<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;OSPF-neighbor-down&amp;quot;- software bug?? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305783#M79478</link>
    <description>&lt;P&gt;Check your logs and (if this is an ISP link) get the ISP to check their router logs, to make sure you weren't hit by a UDP flood or other DoS/DDoS attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prior to configuring Zone Protection and DoS Protection Profiles, and having our ISP configure DoS protection/monitoring on their end, we'd lose OSPF due to UDP floods preventing OSPF packets from getting through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UDP flood attacks are generally very short in duration, under a minute or two, so they won't always show up in logs/monitoring tools unless you specifically look for them, but they'll easily saturate a gigabit link.&amp;nbsp; We had several of these attacks over the past year, and our PA-3020s couldn't handle the traffic (overload the session table) and we'd lose OSPF on our internal network.&amp;nbsp; We switches to PA-5220s this fall, and still suffered OSPF drops due to link saturation on our gigabit link.&amp;nbsp; We now have ZPP/DoS enabled, and our ISP is monitoring for DDoS attacks (anything over 3 minutes in length is automatically shutdown at the ISP side).&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jan 2020 18:29:01 GMT</pubDate>
    <dc:creator>fjwcash</dc:creator>
    <dc:date>2020-01-06T18:29:01Z</dc:date>
    <item>
      <title>"OSPF-neighbor-down"- software bug??</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305632#M79432</link>
      <description>&lt;P&gt;I'm currently running 8.1.10 on PA-820 firewalls. They are in A/P failover pair. Last night, all of a sudden primary firewall started showing "( eventid eq routed-OSPF-neighbor-down )" in system logs and OSPF went down. I failed over to secondary and connections were restored. These 2 firewalls are connected to 2 switchports which are both part of same VLAN and SVI.I verified both the switchports are sending ospf hello packets for every 10 seconds and verified them on packet capture. I interchanged the cables going to firewalls between switchports and that didn't recreate the issue.so this ruled out the switch/router from the equation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am wondering if this is a software bug? if it is, why didn't both firewalls get hit?&lt;/P&gt;&lt;P&gt;or is it a hardware bug? please post your ideas.&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 22:22:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305632#M79432</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2020-01-03T22:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: "OSPF-neighbor-down"- software bug??</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305725#M79460</link>
      <description>&lt;P&gt;One switch or two switches ?&lt;/P&gt;&lt;P&gt;Checked STP topology changes ?&lt;/P&gt;&lt;P&gt;Checked logs on the switch ?&lt;/P&gt;&lt;P&gt;Do you have EtherChannel configured ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at the release notes, Can't spot any known issues related to OSPF.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 08:07:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305725#M79460</guid>
      <dc:creator>Nehmaan</dc:creator>
      <dc:date>2020-01-06T08:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: "OSPF-neighbor-down"- software bug??</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305746#M79466</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97720"&gt;@Nehmaan&lt;/a&gt;&amp;nbsp;I interchanges the cables to make sure it's not switching/routing issue. last night after a reboot and failover, adjacency came back up again. so, I think it's clearly a software bug.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 13:57:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305746#M79466</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2020-01-06T13:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: "OSPF-neighbor-down"- software bug??</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305748#M79468</link>
      <description>&lt;P&gt;Are these ports in aggregate or are you using spanning tree for fail-over (probably not a great idea in this situation).&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 14:24:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305748#M79468</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-01-06T14:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: "OSPF-neighbor-down"- software bug??</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305783#M79478</link>
      <description>&lt;P&gt;Check your logs and (if this is an ISP link) get the ISP to check their router logs, to make sure you weren't hit by a UDP flood or other DoS/DDoS attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prior to configuring Zone Protection and DoS Protection Profiles, and having our ISP configure DoS protection/monitoring on their end, we'd lose OSPF due to UDP floods preventing OSPF packets from getting through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UDP flood attacks are generally very short in duration, under a minute or two, so they won't always show up in logs/monitoring tools unless you specifically look for them, but they'll easily saturate a gigabit link.&amp;nbsp; We had several of these attacks over the past year, and our PA-3020s couldn't handle the traffic (overload the session table) and we'd lose OSPF on our internal network.&amp;nbsp; We switches to PA-5220s this fall, and still suffered OSPF drops due to link saturation on our gigabit link.&amp;nbsp; We now have ZPP/DoS enabled, and our ISP is monitoring for DDoS attacks (anything over 3 minutes in length is automatically shutdown at the ISP side).&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 18:29:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/305783#M79478</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2020-01-06T18:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: "OSPF-neighbor-down"- software bug??</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/306481#M79622</link>
      <description>&lt;P&gt;Last week I rebooted the problem firewall and failed-over to it. It was to my surprise that the issue was fixed and working fine now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 13:36:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-ospf-neighbor-down-quot-software-bug/m-p/306481#M79622</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2020-01-13T13:36:11Z</dc:date>
    </item>
  </channel>
</rss>

