
C
HAPTER
4
| Configuring the Switch
Quality of Service
– 116 –
C
ONFIGURING
S
TORM
C
ONTROL
You can configure limits on broadcast, multicast and unknown unicast
traffic to control traffic storms which may occur when a network device is
malfunctioning, the network is not properly configured, or application
programs are not well designed or properly configured. Traffic storms
caused by any of these problems can severely degrade performance or
bring your network to a complete halt.
You can protect your network from traffic storms by setting a threshold for
broadcast, multicast, or unknown unicast traffic. Any packets exceeding
the specified threshold will then be dropped. Note that the limit specified
on this page applies to each port.
P
ARAMETERS
The following parameters are displayed on the Storm Control Configuration
page:
◆
Frame Type
- Specifies broadcast, multicast or unknown unicast
traffic.
◆
Status
- Enables or disables storm control. (Default: Disabled)
◆
Rate
(pps) - The threshold above which packets are dropped. This limit
can be set by specifying a value of 2
n
packets per second (pps), or by
selecting one of the options in Kpps (i.e., marked with the suffix “K”).
(Options: 2
n
pps where n = 1, 2, 4, 8, 16, 32, 64, 128, 256, 512; or 1,
2, 4, 8, 16, 32, 64, 128, 256, 512, 1024 Kpps; Default: 2 pps)
Due to an ASIC limitation, the enforced rate limits are slightly less than
the listed options. For example: 1 Kpps translates into an enforced
threshold of 1002.1 pps.
Summary of Contents for ES4528V-38
Page 1: ...Management Guide www edge core com 28 Port Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 22: ...FIGURES 22...
Page 26: ...SECTION Getting Started 26...
Page 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46...
Page 48: ...SECTION Web Configuration 48...
Page 75: ...CHAPTER 4 Configuring the Switch Creating Trunk Groups 75 Figure 11 LACP Port Configuration...
Page 186: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 186...
Page 192: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 192...
Page 242: ...CHAPTER 12 Port Commands 242...
Page 248: ...CHAPTER 13 Link Aggregation Commands 248...
Page 266: ...CHAPTER 15 RSTP Commands 266...
Page 276: ...CHAPTER 16 IEEE 802 1X Commands 276...
Page 286: ...CHAPTER 17 IGMP Commands 286...
Page 294: ...CHAPTER 18 LLDP Commands 294...
Page 300: ...CHAPTER 19 MAC Commands 300...
Page 310: ...CHAPTER 21 PVLAN Commands 310...
Page 322: ...CHAPTER 22 QoS Commands 322...
Page 356: ...CHAPTER 26 SNMP Commands 356...
Page 359: ...CHAPTER 27 HTTPS Commands 359 EXAMPLE HTTPS redirect enable HTTPS...
Page 360: ...CHAPTER 27 HTTPS Commands 360...
Page 366: ...CHAPTER 29 UPnP Commands 366...
Page 374: ...CHAPTER 31 Firmware Commands 374...
Page 376: ...SECTION Appendices 376...
Page 390: ...GLOSSARY 390...
Page 395: ......