I’ve seen similar messages like this minus the dup MAC in the packets.
We have packet loss on the uplink of our vMX which in turn creates VPN tunnel drops. The loss is regularly ranging from 0.3%-5% with spikes up to 100% but mostly around 70%.We are also seeing high session counts. We started with a medium size vMX then added a second to segment our sites to combat the session count issue. This did not correct the issue, we then added a large model, loss and vpn drops still happening.
Opened a TAC case and after a few techs we found packets with duplicate macs in the src/dst fields. The recommendation is to create an NSG to filter the MAC issue, we have not found a way to do this.
Below is our topology. (Please disregard the vMX01-M)
I’ve taken some of the actions I found in other threads to have the VPN registration checked and the MTU size for AnyConnect. Waiting the response form TAC on that.
One trigger we have found is our vulnerability scanner that hits all subnets for our remote sites. The upside to this is that it is scheduled so we were able to isolate that part of the problem or at least know a cause of a large portion of the traffic. But we still have the issue on a smaller scale throughout the day.
My next actions are to re-work the Azure route tables to make them more specific, i.e. remove the RFC1918 routes and put in routes specific to our sites.
Any other thoughts? All help is greatly appreciated.
-Dennis