network at all. Refer to the record above, we checked mac-address on the core switch and there is no mac-address matched.
According to the mechanism of switch, it would flood the packets with unknow destination mac-address to all the ports of switch. So all the attacking packets were transferred to every AP which caused the disruption of WLAN.
In other words, the attacker exploited the mechanisms of the switch to launch a massive attack by flooding the network with abnormal packets, targeting all APs in the network.
For prevent the customer’s network from the attacking of ****-****-**** and other possible attack of unknow unicast in the future.