Guest

Preview Tool

Cisco Bug: CSCuo42464 - Cisco NAM2320 not allow MAC range matching

Last Modified

Mar 02, 2018

Products (1)

  • Cisco Prime Network Analysis Module Software

Known Affected Releases

6.0(2)

Description (partial)

Symptom:
The new feature requirements are to match for a range of MAC addresses when defining thresholds 
for alarms

Conditions:
This NAM is used in a datacenter LAN for outsourcing services. Cu is especially looking for misbehaving 
servers, for example servers that cause a lot of flooding in the LAN.
 
Flooding in general is undesirable, affects the network and other servers  and caused several incidents already.  Microsoft NLB is a typical application that is based on flooding.
 
The according owner of the server would be notified to stop this behavior on the server and packet captures of the event would be triggered providing the evidence.
 
Cu is trying have the following
*  either a range of MAC addresses as shown (but not working)
*  some kind of wild cards using  asterisks as usual  (but not fully providing what I need) *1:*:*:*:*:*
*  another flexible solution:  regular expressions  .[0,2,4,6,8,a,c,e]:.*
*  masking MAC addresses like in MAC ACL:  value: 01:00:00:00:00:00 mask:FE:FF:FF:FF:FF:FF
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.