Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

CPU is up to 100%

Status
Not open for further replies.

tecci

Technical User
Jan 17, 2002
11
0
0
DE
I have Accelar 1200 configured with 8 IP-Policy and 8 IPX-Policy Vlans running Version 2.0.7.5
Effect was, that every 4 weeks the Accelar CPU rises up to 100%, the only chance was a reboot.
After Upgrade on Version 2.1.4 this effect is now every week

Thanks
 
XLR 1200 have always had a problem with high cpu utilisation and there have been several attempts by Nortel to resolve this problem. Does the XLR get stuck at 100% CPU utilisation or does it recover, if it recovers this is normal. Did you upgrade the software to try to resolve this issue or was it to resolve other problems, I would revert to the old software and log a call with Nortel TSC for advice.
 
the accelar stuck
this construct works fine for about 1 year
in the last 4 months, there are several W2k- Rollouts
Are there any known bugs with W2k and acelar ??
 
With your w2k roll out are they using a Ghost server
if they are check ttl it is most proberbly set too 1 change this to 4

Garth
 
Hi

Check if you have the NIMDA virus on some PC,s

30 000 arp request a second.

Garth



 
I ran into same problem with 100% CPU on Accelar 1200 last month.AS/400 team pushed out an update to client PC's out in the field, and caused the XLR under certain conditions to peak at 100%. Never could isolate what application caused this since everyone was looking at the network. However, we upgraded our code to 2.078 which did the trick.
I forget which tech bulletin actually describes this symptom. Go to nortel's web site and review bulletins. I was previously at 2.073
 
Nortel NetworksTMTechnical SupportCustomer Support BulletinNumber: CSB - 0109005 Released: 9/28/2001
Subject: Effects of the Code Red and NIMDA viruses on Nortel Networks Switch Products
Product: Model Functional REVISION Number(s)Product Name / Designation(s)Model/Order Number(s) Part Number(s) Potentially Affected Corrected Passport 1200 All v2.0.7.7 and above Passport 1100 All v2.0.7.7 and above Passport 8100 All Passport 8600 All BayStack 303 / BayStack 304 All BayStack 310 v1.6.0 and below v1.6.1 BayStack 350 None BayStack 410 None BayStack 420 None BayStack 450 None Business Policy Switch 2000 None Centillion 50 / 100 / 5000BH None Description: The purpose of this bulletin is to assist in minimizing the effects of the Code Red and NIMDA viruses on customer networks utilizing Nortel Networks switching products. These viruses have been reported to cause web server and management lockups in only a small number of Nortel Networks switch products, under specific conditions. In most reported cases of the Code Red virus, traffic flow through the switch was not disrupted. However, there have been numerous reports of the NIMDA virus causing traffic congestion on customer networks. Discus sion: The Code Red (and its variations) and NIMDA viruses exploit Microsoft Internet Information Server (IIS) software running on Windows 2000 and Windows NT machines and Microsoft Internet Explorer. The Code Red virus is spread when an infected server makes an HTTP connection on port 80 to a vulnerable server. The virus infects the vulnerable server and continues to seek out vulnerable servers to infect. The NIMDA virus has the capability of being spread through email, web pages, IIS attacks (similar to Code
--------------------------------------------------------------------------------
Page 2
CSB- 0109005 Nortel Networks Public Information 2 Red), and file shares. The random destination addresses for both viruses are determined by an algorithm that the worm runs. For more information about the Code Red worm, the Code Red successors (Code Red II, etc.), and a breakdown of the worm's functions, please visit: more information about the NIMDA virus and a breakdown of the virus's functions, please visit: Nortel Networks switch products will function normally when operating on a network infected with the Code Red or NIMDA virus. Problems arise when a high number of Microsoft IIS servers (or other infected machines) are present on the network, spreading the virus and generating packets destined for random IP addresses. This can cause excessive ARPs (the destination IP addresses may or may not exist on the network) and wasted bandwidth. If a network contains a large number of infected machines, this can cause Passport 1000-series (running v2.0.3 and earlier) and Passport 8600-series routing switches to experience high CPU utilization. There have also been reports of telnet, SNMP, web services on the Passport 1000-series routing switches not responding to valid client requests. This issue is caused by a problem in code releases prior to v2.0.7.7, where TCP and UDP connections established to the CPU are not properly released. Problems also arise when infected servers attempt to establish connections with Nortel Networks switching products on TCP port 80 (HTTP). This is seen in the BayStack 303, BayStack 304, and BayStack 310 switches. In some instances, the BayStack 310 will reset when the switch receives virus packets generated by infected servers. The virus will also cause the web server on the BayStack 303 and 304 to lock up, but will not affect data traffic passing through the switch. Devices which do not run web-related services (such as the BayStack 350, BayStack 410, BayStack 450 or Centillion products) are not affected. The NIMDA virus, in addition to attacking TCP port 80, attempts to spread itself over UDP port 69 (TFTP) and TCP port 25 (SMTP). While this may cause congestion and bandwidth problems, there have been no confirmed reports of Nortel Networks switches being adversely affected by TFTP or SMTP traffic from the NIMDA virus. The NIMDA virus is also capable of spreading when a user browses web pages on an infected web server, using Microsoft's Internet Explorer with JavaScript enabled. In addition, normal user traffic passing through Nortel Networks switching products was not affected except in the case of the BayStack 310 (due to the switch resetting), the Passport 1000-series (due to the high CPU utilization), and the Passport 8000-series (due to the high CPU utilization). Resolutions:The only permanent solution to these problems is to remove the offending viruses from the network. Customers with Microsoft IIS or Internet Explorer running on their network should apply the appropriate patches, available from Microsoft's web site at: If that is not immediately possible, the following steps may be taken depending on what type of Nortel Networks switching products are being utilized in the network:
--------------------------------------------------------------------------------
Page 3
CSB- 0109005 Nortel Networks Public Information 3 For Passport 1000- and 8000 -series routing -switches: For customers running v2.0.7.6 code or earlier on a Passport 1200 or 1100, it is recommended that the code be upgraded to at least the v2.0.7.7 agent. This is recommended due to a problem with prior version not properly releasing TCP connections made to the CPU. As more TCP connections were established on port 80, available memory and performance of the box would degrade. Customers using the Passport 1000-series or 8000-series products may disable the built-in web server by issuing the following command from the CLI: config web-server disable Disabling the web server will prevent the box from listening to TCP port 80. Doing this will prevent the CPU utilization from rising when the Code Red or NIMDA viruses are present on the network. This fix is meant only as an interim solution, and steps should be taken to remove and repair any infected servers. Disabling the internal web-server will not shut down port 80 on the box, but merely prevent HTTP connections from being made. It is also recommended to disable TFTP on the Passport 8000-series, as FTP may be used to transfer files to and from the box. This will help minimize the spread of the NIMDA virus. It is also recommended to setup filters, which will assist in blocking the spread of virus. Filters should be implemented in a way that will prevent the virus from spreading (i.e., ports between segments, floors, etc.) to various parts of the network. The following example for the Passport 8000-series switch shows how to block all incoming UDP port 69 (TFTP) requests, and incoming TCP port 80 (HTTP) requests directed to a server with an IP address of 10.38.6.17: config ip traffic-filter create global src-ip 0.0.0.0/0 dst-ip 0.0.0.0/0 id 1 config ip traffic-filter filter 1 action mode drop config ip traffic-filter filter 1 match dst-port 69 dst-option equal config ip traffic-filter filter 1 match protocol udp config ip traffic-filter create global src-ip 0.0.0.0/0 dst-ip 10.38.6.17/255.255.255.255 id 2 config ip traffic-filter filter 2 action mode drop config ip traffic-filter filter 2 match dst-port 80 dst-option equal config ip traffic-filter filter 2 match protocol tcp config ip traffic-filter global-set 1 create name "Block HTTP/TFTP" config ip traffic-filter global-set 1 add-filter 1 config ip traffic-filter global-set 1 add-filter 2 The filter is then applied on ports 1/1 through 1/16: config ethernet 1/1-1/16 ip traffic-filter create config ethernet 1/1-1/16 ip traffic-filter add set 1 config ethernet 1/1-1/16 ip traffic-filter default-action forward config ethernet 1/1-1/16 ip traffic-filter enable Notes regarding packet filtering: * Filters are applied to packets upon ingress to the switch.
--------------------------------------------------------------------------------
Page 4
CSB- 0109005 Nortel Networks Public Information 4 * Global filters are preferred, as they are more efficient than a source or destination filter. * Global filters are not supported on the Passport 1000-series routing switch, so a source or destination filter must be used. * Only routed packets or packets directed to the CPU are filtered on the Passport 1000-series routing switch. Bridged (layer 2) traffic through the switch will not be affected by a filter. * The process of enabling filters on multiple ports at the same time can be very CPU intensive. Customers using OSPF, MLT, VRRP, or with busy networks (average CPU utilization ~25% or higher) are advised to enable filters on no more than 16 ports at a time. Enabling filters on more than 16 ports at a time may cause your telnet or device manager session to lock up or disconnect. Since the NIMDA virus also spreads using it's own SMTP server, customers may wish to filter TCP port 25 (SMTP). However, network administrators should examine the possible downsides to filtering SMTP traffic on the network, as programs such as Netscape Messenger, Eudora, and Outlook Express have their own SMTP agent that will generate packets on TCP port 25. Customers may also wish to block UDP and TCP ports 137, 138, 139, and 445 (NetBIOS). NetBIOS packets should not need to leave the local area network (LAN) and therefore should only be blocked on ports leading off of the LAN. This action is recommended, as NIMDA is capable of spreading across file shares and mapped drives. For BPS 2000 and BayStack switches:Customers using the Business Policy Switch 2000 with v1.2.0 code or higher may disable the web server portion of the box while the virus is infecting the network. However, there have been no confirmed reports of the BPS 2000 being affected by either virus. Customers using the BayStack 310 are advised to upgrade to at least v1.6.1 code immediately. Software versions prior to v1.6.1 will cause the switch to reset when it receives large packets destined for the CPU (such as those packets generated by the Code Red worm). It is recommended that customers with a BayStack 303 or 304 in their network disable web services on these switches until the virus can be removed from the network. Doing so will prevent the web server on the switch from locking up, but will not prevent the switch from listening on TCP port 80. There have been no confirmed reports of the Code Red or NIMDA viruses directly affecting the Centillion 50, Centillion 100, System 5000BH, BayStack 350, BayStack 410, BayStack 420, or the BayStack 450 switches. In extreme cases, the packets generated by the infected servers flooded the network with unnecessary traffic, causing legitimate management traffic (such as telnet and SNMP) not to get through. The only remedy in this instance is to remove the virus from the infected servers and/or remove infected devices from the network. References:The following websites may provide additional information about the Code Red, Code Red II, and NIMDA viruses, as well as any patches that may be available for vulnerable software programs.
--------------------------------------------------------------------------------
Page 5
CSB- 0109005 Nortel Networks Public Information 5 CERT®Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL Information about the Code Red Worm Information about the Code Red II Worm CA-2001-26 Nimda Worm Information on the "Nimda" Worm SupportContact Information:Nortel Networks is committed to bettering the customer experience through its Customer TouchPoint Program (CTP) ­ where in most countries one number can be used to contact Nortel Networks. To obtain regional telephone contact information, please visit the following website:
 
I have an Accelar 1200 that hits 100% utilization every 4 minutes for 1 minute at a time. I have eight port-based vlan's, one appletalk vlan, no OSPF just RIP. Used sniffer and can't find anything to blame it on.

Basically what I need to know is what problem's can cause this . Whether it be software ; hardware ; an exploit that some-one can take advantage of or a general load problem ? And how to diagnose and solve this problem ? If there is no way of knowing what the problem is or solving the problem , is there a way of telling what port or process is using up so many system recourses ?

Greg
 
We have found out, that if we have a BINTEC-Router in a VLAN, that is not the Default, there are Broadcast-Storms and the CPU is up to 100%
we did the bintec in the default VLAN , then all is OK

now we have Version 2.1.4 since june 2002 and the bintec works fine in all VLANs
 
The xlr1200 shouldn't be effected by the nimda virus (on your new version 2.1.4).
r u running spaning tree alg. on your machine ?

motty
 
spanning tree is not the problem, cause now all works fine with a bintec in any vlan
so i think the problem was the bintec in cooperaton with a version earlier 2.1.4

NOW EVERYTHING IS OK

 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top