Você está na página 1de 3

Broadcast Storm Control

When Layer 2 frames are forwarded, broadcast, unknown unicast, and


multicast frames are flooded to all ports on the relevant virtual local area
network (VLAN). The flooding occupies bandwidth, and loads all nodes
connected on all ports. Storm control limits the amount of broadcast,
unknown unicast, and multicast frames accepted and forwarded by the
switch.
For information about configuring Broadcast Storm Control settings, see
"Configuring Port-Based Traffic Control" on page 787.

Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of
incoming and outgoing packets from multiple source ports to a monitoring
port. Source ports may be VLANs, physical interfaces, port-channels, or the
CPU port. The switch also supports flow-based mirroring, which allows you to
copy certain types of traffic to a single destination port. This provides
flexibilityinstead of mirroring all ingress or egress traffic on a port the
switch can mirror a subset of that traffic. You can configure the switch to
mirror flows based on certain kinds of Layer 2, Layer 3, and Layer 4
information.
Dell Networking switches support RSPAN destinations where traffic can be
tunneled across the operational network. RSPAN does not support
configuration of the CPU port as a source.
For information about configuring port mirroring, see "Monitoring Switch
Traffic" on page 407.

Static and Dynamic MAC Address Tables


You can add static entries to the switchs MAC address table and configure
the aging time for entries in the dynamic MAC address table. You can also
search for entries in the dynamic table based on several different criteria.
For information about viewing and managing the MAC address table, see
"Managing the MAC Address Table" on page 1015.

Switch Feature Overview

73

Configuring Port-Based Traffic Control (CLI)


This section provides information about the commands you use to configure
port-based traffic control settings. For more information about the
commands, see the Dell Networking N2000, N3000, and N4000 Series
Switches CLI Reference Guide at support.dell.com/manuals.

Configuring Flow Control and Storm Control


Beginning in Privileged EXEC mode, use the following commands to
configure the flow control and storm control features.
Command

Purpose

configure

Enter global configuration mode.

flowcontrol

Globally enable flow control.

interface interface

Enter interface configuration mode for the specified


interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.

storm-control broadcast Enable broadcast storm recovery mode on the interface


and (optionally) set the threshold.
[level rate]

rate threshold as percentage of port speed. The


percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
storm-control multicast Enable multicast storm recovery mode on the interface
[level rate]
and (optionally) set the threshold.

rate threshold as percentage of port speed. The


percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
storm-control unicast
[level rate]

Enable unknown unicast storm recovery mode on the


interface and (optionally) set the threshold.

rate threshold as percentage of port speed. The


percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.

798

Configuring Port-Based Traffic Control

Command

Purpose

CTRL + Z

Exit to Privileged EXEC mode.

show interfaces detail

interface

Display detailed information about the specified interface,


including the flow control status.

show storm-control

View whether 802.3x flow control is enabled on the switch.

show storm-control
[interface | all]

View storm control settings for all interfaces or the


specified interface.

Configuring Protected Ports


Beginning in Privileged EXEC mode, use the following commands to add a
name to a protected port group and add ports to the group.
Command

Purpose

configure

Enter global configuration mode.

switchport protected
groupid name name

Specify a name for one of the three protected port groups.


groupid Identifies which group the port is to be
protected in. (Range: 0-2)
name Name of the group. (Range: 0-32 characters)

interface interface

Enter interface configuration mode for the specified


interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.

switchport protected

Add the interface to the specified protected port group.

CTRL + Z

Exit to Privileged EXEC mode.

show switchport
protected

View protected group and port information.

groupid

Configuring Port-Based Traffic Control

799