Consider the following scenario:
In this scenario, a broadcast "Unsolicited Neighbor" advertisement is sent from the Ethernet network adapter that contains the Ethernet network's source MAC address. Then, the virtual switch on the wireless network adapter receives this packet and duplicates it so that it contains the Wi-Fi network adapter's source MAC address. This may trigger a broadcast storm, as in the following example:
- You have at least three client computers that are running Windows 8.1.
- The client computers each have one Ethernet network adapter and one Wi-Fi network adapter installed.
- You configure the client computers for the Hyper-V role.
- You connect both the Ethernet and Wi-Fi network adapter on each computer to the same subnet.
- You bind the Hyper-V virtual switch to the Wireless network adapter.
In this scenario, a broadcast "Unsolicited Neighbor" advertisement is sent from the Ethernet network adapter that contains the Ethernet network's source MAC address. Then, the virtual switch on the wireless network adapter receives this packet and duplicates it so that it contains the Wi-Fi network adapter's source MAC address. This may trigger a broadcast storm, as in the following example:
0.1366931 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1371023 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1383006 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1420106 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1433349 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1433349 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1498319 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1512549 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1512549 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1371023 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1383006 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1420106 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1433349 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1433349 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1498319 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1512549 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5
0.1512549 FE80:0:0:0:71AC:69C2:1AF4:92B5 FF02:0:0:0:0:0:0:1 ICMPv6 ICMPv6:Neighbor Advertisement, Target = FE80:0:0:0:71AC:69C2:1AF4:92B5