[nsp] 2950 Broadcast Storm
Stephen J. Wilcox
steve at telecomplete.co.uk
Fri Mar 12 09:43:29 EST 2004
Depends whats on the port.. some things have higher broadcast than others,
theres no right answer to this.
Why dont you graph the broadcast and traffic counters for a few days and see
what 'normal' looks like and then pick a figure suitably high enough to be
considered 'abnormal' .. perhaps 5x or 10x normal..?
Steve
On Thu, 11 Mar 2004, Daniel Quiambao wrote:
>
>
> Hi there,
>
> Thanks for all your reply.
> However, is there a formula to calculate the percentage (or threshold) of the
> broadcast storm need to be block.
>
> Let say, I have a 100Mbps FE Port that has an average of utilisation of 50Mbps.
> When applying a treshold level,
> should I set it to 50%?
>
> Thanks
> Daniel
>
>
>
>
>
>
> Cristian BICA <bcd at rdsnet.ro> on 03/10/2004 07:16:33 PM
>
> To: cisco-nsp at puck.nether.net
> cc: "'cisco-nsp at puck.nether.net'" <cisco-nsp at puck.nether.net> (bcc: Daniel
> Quiambao/ENGR/1-Net)
>
> Subject: Re: [nsp] 2950 Broadcast Storm
>
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
> checkout bugid CSCdp30543 before configuring anything
>
> http://www.cisco.com/cgi-bin/Support/Bugtool/onebug.pl?bugid=CSCdp30543&Submit=Search
>
>
> On Wednesday 10 March 2004 12:53, Stork, D.H. (Duncan) wrote:
> > Hi,
> > I suppose you mean the following?
> > Switch(config-if)# storm-control broadcast level [high level] [lower
> > level]
> >
> > [high level]
> > Specifies the upper threshold levels for broadcast traffic. The storm
> > control action occurs when traffic utilization reaches this level.
> >
> > Optional:
> > [lower level]
> > Specifies the falling threshold level. The normal transmission
> > restarts (if the action is filtering) when traffic drops below this
> > level for interfaces that support software-based suppression.
> >
> > Then configure the action to take:
> > Switch(config-if)# storm-control action {shutdown | trap}
> >
> > If you don't set a particular action it will filter out the broadcast
> > traffic and not send out traps.
> > The "shutdown" keyword puts the port in an error-disable state during
> > a storm. If the [lower level] is not set, the port remains in
> > shutdown state until you set it to "no shut"
> > The "trap" keyword sends out an SNMP trap when a storm is detected.
> >
> > Kind regards,
> >
> > Duncan Stork
> >
> >
> >
> > -----Oorspronkelijk bericht-----
> > Van: Daniel Quiambao [mailto:danielq at 1-net.com.sg]
> > Verzonden: woensdag 10 maart 2004 10:31
> > Aan: 'cisco-nsp at puck.nether.net'
> > Onderwerp: [nsp] 2950 Broadcast Storm
> >
> >
> >
> >
> > Hi there,
> >
> > I am trying to limit the broadcast storm on the 2950 switch, but I
> > can't find a
> > recommendation from Cisco.
> > I understand that to limit broadcast storm is depend on the port
> > utilization,
> > any better suggestion?
> >
> > Thanks
> > Daniel
> >
> >
> > ====================
> > Important: This message (including any attachments) contains
> > privileged and confidential information and is intended to be
> > conveyed only to the designated
> > recipient(s). If you are not an intended recipient, please notify
> > the sender
> > immediately and then delete this message from your system. You must
> > not use, disseminate, distribute, or reproduce this message or any
> > part thereof in any
> > form. Any statement or information contained in this message not of
> > an official
> > nature shall not be deemed to be given or endorsed by MediaCorp or
> > its relevant
> > subsidiaries unless otherwise indicated by an authorised
> > representative independent of this message.
> >
> > Disclaimer: Risks are inherent in all internet communication. While
> > steps may
> > have been taken to try to eliminate viruses and other harmful code or
> > device from this message and its attachment(s) (if any), the sender
> > is not responsible,
> > and hereby disclaims all liabilities arising from or in relation to
> > any viruses
> > and/or other harmful code and/or device. Each recipient is
> > responsible for protecting its system from viruses and/or other
> > harmful code and/or device. ====================
> >
> >
> > _______________________________________________
> > cisco-nsp mailing list cisco-nsp at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
> > _______________________________________________
> > cisco-nsp mailing list cisco-nsp at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > archive at http://puck.nether.net/pipermail/cisco-nsp/
>
> - --
>
>
> Cristian Bica -- Network Engineer
> Romania Data Systems NOC in Bucharest
> T:+4021 30 10 888 F: +4021 30 10 892
> www.rdsnet.ro cristian.bica at rdsnet.ro
> GPG: http://bcd.rdsnet.ro/bcd.asc
> - -------------------------------------
> Privileged/Confidential Information may be contained in this message. If
> you are not the addressee indicated in this message (or responsible for
> delivery of the message to such person), you may not copy or deliver
> this message to anyone. In such a case, you should destroy this message
> and kindly notify the sender by reply e-mail.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.3 (GNU/Linux)
>
> iD8DBQFATvkRK+0nZmbYMUERAi9SAKCrHRoeXyi+xE+qIP/n/CAFse4UEQCgjKEp
> 3mSI2QMAIqxY/VoY5R/djRk=
> =cwxt
> -----END PGP SIGNATURE-----
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
>
>
>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
More information about the cisco-nsp
mailing list