CHAPTER
1-1
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
1
Configuring Port-Based Traffic Control
This chapter describes how to configure the port-based traffic control features on the Catalyst 3750-X
or 3560-X switch. Unless otherwise noted, the term switch refers to a Catalyst 3750-X or 3560-X
standalone switch and to a Catalyst 3750-X switch stack.
Note For complete syntax and usage information for the commands used in this chapter, see the command
reference for this release.
• Configuring Storm Control, page 1-1
• Configuring Protected Ports, page 1-6
• Configuring Port Blocking, page 1-7
• Configuring Port Security, page 1-8
• Configuring Protocol Storm Protection, page 1-19
• Displaying Port-Based Traffic Control Settings, page 1-21
Configuring Storm Control
• Understanding Storm Control, page 1-1
• Default Storm Control Configuration, page 1-3
• Configuring Storm Control and Threshold Levels, page 1-3
• Default Protected Port Configuration, page 1-6
Understanding Storm Control
Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm
on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive
traffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in
network configurations, or users issuing a denial-of-service attack can cause a storm.
Storm control (or traffic suppression) monitors packets passing from an interface to the switching bus
and determines if the packet is unicast, multicast, or broadcast. The switch counts the number of packets
of a specified type received within the 1-second time interval and compares the measurement with a
predefined suppression-level threshold.