NBNS Protocol overloading a vlan
Hello, First time posting here, I apologize if I screw it up.
We are seeing random 'NetBIOS Name Service' (WINs) broadcasts (1-3 times a day at random times) going across a vlan. This traffic overloads the vlan and our phone system goes down as a result due to heartbeat timers expiring between devices.
Here is an example:
15641 2020-03-09 08:01:12.435091 169.254.175.195 169.254.255.255 NBNS 110 Registration NB OH101289<20>
Frame 15641: 110 bytes on wire (880 bits), 110 bytes captured (880 bits) on interface \Device\NPF_{4CB19F40-9878-4814-8D24-F2CF192BBA0D}, id 0
Interface id: 0 (\Device\NPF_{4CB19F40-9878-4814-8D24-F2CF192BBA0D})
Encapsulation type: Ethernet (1)
Arrival Time: Mar 9, 2020 08:01:12.435091000 Eastern Daylight Time
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1583755272.435091000 seconds
[Time delta from previous captured frame: 0.000080000 seconds]
[Time delta from previous displayed frame: 0.000080000 seconds]
[Time since reference or first frame: 2226.259421000 seconds]
Frame Number: 15641
Frame Length: 110 bytes (880 bits)
Capture Length: 110 bytes (880 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:ip:udp:nbns]
[Coloring Rule Name: SMB]
[Coloring Rule String: smb || nbss || nbns || netbios]
Ethernet II, Src: Watlow_00:2a:0f (00:03:aa:00:2a:0f), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Destination: Broadcast (ff:ff:ff:ff:ff:ff)
Source: Watlow_00:2a:0f (00:03:aa:00:2a:0f)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 169.254.175.195, Dst: 169.254.255.255
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 96
Identification: 0xc40d (50189)
Flags: 0x0000
...0 0000 0000 0000 = Fragment offset: 0
Time to live: 48
Protocol: UDP (17)
Header checksum: 0xc2bf [validation disabled]
[Header checksum status: Unverified]
Source: 169.254.175.195
Destination: 169.254.255.255
User Datagram Protocol, Src Port: 137, Dst Port: 137
Source Port: 137
Destination Port: 137
Length: 76
Checksum: 0x8e6e [unverified]
[Checksum Status: Unverified]
[Stream index: 335]
[Timestamps]
NetBIOS Name Service
Transaction ID: 0xd4c8
Flags: 0x2910, Opcode: Registration, Recursion desired, Broadcast
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 1
Queries
OH101289<20>: type NB, class IN
Additional records
It looks like the source device is in Ethernet II field and is named "Watlow_MAC Address" and the target being Queried is a workstation on our network named "OH101289".
Does this sound correct in my source/destination assumption? I am unsure as to why the source device would be targeting the destination workstation as I assumed this was a UDP broadcast?
Any help would be appreciated.
Thanks
Do you have these devices in your network: https://www.watlow.com/Home
Is the owner/user of OH101289 testing a new device?
The Packet List line at the top shows a 169.254 like the device didn't get a good config at startup:
https://packetlife.net/blog/2008/sep/...
Hi, Thanks for your response.
Yes, that manufacturer is correct.
No, we are unaware of anyone testing this type of device as it has been installed into the production network for quite some time. I will double check if I can find the owner.
Yea, the 169.###.###.### addresses are confusing me as I thought the www.watlow.com devices are just manufacturing PLC devices that are not running a Windows OS? The source has a static internal IP address on the vlan in question e.g. 172.21.8.### and then the source IP seems to change to the 169.### addressing?
Thanks
[Protocols in frame: eth:ethertype:ip:udp:nbns]
The frame section says IP and UDP were present but that data not in the copy/paste of the packet data.
Can you share a pcap of the packet or a screen shot showing the packet details area in Wireshark?
Do you mean the field at the bottom of the three windows?
0000 ff ff ff ff ff ff 00 03 aa 00 2a 0f 08 00 45 00 ..........*...E. 0010 00 60 c4 0d 00 00 30 11 c2 bf a9 fe af c3 a9 fe .
....0......... 0020 ff ff 00 89 00 89 00 4c 8e 6e d4 c8 29 10 00 01 .......L.n..)... 0030 00 00 00 00 00 01 20 45 50 45 49 44 42 44 41 44 ...... EPEIDBDAD 0040 42 44 43 44 49 44 4a 43 41 43 41 43 41 43 41 43 BDCDIDJCACACACAC 0050 41 43 41 43 41 43 41 00 00 20 00 01 c0 0c 00 20 ACACACA.. ..... 0060 00 01 00 04 93 e0 00 06 60 00 a9 fe af c3 ........
.....The packet details are the center section in this screen example:
https://www.wireshark.org/docs/wsug_h...