Cisco Systems 3560 Manual Do Utilizador
C H A P T E R
24-1
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
24
Configuring Port-Based Traffic Control
This chapter describes how to configure the port-based traffic control features on the Catalyst 3560
switch.
switch.
Note
For complete syntax and usage information for the commands used in this chapter, see the command
reference for this release.
reference for this release.
This chapter consists of these sections:
•
•
•
•
•
Configuring Storm Control
These sections contain this conceptual and configuration information:
•
•
•
•
Understanding Storm Control
Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm
on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive
traffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in
network configurations, or users issuing a denial-of-service attack can cause a storm.
on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive
traffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in
network configurations, or users issuing a denial-of-service attack can cause a storm.
Storm control (or traffic suppression) monitors packets passing from an interface to the switching bus
and determines if the packet is unicast, multicast, or broadcast. The switch counts the number of packets
of a specified type received within the 1-second time interval and compares the measurement with a
predefined suppression-level threshold.
and determines if the packet is unicast, multicast, or broadcast. The switch counts the number of packets
of a specified type received within the 1-second time interval and compares the measurement with a
predefined suppression-level threshold.