How to mitigate an abnormal increase in "flow_rcv_dot1q_tag_err" global counter

How to mitigate an abnormal increase in "flow_rcv_dot1q_tag_err" global counter

23206
Created On 09/26/18 13:51 PM - Last Modified 07/27/23 23:42 PM


Symptom


When a packet comes into the firewall, the ingress port, 802.1q (VLAN) tag, and destination MAC address are used as keys to look up the ingress logical interface. If the interface is not found, the packet is discarded. The hardware interface counter "receive error" and global counter  “flow_rcv_dot1q_tag_err” are incremented.

Below is an example of the global counter flow_rcv_dot1q_tag_err incrementing in the firewall:
> show counter global

name value rate severity category aspect description
--------------------------------------------------------------------------------
flow_rcv_dot1q_tag_err                    32        7 drop      flow      parse     Packets dropped: 802.1q tag not configured


Environment


  • PAN-OS
  • VLANs
  • Interfaces/Subinterfaces


Cause


Common scenarios where flow_rcv_dot1q_tag_err increments include:
  • A packet comes into the firewall with an unexpected VLAN tag (i.e. a VLAN tag that does not match the configured VLAN tag on that interface or subinterface)
  • The neighboring device (Ex: a switch) is flooding VLAN-tagged or untagged traffic out a port which leads to the firewall
  • User misconfiguration of the VLAN tag on the interface or subinterface (configured no VLAN tag, configured a VLAN tag when one was not needed, configured the incorrect VLAN tag, etc.)
  • Untagged Spanning Tree Protocol BPDU packets are coming into the firewall. Unless explicitly configured, Spanning Tree Protocol does not by default include VLAN tags. This configuration is known as "Per-VLAN Spanning Tree" which would require manual configuration on the STP enabled device.
Note: If the global counter flow_rcv_dot1q_tag_err increments occasionally/a small amount, it may be safely ignored (as long as the packets dropped are not necessary or causing an issue for a certain traffic in your network to function). However, if the counter increments heavily/at a high rate, it may cause a performance issue on the firewall, as with any heavy rate of traffic ingressing. In that case, the packets ingressing the firewall causing this counter to increment should be identified using a Packet Capture.


Resolution


Verify that the packets coming into this interface are tagged with the VLAN tag number that matches the VLAN tag configured on this interface/subinterface. If needed, take a packet capture to view which packets are coming into the firewall with no tag/an unexpected tag.



Additional Information


More information on interfaces, subinterfaces, and VLANs/VLAN tags in various deployments can be found in the documents below:

Network > Interfaces > VLAN
Network > VLANs
How to Configure 802.1q VLAN tag on 802.3ad/Aggregate Group

Virtual Wire
VLAN-Tagged Traffic
Virtual Wire Subinterface

Layer 2 Interfaces
Getting Started: Layer 2 Interfaces
Layer 2 Interfaces with No VLANs
Layer 2 Interfaces with VLANs
Configure a Layer 2 Interface, Subinterface, and VLAN
PA-7000 series Layer 2 Interface
PA-7000 series Layer 2 Subinterface
Manage Per-VLAN Spanning Tree (PVST+) BPDU Rewrite 
PAN-OS 7.1 Per VLAN Spanning-Tree (PVST+) BPDU rewrite 

Layer 3 Interfaces
Getting Started: Layer 3 Subinterfaces
How to Create Tagged Sub-Interfaces

Layer 3 Interface
Layer 3 Subinterface
Unable to Add VLAN Tag to Layer-3 Interface

Native VLAN Configuration

How to Configure L3 Untagged Subinterfaces to Communicate within Different Zones

Note: For PA VM-series firewalls, you may see packet drops and the counter flow_rcv_dot1q_tag_err increment. This means that the PA-VM firewall is receiving traffic with a destination MAC or VLAN tag not configured on the interface. This can be due to Promiscuous Mode configuration on the host. To resolve this, confirm if Promiscuous Mode is enabled in any of the port groups attached to the vNICs of the PA-VM. Promiscuous Mode is required only if you are not using the 'Hypervisor Assigned MAC Address' setting on the PA-VM. It is generally recommended to use the 'Use Hypervisor Assigned MAC Addresses' setting with Promiscuous Mode disabled/set to Reject.

Additional information on whether to use Promiscuous Mode vs. the 'Use Hypervisor Assigned MAC Address' setting can be found below:
Why is the VM-Series firewall not receiving any network traffic?
How to Configure Interfaces for VM-Series to Work in L3 without Promiscuous Mode
Use Hypervisor Assigned MAC Addresses" Functionality with Vwire Interfaces Does Not Work"

Hypervisor Assigned MAC Addresses
VMWare - How promiscuous mode works at the virtual switch and portgroup levels
VMWare - Configuring promiscuous mode on a virtual switch or portgroup


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClvhCAC&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language