Chapter 14
| Congestion Control Commands
Storm Control Commands
– 345 –
Storm Control Commands
Storm control commands can be used to configure broadcast, multicast, and
unknown unicast storm control thresholds. Traffic storms may occur when a device
on your network is malfunctioning, or if application programs are not well
designed or properly configured. If there is too much traffic on your network,
performance can be severely degraded or everything can come to complete halt.
You can protect your network from traffic storms by setting a threshold for
broadcast, multicast or unknown unicast traffic. Any packets exceeding the
specified threshold will then be dropped.
switchport
packet-rate
This command configures broadcast, multicast and unknown unicast storm
control. Use the
no
form to restore the default setting.
Syntax
switchport
{
broadcast
|
multicast
|
unknown-unicast
}
packet-rate
rate
no switchport
{
broadcast
|
multicast
|
unknown-unicast
}
broadcast
- Specifies storm control for broadcast traffic.
multicast
- Specifies storm control for multicast traffic.
unknown-unicast
- Specifies storm control for unknown unicast traffic.
rate
- Threshold level as a rate; i.e., kilobits per second.
(Range: 64-1000000 kbps)
Default Setting
Broadcast Storm Control: Enabled, 64 kbps
Multicast Storm Control: Disabled
Unknown Unicast Storm Control: Disabled
Command Mode
Interface Configuration (Ethernet)
Table 76: Rate Limit Commands
Command
Function
Mode
switchport packet-rate
*
* Enabling hardware-level storm control with this command on a port will disable software-level
automatic storm control on the same port if configured by the
auto-traffic-control
command.
Configures broadcast, multicast, and unknown
unicast storm control thresholds
IC
show interfaces
switchport
Displays the administrative and operational status
of an interface
NE, PE
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...