/VOSSLoopTrace

Extreme VOSS LoopTrace

Primary LanguagePython

VOSS CPP Loop Trace

Overview

This Python script is designed to help VOSS users locate the sources of excessive traffic to the control plane in a network environment on a VOSS VSP. The script leverages the built-in trace tool on VOSS to analyze traffic patterns and pinpoint potential issues.

Prerequisites

  • Python 3.x installed on your system.
  • Network access to the VOSS VSP (if using the script to log in remotely).
  • Appropriate credentials for accessing the VSP.

Installation

  1. Ensure Python 3.x is installed on your system. You can download it from the official Python website.
  2. Download and save the script to a directory on your system.

Usage

  1. Run the script using Python 3.
    python3 VOSSLoopTrace.py
    

Usage

The script will prompt you for input. You have two options:

  • Provide a Trace File: If you already have a trace file generated by the VOSS trace tool, you can place a file named 'loop.txt' in the running directory.
  • Remote Login to VSP: If you do not have a trace file, the script can log in to the VSP remotely to generate and analyze trace data. You will be prompted to enter the IP address, username, and password for the VSP.

Features

  • Trace File Analysis: Analyzes existing trace files to identify sources of excessive traffic to the control plane.
  • Remote Data Collection: Remotely logs into the VSP to generate and analyze trace data.
  • User-Friendly Interface: Easy-to-use prompts guide you through the process of analyzing the network traffic.

Note

  • This tool is intended for use by network professionals familiar with VOSS.
  • Ensure you have the necessary permissions to access and analyze network data.

Example Output:

  Do you want to (1) connect to the device or (2) read from a text file named 'loop'? Enter 1 or 2: 2
  Possible loop detected on Port: TX-NNI, VLAN ID: 4
  MACs associated with the loop: 00-15-5d-03-b5-82, 00-15-5d-6e-3d-c7, 00-15-5d-03-b5-a1, 00-15-5d-ab-0e-05, 00-15-5d-03-b5-a0, e4-db-ae-6f-a1-01, 00-15-5d-03-bc-01, 00-15-5d-03-c2-12, 00-15-5d-03-b5-60, 00-15-5d-03-b5-9c, 74-86-7a-d4-ce-fc, a0-42-3f-3d-ff-e7, 00-15-5d-6e-47-bd, 00-15-5d-6e-3d-ac, 00-15-5d-03-b5-       9f,    00-15-5d-03-c2-13, e4-54-e8-6a-d6-39
  Possible loop detected on Port: TX-NNI, VLAN ID: 100
  MACs associated with the loop: 1c-82-59-19-f8-42, d8-5e-d3-8e-63-b8, 1c-82-59-19-48-51, c0-25-a5-4e-82-d4, 1c-82-59-19-80-52, 1c-82-59-1a-7a-7c, 1c-82-59-1a-28-e3, 1c-82-59-1a-73-5b, e4-db-ae-6f-a1-02, 1c-82-59-19-cf-e9, 1c-82-59-1a-7b-50