IS anyone using this product and if so, I wonder if you are having the same issues we are.
Occassionally, for no reason I can discern, this thing just gets wadded up and starts putting packets on the wire that have the same source mac address as our firewall. When that happens, packets begin to drop because the switch, having adjusted it's mac-address table for the source addresses it sees coming in on various ports, keeps becoming confused about where the firewall really is.
I can shut off the port that surfcontrol is attached to, or I can stop surfcontrol's redirection feature, and either will solve the problem.
SC is 'working as designed' in that the way it blocks sites is to redirect the conversation away from the disallowed site and instead offer you up the 'you can't go there' page. This it does by spoofing the site's destination mac address as the source for the blocked page packet.
But why it suddenly starts crafting packets with the source mac address of our Nokia firewall is beyond me. At first I thought someone was trying to hit that device with their browser. But I've used wireshark to trap packets but I don't see evidence of that. SC's logging isn't very complete so that doesn't tell me much, either.
If anyone else has worked with this product, or similar products and has seen the way it causes the mac-address table to become confused, I'd be grateful for input.
Occassionally, for no reason I can discern, this thing just gets wadded up and starts putting packets on the wire that have the same source mac address as our firewall. When that happens, packets begin to drop because the switch, having adjusted it's mac-address table for the source addresses it sees coming in on various ports, keeps becoming confused about where the firewall really is.
I can shut off the port that surfcontrol is attached to, or I can stop surfcontrol's redirection feature, and either will solve the problem.
SC is 'working as designed' in that the way it blocks sites is to redirect the conversation away from the disallowed site and instead offer you up the 'you can't go there' page. This it does by spoofing the site's destination mac address as the source for the blocked page packet.
But why it suddenly starts crafting packets with the source mac address of our Nokia firewall is beyond me. At first I thought someone was trying to hit that device with their browser. But I've used wireshark to trap packets but I don't see evidence of that. SC's logging isn't very complete so that doesn't tell me much, either.
If anyone else has worked with this product, or similar products and has seen the way it causes the mac-address table to become confused, I'd be grateful for input.