<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Spurious MDNS with IP 169.254.XX.XX in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96315#M15714</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello everyone! In my company's network, there are some Ruckus APs as well as some Cisco APs and Cisco Switches. We found a device on the management page of our Cisco Switch that doesn't exist in the topology. Its IP address is 169.254.xx.xx. After packet capture with Wireshark, we found there are some MDNS packet sent by Ruckus APs with ip 169.254.xx.xx. Maybe that is related to&amp;nbsp;Bonjour Service (Once I disable the Bonjour Gateway, the phenomena above disappears)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I wan to know why Ruckus APs would construct and send such an MDNS packet? That makes me confused and brings some trouble to our control and management of device accessing in the network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can anyone help me with the above question？ Many thanks!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Aug 2024 05:50:14 GMT</pubDate>
    <dc:creator>OUSUIXIN</dc:creator>
    <dc:date>2024-08-30T05:50:14Z</dc:date>
    <item>
      <title>Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96315#M15714</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello everyone! In my company's network, there are some Ruckus APs as well as some Cisco APs and Cisco Switches. We found a device on the management page of our Cisco Switch that doesn't exist in the topology. Its IP address is 169.254.xx.xx. After packet capture with Wireshark, we found there are some MDNS packet sent by Ruckus APs with ip 169.254.xx.xx. Maybe that is related to&amp;nbsp;Bonjour Service (Once I disable the Bonjour Gateway, the phenomena above disappears)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I wan to know why Ruckus APs would construct and send such an MDNS packet? That makes me confused and brings some trouble to our control and management of device accessing in the network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can anyone help me with the above question？ Many thanks!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 05:50:14 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96315#M15714</guid>
      <dc:creator>OUSUIXIN</dc:creator>
      <dc:date>2024-08-30T05:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96318#M15715</link>
      <description>&lt;P&gt;The Access Point I used is R650.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 05:52:15 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96318#M15715</guid>
      <dc:creator>OUSUIXIN</dc:creator>
      <dc:date>2024-08-30T05:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96350#M15717</link>
      <description>&lt;P&gt;Are you sure it’s not a device with a self-assigned IP on the network that is doing a multicast? The Bonjour gateway would just be relaying that broadcast to the other VLAN, it wouldn’t be coming from the Ruckus AP itself. You should see the same broadcast if you capture wifi traffic with a device on the SSID which the device/s are connected to.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 14:34:49 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96350#M15717</guid>
      <dc:creator>Squozen</dc:creator>
      <dc:date>2024-08-30T14:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96362#M15718</link>
      <description>&lt;P&gt;Yes, I'm sure the packet with source IP 169.254.XX.XX is created by Ruckus R650, since the source mac address of that packet has a prefix registered by Ruckus (And Wireshark parses the source mac address to RuckusWi_XX:XX:XX).&lt;/P&gt;&lt;P&gt;Note that I configured a Bonjour Service Rule with SrvVlan 200 and CliVlan 800.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Besides the spurious MDNS packet with Vlan 800,&lt;/STRONG&gt; &lt;STRONG&gt;there are also another MDNS packet with VLAN 200&amp;nbsp;&lt;/STRONG&gt;according to the packet captured on the wired side. They have the similar/same MDNS payload but the spurious one has source address&amp;nbsp;RuckusWi_XX:XX:XX and source IP 169.254.XX.XX, while the other packet has source 92:2c:09:29:ee:64 and source IP 172.160.200.59.&lt;/P&gt;&lt;P&gt;Thank you for your kindly reply!&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 15:38:26 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96362#M15718</guid>
      <dc:creator>OUSUIXIN</dc:creator>
      <dc:date>2024-08-30T15:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96365#M15719</link>
      <description>&lt;P&gt;Yes, I'm sure the packet with source IP 169.254.XX.XX is created by Ruckus, Since its source mac address has a prefix registered by Ruckus (And Wireshark parses it as RuckusWi_XX:XX:XX)&lt;/P&gt;&lt;P&gt;Note that I configured a Bonjour Service Rule with SrvVlan 200 and CliVlan 800.&lt;/P&gt;&lt;P&gt;Besides the spurious MDNS packets with VLAN 800, there are some other MDNS packets with VLAN 200 according to the packets captured from the wired side. They have similar MDNS payload but differ from mac address, source IP address and VLAN. The spurious packets have source mac address RuckusWi_XX:XX:XX, source IP 169.254.XX.XX and VLAN 800. while the normal packets have source mac address like Chongqin_06:db:e9 and source IP like 172.160.200.59&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 15:56:31 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96365#M15719</guid>
      <dc:creator>OUSUIXIN</dc:creator>
      <dc:date>2024-08-30T15:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96366#M15720</link>
      <description>&lt;P&gt;That is what will happen with a relay to another VLAN. The original MAC address wouldn’t pass between VLANs so the Ruckus uses its own MAC address as the ‘source’. Sniff the traffic on the wireless network and you should see a Bonjour broadcast from the &lt;EM&gt;actual&lt;/EM&gt; culprit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've attached a packet capture from my network where my Palo Alto firewall is relaying an MDNS packet from my phone on the guest wifi - see how the source MAC address says it's a Palo Alto device, and not the iPhone that actually has the source IP of 192.168.249.17?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-08-30 at 18.47.44.png" style="width: 999px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/13942i02913A4D148BC31C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-08-30 at 18.47.44.png" alt="Screenshot 2024-08-30 at 18.47.44.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 17:56:43 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96366#M15720</guid>
      <dc:creator>Squozen</dc:creator>
      <dc:date>2024-08-30T17:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96389#M15724</link>
      <description>&lt;P&gt;It's so kind of you to reply so quick.&lt;/P&gt;&lt;P&gt;You means the MDNS packet with MAC address&amp;nbsp;&lt;SPAN&gt;92:2c:09:29:ee:64&lt;/SPAN&gt; and&amp;nbsp;VLAN 200 can not be passed to VLAN 800 where some MDNS queriers exist?&lt;/P&gt;&lt;P&gt;So why don't Ruckus relay that MDNS packet with only VLAN changed? I mean Ruckus R650 can relay a MDNS packet with VLAN 800 while keeping the source MAC (&lt;SPAN&gt;92:2c:09:29:ee:64 &lt;/SPAN&gt;)&amp;nbsp;&lt;SPAN&gt;and source IP (172.160.200.59) of &amp;nbsp;the&amp;nbsp;actual&amp;nbsp;culprit, instead of relaying a MDNS packet with VLAN 800 and source MAC RuckusWi_XX:XX:XX and IP (169.254.XX.XX), which is fake/spurious information. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Why is it necessary to replace the source MAC address? Is it for privacy protection? If so, why can I still capture the original MDNS packet with actual MAC on the wired side of Ruckus R650? Or &lt;STRONG&gt;do you mean actual MAC address is bind to specific VLAN so only change VLAN of the original MDNS packet is not enough, the MDNS packet may still be dropped&lt;/STRONG&gt;?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And below is another doubt：according to my observation, fake/spurious IP like 169.254.XX.XX can be seen not only when Ruckus R650 receives&amp;nbsp;the MDNS response packet from device connected to some SSID of Ruckus, but also when&amp;nbsp;Ruckus receive the MDNS query packet from its wired side. &lt;STRONG&gt;If there is already relaying behavior for Ruckus, why does Ruckus still answer MDNS query on behalf&lt;/STRONG&gt;? I mean it is not necessary to answer/reply MDNS query, just relaying the MDNS packet with VLAN changed is enough.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 03:50:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96389#M15724</guid>
      <dc:creator>OUSUIXIN</dc:creator>
      <dc:date>2024-08-31T03:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96390#M15725</link>
      <description>&lt;P&gt;The source MAC is changed because multicasts cannot route between networks by default. This is why the Bonjour gateway feature exists in the first place. Using a single MAC instead of passing on the real source MAC address reduces resource use on the destination VLAN.&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;I’ll repeat what I said earlier - run Wireshark on the source VLAN, not the destination VLAN, and you’ll find the MAC address of the device that is sending the multicast packets. Something is failing to obtain a DHCP address and falling back to a self-assigned IP.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 06:31:05 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96390#M15725</guid>
      <dc:creator>Squozen</dc:creator>
      <dc:date>2024-08-31T06:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96438#M15726</link>
      <description>&lt;P&gt;I'm sure the spurious packets are created and send by Ruckus, and the attached figures are evidence: I&amp;nbsp;s&lt;SPAN&gt;niff the traffic on the wireless network, and &lt;STRONG&gt;find the device that is sending the MDNS packet with mac f2:ee:8a:f4:13:45 and IP 192.168.10.102&lt;/STRONG&gt; (figure 1). But in figure 2 &lt;STRONG&gt;I also find the spurious packet on the wireless side with MAC RuckusWirele_a7:0c:43 (28:b3:71: ) and IP 169.254.25.191, which means the spurious IP 169.254.XX.XX is not&amp;nbsp;Something failing to obtain a DHCP&lt;/STRONG&gt; address and falling back self-assigned IP, &lt;STRONG&gt;it is definitely assigned by Ruckus!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="figure1.PNG" style="width: 654px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/13952i7FDFB12C2B77526F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="figure1.PNG" alt="figure1.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="figure2.PNG" style="width: 702px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/13951i7F51AEAB171BDC84/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="figure2.PNG" alt="figure2.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 10:07:20 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96438#M15726</guid>
      <dc:creator>OUSUIXIN</dc:creator>
      <dc:date>2024-09-02T10:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: Spurious MDNS with IP 169.254.XX.XX</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96538#M15727</link>
      <description>&lt;P&gt;So, you think the Ruckus is responding to MDNS requests and it suddenly decides not to do it when you turn off the Bonjour gateway, rather than it being a rogue device on your network. Ok! I think you still haven’t grasped how a Bonjour gateway works if you think that the MAC address being the Ruckus is a smoking gun?&lt;/P&gt;&lt;P&gt;Have you tried expanding the MDNS answer fields to see what information the ‘Ruckus’ is sending?&lt;/P&gt;&lt;P&gt;Would I be correct in guessing that the wired side of the network doesn’t have DHCP configured? Have you sniffed the traffic on the wired side yet to see if you can find the 169.254.25.191 device?&lt;/P&gt;&lt;P&gt;Do you know where the Vivo Nex phone is on the network? Is it the&amp;nbsp;192.168.10.102 device?&lt;/P&gt;&lt;P&gt;From what I can see on your capture, you are seeing Apple Airplay MDNS traffic. Looking through the _raop._tcp.local RRs should reveal some more information.&lt;/P&gt;&lt;P&gt;&lt;A href="https://openairplay.github.io/airplay-spec/service_discovery.html" target="_blank"&gt;&lt;STRONG&gt;https://openairplay.github.io/airplay-spec/service_discovery.html&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 20:36:34 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Spurious-MDNS-with-IP-169-254-XX-XX/m-p/96538#M15727</guid>
      <dc:creator>Squozen</dc:creator>
      <dc:date>2024-09-02T20:36:34Z</dc:date>
    </item>
  </channel>
</rss>

