Monitor IGMP Join/Leave Frequency

Overview:

Our customer is an ISP and mobile carrier that provides access to millions of subscribers to online or internal services. Their reach spans several countries in Southeast Asia.

The Problem:

  • Our customer has issues with inconsistent content delivery to their subscribers especially with high bandwidth applications such as IPTV, cloud applications, and online gaming. They need a solution that can monitor their environment (PON G/XG), send alerts, and at the same time be able to quickly identify the source of the incident with 24/7 availability and record all traffic information beyond just the header.

The Solution:

  • With PureInsight, our customer was able to monitor areas of interest such as IGMP join/leave frequency, successful join, alerts based on DNS queries/responses, and DHCPv4/v6 discovers/requests. In addition, they can visualize their network traffic and quickly distinguish between broadcast, multicast, or unicast traffic.

Workflow:

1. Alerts

  • Go to Alerts and set igmp.record_type == 3 and igmp.record_type == 2 filters. (Capture the network traffic with the QP series)

  • Alerts grab the number of packets at a specific point in time based on the filter. In this case, an IGMP spike could be a leak spike which means a particular service dropped and the router or switch had some effects.

2. Check the Timeline Alert Graphs

  • Click the plus button to add and remove filters.

3. Check the Timestamp on the Spike

  • If you zoom in, you will see that there is also network data at the bottom of the graph.

4. Flow Analysis

  • If you zoom in on the spike, you can see the top of the spike.

5. Download a PCAP File

  • Hover over the top portion of the spike and check the time stamp.

6. Interactive Search

  • Perform a search by date and time before and after the timestamp observed in the alert.

  • Interactive Search can be used to categorize captured traffic data based on IP addresses, port numbers, protocols, and regular expressions. You can visualize the network traffic as a Nodal Graph with details of each node displayed.

7. Flow Analysis

  • Flow Analysis is used to create network streams from the PCAP files. Streams are plotted based on 5-tuple information, which contains source/destination IP, source/destination port, and timestamp extracted from each packet. The streams are plotted as the number of packets (y-axis) vs. time (x-axis).

  • Enter the files extracted in the interactive search. Use the lasso tool to highlight the flows you want to see in particular.

8. Download a PCAP File

  • The entire packet data can be downloaded in a PCAP format file for further investigation with third-party tools such as Wireshark.