In this webinar, we will discuss about the basic concept of routing, try to understand how the router work, how the routing table is used to forward packets, and how to implement them with mikrotik router. we review some prior knowledge before. after attending this webinar, we expect you understand how the packet is forwarded on router.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
Webinar topic: Mikrotik Load Balancing with PCC
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Load Balancing with PCC
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/3leJgk9u7Gw
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
BGP Multihoming Techniques, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Multihoming Techniques (Part 1 and 2) sessions on 24 February 2016.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
It's neither a standard nor a protocol, but everyone's doing it.
In this presentation, we'll begin by describing the use cases where Multi-Chassis Link Aggregation, or MLAG, can be used to improve the reliability of your network. This will lead into a detailed discussion of how MLAG works as well as what pitfalls you'll need to avoid. Then, we'll explore the interactions with other system components such as LACP, Spanning Tree, and IGMP. Finally, we'll present about how to configure and monitor MLAG in Cumulus Linux.
In this webinar, we will discuss about the basic concept of routing, try to understand how the router work, how the routing table is used to forward packets, and how to implement them with mikrotik router. we review some prior knowledge before. after attending this webinar, we expect you understand how the packet is forwarded on router.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
Webinar topic: Mikrotik Load Balancing with PCC
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Load Balancing with PCC
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/3leJgk9u7Gw
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
BGP Multihoming Techniques, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Multihoming Techniques (Part 1 and 2) sessions on 24 February 2016.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
It's neither a standard nor a protocol, but everyone's doing it.
In this presentation, we'll begin by describing the use cases where Multi-Chassis Link Aggregation, or MLAG, can be used to improve the reliability of your network. This will lead into a detailed discussion of how MLAG works as well as what pitfalls you'll need to avoid. Then, we'll explore the interactions with other system components such as LACP, Spanning Tree, and IGMP. Finally, we'll present about how to configure and monitor MLAG in Cumulus Linux.
This book is for anyone who has had an idea and said, “I should start my own company.”
It does not matter what type of idea, the level of business experience you have, or your educational background. Anyone armed
with a dream and passion can turn his or her idea into a business. No more excuses, it is time to Stop Talking and Start Doing!
The StartUp Cookbook is for the dreamers and doers of our world: the people who choose to take on the entrepreneurial journey
and start a company. These entrepreneurs are the true heroes of our communities transforming their own lives, and the lives of
those who benefit from their creations.
The visual thinking tools found inside this book provide you with a step-by-step guide to test your ideas, develop a team, design
your business model, go to market, and accelerate generating revenue.
Cisco CCNA IP SLA with tracking configurationHamed Moghaddam
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
LOS REGISTROS PUBLICOS
Son una Institución Jurídica que persigue determinados fines, el cual es una fuente de información donde se hace constar, mediante la extensión de asientos y demás operaciones, los hechos, actos y situaciones de trascendencia jurídica, y donde se suministran medios probatorios de fácil obtención y señalada eficacia. Para demostrar el estado de las personas, domicilio de la propiedad y demás derechos reales sobre los inmuebles o fincas.
Los Registros Públicos son Instituciones destinadas a dar fe público de actos, documentos, contratos y resoluciones de índole muy diversas, con preponderancia Administrativa y Judicial.
ORGANIZACIÓN DEL REGISTRO PÚBLICO
En Venezuela el Registro Público funciona por medio de Oficinas Principales y Oficinas Subalternas del Registro.
Donde la Oficina Principal, estará en la Capital de la República y en cada una de las Capitales de cada Estado. En cada uno de los Municipios de los Estados, habrá por lo menos una oficina.
En cuanto las Oficinas Subalternas se establece que según el Art. 2 Ley de Registro Público: Establece que tanto en la Capital de la República como en cada una de las Capitales de los Estados, habrá una Oficina Principal de Registro; y en cada uno de los Municipios del Distrito Federal y de los Municipios de los Estados, habrá por lo menos una Oficina Subalterna de Registro, la cual tendrá su sede en la ciudad cabecera o en otra población importante del Municipio.
PARÁGRAFO ÚNICO: En el caso de creación de un nuevo Municipio, el Ejecutivo Nacional podrá mantener por tiempo limitado o indeterminado, la jurisdicción de la Oficina u Oficinas Subalternas que para tal momento la tengan sobre el territorio del nuevo Municipio.
Podrá así mismo el Ejecutivo Nacional suprimir la Oficina Subalterna de un determinado Municipio, ampliando simultáneamente la jurisdicción de otra u otras de las Oficinas Subalternas que funcionen en los Municipios limítrofes del mismo Estado.
Free CCNP switching workbook by networkershome pdfNetworkershome
ccnp workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNP switching workbook when it comes Cisco certification which is why we offered free CCNP switching workbook.
Started to create milestones, we, Novatek Electro (India) Pvt. Ltd. marked our presence in the year 2009 and operate in the manufacturing/servicing of Microprocessor Based Devices as well as engineers of control since 5 years. Our quality services products have been always appreciated by our clients. Our spontaneous attitude and confident approach in offering an excellent range of Single Phase Voltage Monitoring Relays, Single Phase Voltage Monitoring Relays, Voltage Monitoring & Current Overload Relay, Powerful Voltage Monitoring Relays, Three Phase Voltage Monitoring Relays, Auto Phase Selector Switches, Time Delay Relays, Programmable Astro Timers, Sequential & Combination Timer, Numeric Motor Protection Devices has deepened our roots in the market. We, Novatek Electro (India) Pvt. Ltd. breathe with the aim of fully satisfying our clients with our high-quality products services. We are a unit of highly experienced professionals, all of them contributing at the best of their potentials to offer the highest degree of efficiency and client satisfaction.
WEEK3LAB/NYACCESS1.docx
NYACCESS1#
*Mar 1 00:02:51.790: %LINK-3-UPDOWN: Interface FastEthernet0/24, changed state to up
*Mar 1 00:02:52.167: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up
*Mar 1 00:02:52.796: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24, changed state to up
*Mar 1 00:02:53.174: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to up
*Mar 1 00:03:11.780: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to down
*Mar 1 00:03:13.382: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24, changed state to down
*Mar 1 00:03:14.800: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to up
*Mar 1 00:03:16.394: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/24, changed state to up
*Mar 1 00:03:48.891: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan16, changed state to up
NYACCESS1#show running-config
Building configuration...
Current configuration : 1372 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname NYACCESS1
!
boot-start-marker
boot-end-marker
!
!
!
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
interface FastEthernet0/1
switchport access vlan 16
switchport mode access
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
interface Vlan16
ip address 192.168.16.7 255.255.255.0
no ip route-cache
!
ip http server
ip http secure-server
!
line con 0
line vty 5 15
!
end
NYACCESS1#
WEEK3LAB/NYCORE1.docx
NYCORE1#show running-config
Building configuration...
Current configuration : 2380 bytes
!
! Last configuration change at 00:02:41 UTC Mon Mar 1 1993
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname NYCORE1
!
boot-start-marker
boot-end-marker
!
!
no logging console
!
no aaa new-model
switch 1 provision ws-c3750v2-24ps
system mtu routing 1500
ip routing
!
!
!
!
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-t.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
2. ■ Storm Control blocks an interface upon receiving unicast, multicast, or broadcast packets
flood based on the threshold value within one second period of time. This can be handy to
prevent or at least reduce network flooding activities that can impact the network
performance.
■ When the offending traffic reaches the Rising Threshold (RT), the interface blocks all traffic
until the offending traffic rate drops below the Falling Threshold (FT). If FT is not specified,
only RT will be used to measure.
■ The threshold value is from 0 to 100 where as 0 is to block any traffic and 100 is turning off the
limit. The threshold value can be bits-per-second (bps), packets-per-second (pps), or
percentage.
3. ■ When the port is blocking multicast traffic, BPDU and CDP frames will not be blocked.
However, other multicast traffic such as routing updates or HSRP hellos will be blocked,
regardless. So be careful when using this feature and be mindful of the implication to the
routing protocols or FHRP.
■ There are three four penalties that can be implemented if the traffic reaches its threshold,
Shutdown or SNMP Trap message. The third penalty is to combine Shutdown and SNMP
Trap so the port will be shutdown while also sending SNMPTrap.
■ If the interface is configured without storm-control action command, it will create a log alert
and block the traffic
■ Shutdown option will shut the port down when offending traffic reaches the threshold and
the port can be re-enabled via shut/no shut command on the interface or via error-disable
detection and recovery feature. There is no specific storm-control option for errdisable
detect cause command but it is enable by default. errdisable recovery cause storm-control
command is required to re-enable the interface.
4. ■ SW1(config)#errdisable detect cause ?
■ all Enable error detection on all cases
■ arp-inspection Enable error detection for arp inspection
■ bpduguard Enable error detection on bpdu-guard
■ dhcp-rate-limit Enable error detection on dhcp-rate-limit
■ dtp-flap Enable error detection on dtp-flapping
■ gbic-invalid Enable error detection on gbic-invalid
■ inline-power Enable error detection for inline-power
■ l2ptguard Enable error detection on l2protocol-tunnel
■ link-flap Enable error detection on linkstate-flapping
■ loopback Enable error detection on loopback
■ pagp-flap Enable error detection on pagp-flapping
■ pppoe-ia-rate-limit Enable error detection on PPPoE IA rate-limit
■ psp Enable error detection on PSP
■ security-violation Enable error detection on 802.1x-guard
■ sfp-config-mismatch Enable error detection on SFP config mismatch
■ small-frame Enable error detection on small_frame
5. ■ SW1#sh errdisable detect | i storm-control
■ storm-control Enabled port
■ SW1#conf t
■ Enter configuration commands, one per line. End with CNTL/Z.
■ SW1(config)#errdisable recovery cause storm-control
■ SW1(config)#errdisable recovery interval 30
■ SW1(config)#exit
■ SW1#sh errdisable recovery | i storm
■ storm-control Enabled
6. ■ Trap option will only send SNMP trap message but will not shut the port down.
■ Below is the example to configure an interface to control broadcast and multicast packets
storm by shutting down the port and sends snmp traps if the broadcast reaches 50.0 bps,
multicast packets reaches 50 pps, or unicast traffic reaches 50 percent storm reaches 0.5
percent per second.
■ SWITCH1#sh run int f0/23
■ interface f0/23
■ storm-control broadcast level bps 50.5m 40k
■ storm-control multicast level pps 50m 40k
■ storm-control unicast level 50 40
■ storm-control action shutdown
■ storm-control action trap
■ end
8. ■ Let’s run some testing with two switches. SW1 and SW2 are connected to each other via
FastEthernet0/23 and FastEthernet0/24.
■ SW1#sh cdp nei
■ CapabilityCodes: R - Router,T -Trans Bridge, B - Source Route Bridge
■ S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
■ D - Remote, C - CVTA, M -Two-port Mac Relay
■ Device ID Local Intrfce Holdtme Capability Platform Port ID
■ SW2 Fas 0/23 164 S I WS-C3560- Fas 0/23
■ SW2 Fas 0/24 168 S I WS-C3560- Fas 0/24
9. ■ SVIVLAN10 is configured on each switch and port
F0/23-24 are configured as trunk.
■ ! SW1 and SW2
■ vlan 10
■ exit
■ int r f0/23-24
■ switchport trunk encapsulation dot1q
■ switchport mode trunk
■ switchport nonegotiate
■ no shut
• ! SW1
• int vlan 10
• ip addr 10.10.10.1 255.255.255.0
• no shut
• ! SW2
• int vlan 10
• ip addr 10.10.10.2 255.255.255.0
• no shut
10. ■ SW1 is the root forVLAN10 and port F0/23 is the root port in SW2.
■ SW1# sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ This bridge is the root
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ Bridge ID Priority 4106 (priority 4096 sys-id-ext 10)
■ Address 0023.0467.6880
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ AgingTime 300 sec
■ Interface Role Sts Cost Prio.NbrType
■ ------------------- ---- --- --------- -------- --------------------------------
■ Fa0/19 Desg FWD 19 128.21 P2p
■ Fa0/20 Desg FWD 19 128.22 P2p
■ Fa0/23 Desg FWD 19 128.25 P2p
■ Fa0/24 Desg FWD 19 128.26 P2p
12. ■ SW1 is configured to block unicast packet storm if it reaches 100 packets per second.
■ ! SW1
■ interface FastEthernet0/23
■ storm-control unicast level pps 100
■ Flooding SW1 from SW2 with ping 10.10.10.1 re 999999 timeout 0 will trigger the storm-control
to create an alert but since it is not configured to either shutdown the port nor sending trap,
nothing actually happens on the port.
■ %STORM_CONTROL-3-FILTERED: A Unicast storm detected on Fa0/23. A packet filter action has
been applied on the interface.
13. ■ Now the port is configured to shutdown when a violation occurs and errdisable recovery is
also applied.
■ ! SW1
■ errdisable recovery cause storm-control
■ errdisable recovery interval 30
■ interface FastEthernet0/23
■ storm-control unicast level pps 100
■ storm-control action shutdown
■ storm-control action trap
14. ■ Sending packets from SW2 to SW1
■ SW2#ping 10.10.10.1 re 99999 tim 0
■ Type escape sequence to abort.
■ Sending 99999, 100-byte ICMP Echos to 10.10.10.1, timeout is 0 seconds:
■ ..............!.......................................................
15. ■ SW1 will block the port f0/23 and errdisable recovery will keep trying to re-enable the port. However,
since the port is still receiving flooding packet and shutdown action is enforced, errdisable is unable to
recover the port. sh storm-control f0/23 unicast also shows that the port is down. Port f0/23 is no
longer forwarding in SW1.
■ SW1# sh log
■ 00:59:28: %PM-4-ERR_RECOVER: Attempting to recover from storm-control err-disable state on
Fa0/23
■ 00:59:32: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up
■ 00:59:33: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to up
■ 01:00:01: %PM-4-ERR_DISABLE: storm-control error detected on Fa0/23, putting Fa0/23 in err-disable
state
■ 01:00:01: %STORM_CONTROL-3-SHUTDOWN: A packet storm was detected on Fa0/23. The interface
has been disabled.
■ 01:00:02: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to
down
■ 01:00:03: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to down
16. ■ SW1#sh storm-control f0/23 unicast
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Link Down 100 pps 100 pps 0 pps
• SW1#sh spann vlan 10
• VLAN0010
• Spanning tree enabled protocol ieee
• Root ID Priority 4106
• Address 0023.0467.6880
• This bridge is the root
• HelloTime 2 sec Max Age 20 sec Forward Delay 15
sec
• Bridge ID Priority 4106 (priority 4096 sys-id-ext 10)
• Address 0023.0467.6880
• HelloTime 2 sec Max Age 20 sec Forward Delay 15
sec
• AgingTime 15 sec
• Interface Role Sts Cost Prio.NbrType
• ------------------- ---- --- --------- -------- -----------------------------
---
• Fa0/19 Desg FWD 19 128.21 P2p
• Fa0/20 Desg FWD 19 128.22 P2p
• Fa0/24 Desg FWD 19 128.26 P2p
17. ■ SW2 also sees that the port f0/23 is down due to the adjacent port f0/23 in SW1 is down and
SpanningTree shows that port f0/24 is starting to be active and become Root port.
■ ! SW2 shows port f0/23 is down
■ 01:00:36: %LINK-3-UPDOWN: Interface FastEthernet0/23, change.........................................
■ ....................................d state to up
■ 01:00:37: %LINEPROTO-5-UPDOWN: Line protocol on Interface Fa..................................
■ .................................................stEthernet0/23, changed state to up.....................
19. ■ After the flooding stops, SW1 port f0/23 recovers via errdisable recovery and spanning tree
starts forwarding again.
■ SW1# sh log
■ 01:10:48: %PM-4-ERR_RECOVER:Attempting to recover from storm-control err-disable state
on Fa0/23
■ 01:10:51: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up
■ 01:10:52: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed
state to up
21. ■ SW2 spanning tree is also back to its previous forwarding state.
■ SW2#sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ Cost 19
■ Port 25 (FastEthernet0/23)
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10)
■ Address 0022.be79.0f00
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ AgingTime 300 sec
■ Interface Role Sts Cost Prio.NbrType
■ ------------------- ---- --- --------- -------- --------------------------------
■ Fa0/19 Desg FWD 19 128.21 P2p
■ Fa0/20 Desg FWD 19 128.22 P2p
■ Fa0/23 Root FWD 19 128.25 P2p
■ Fa0/24 Altn BLK 19 128.26 P2p
22. ■ In addition to storm-control, frames that are smaller than 67 bytes are considered small frames
and will not be counted towards the limit.The newer Cisco IOS release 12.2(44)SE and later can
include these small frames via commands below
■ errdisable detect cause small-frame
■ errdisable recovery cause small-frame
■ int f0/23
■ small-frame violation-rate pps
■ small-frame violation rate 1000
■ Exit
■ The small-frame violation-rate pps is default and threshold value is only in RisingThreshold
from 1 to 10,000 pps.
23. ■ In Port-Channel, Storm-Control has to be applied in the Port-Channel and not the interface member.
■ SW1(config-if)#do sh etherc sum
■ Flags: D - down P - bundled in port-channel
■ I - stand-alone s - suspended
■ H - Hot-standby (LACP only)
■ R - Layer3 S - Layer2
■ U - in use f - failed to allocate aggregator
■ M - not in use, minimum links not met
■ u - unsuitable for bundling
■ w - waiting to be aggregated
■ d - default port
■ Number of channel-groups in use: 1
■ Number of aggregators: 1
■ Group Port-channel Protocol Ports
■ ------+-------------+-----------+-----------------------------------------------
■ 1 Po1(SU) LACP Fa0/23(P) Fa0/24(P)
24. ■ SW1(config-if)#int f0/23
■ SW1(config-if)#storm-control unicast level pps 100
■ Command Rejected: Storm-control feature cannot be applied on a port part of a port-channel
■ SW1(config-if)#do sh etherc sum
■ Flags: D - down P - bundled in port-channel
■ I - stand-alone s - suspended
■ H - Hot-standby (LACP only)
■ R - Layer3 S - Layer2
■ U - in use f - failed to allocate aggregator
■ M - not in use, minimum links not met
■ u - unsuitable for bundling
■ w - waiting to be aggregated
■ d - default port
■ Number of channel-groups in use: 1
■ Number of aggregators: 1
■ Group Port-channel Protocol Ports
■ ------+-------------+-----------+-----------------------------------------------
■ 1 Po1(SU) LACP Fa0/23(P) Fa0/24(P)
25. ■ When storm-control is not configured to shutdown nor sends trap, it will actually block the
traffic. However, this will not be shown in the interface packet counter but only available on
the show storm-control command.
■ SW2#ping 10.10.10.1 re 9999999
■ Type escape sequence to abort.
■ Sending 9999999, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds:
■ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!.!!!!.!!!!..!!!!!.!!!!.!!!!.!!!!!..!!!!!!!.!!!.!!!!!..!!!!!.!!!!.!!!!.!!!!.!!!..!!!!!.!!!!!.!!!.!!!!!..!!!!!.!!!.!!!!.
■ SW1#sh storm-control f0/23 u
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Blocking 1 pps 1 pps 1 pps