07-12-2018 10:06 AM - edited 03-08-2019 03:39 PM
Hello friends, from what I understand storm-control only filters inbound broadcasts. In the topology I have attached, does anyone recommend the best place to configure storm control? we have a lot of building access switches and recently had a broadcast storm, should I configure it on all the uplinks to the distribtuion switch, or should I just configure it on the uplink of the distribtuion switch to the core to supress broadcasts storms?
Solved! Go to Solution.
07-12-2018 11:25 AM - edited 07-12-2018 11:25 AM
Hi,
First I would try to find out the culprit of broadcasts. Essentially find out where are the broadcast packets coming from. Possibly you can use Wireshark to capture some traffic.
Regarding configuration of storm control on uplinks, I am thinking if storm control is configured on access layer, would you still need it on distribution layer?
https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/12-1E/configuration/guide/storm.html
07-13-2018 03:26 PM
07-12-2018 11:25 AM - edited 07-12-2018 11:25 AM
Hi,
First I would try to find out the culprit of broadcasts. Essentially find out where are the broadcast packets coming from. Possibly you can use Wireshark to capture some traffic.
Regarding configuration of storm control on uplinks, I am thinking if storm control is configured on access layer, would you still need it on distribution layer?
https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/12-1E/configuration/guide/storm.html
07-12-2018 01:48 PM
Already found the culprit. I think you're right, If I configure it on access layer, I probably wouldn't need it on distribution layer. I was just thinking which one would be less work.
07-13-2018 03:26 PM
08-06-2018 01:23 PM - edited 08-06-2018 01:24 PM
Did you configure BPDU gurad on all the switchports of your access switches?
if you have configured bpdu guard on every switchport, then what would be the point of configuring storm-control? Sorry, I just have a lack of knowledge about this. thank you
08-06-2018 01:42 PM
Yes, we have BPDU guard on all access ports as well as storm-control and port-security.
Here is an example of our spanning-tree config:
!----------------
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree portfast bpduguard default
spanning-tree extend system-id
spanning-tree pathcost method long
interface gi1/0/1
switchport port-security
switchport port-security maximum 1 ! (this command is default and wont show in the config)
switchport port-security aging time 120
switchport port-security violation restrict
spanning-tree portfast
spanning-tree bpduguard enable
spanning-tree guard root
!----------------
We use BPDU guard so that people cannot plug another network device onto our network. It also helps against people looping a network cable into the same switch (or another switch)
We use storm-control so that someone cannot flood our network with broadcast or multicast traffic; thus slowing the network down for everyone. Example would be someone using an imaging server to reimage a computer's OS.
And then we use port-security so that someone can't have more than 1 device plugged into an access port (not all switch vendors participate in spanning-tree (802.1D ??)
And as a disclaimer: I'm not a CCNP R&S or higher. This is something that we use and had help from a Cisco VAR to implement. But, please make sure to read up on the commands and how they are used. Don't blindly follow what others do; it might not work in your environment!
Here is an article on the importance of BPDU guard:
And then Spanning-Tree:
08-06-2018 02:11 PM
Thank you sir. so I guess port-fast isn't quite enough to prevent someone connecting up the cable between 2 switchports or introducing a switch that might do BPDU into a switchport.
08-06-2018 02:24 PM
Enabling "spanning-tree portfast" on a port makes that port go into the "forwarding" state immediately, without going through all the steps:
So, when someone plugs in their computer they are usually able to get network access very quick (within a couple seconds). If you didn't have 'spanning-tree portfast' enabled on access ports the device would take up to 30 seconds to finally get network access as the port goes through all the states (listening and learning).
This is why we also hard-code all access ports with the commands:
"
switchport access vlan 10
switchport mode access
"
We know its going to be an access port for computer devices and we know that it should never be anything else (ie: a trunk port).
Again, we are a public K-12 school district. So, unfortunately, quick access and convenience are slightly higher importance than security. I'm sure there are much better security practices that we could implement but our students are limited in class time and we need to make sure they can get access to resources quickly.
08-06-2018 02:29 PM
So, going back to your original question and what @omz also hinted at:
If you configure storm-control on all your access ports and your switches are in a secured room, then configuring storm-control on your uplinks is not necessary.
08-06-2018 02:37 PM
Thanks James. I don't think he meant to configure Storm-control on all access switchports, I think he meant to configure it on the access layers switches uplinks towards the dist layer.
08-06-2018 02:46 PM
Hello
Note: when both broadcast and multicast storm control is enabled at the same time and if either one reaches its own specified threshold it will negate traffic for both
08-20-2018 12:39 PM - edited 08-20-2018 12:41 PM
Thanks Paul. It seems that the only 2 options for storm-control is to either disable the uplink or send an SNMP trap. I wish their were more options..such as dropping the broadcast traffic in question
02-26-2020 09:32 PM
If you choose to send an SNMP trap, it still applies a filter to the interface to block the offending traffic.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide