SlideShare a Scribd company logo
STORM-CONTROL
Security | www.netprotocolxpert.in
■ Storm Control blocks an interface upon receiving unicast, multicast, or broadcast packets
flood based on the threshold value within one second period of time. This can be handy to
prevent or at least reduce network flooding activities that can impact the network
performance.
■ When the offending traffic reaches the Rising Threshold (RT), the interface blocks all traffic
until the offending traffic rate drops below the Falling Threshold (FT). If FT is not specified,
only RT will be used to measure.
■ The threshold value is from 0 to 100 where as 0 is to block any traffic and 100 is turning off the
limit. The threshold value can be bits-per-second (bps), packets-per-second (pps), or
percentage.
■ When the port is blocking multicast traffic, BPDU and CDP frames will not be blocked.
However, other multicast traffic such as routing updates or HSRP hellos will be blocked,
regardless. So be careful when using this feature and be mindful of the implication to the
routing protocols or FHRP.
■ There are three four penalties that can be implemented if the traffic reaches its threshold,
Shutdown or SNMP Trap message. The third penalty is to combine Shutdown and SNMP
Trap so the port will be shutdown while also sending SNMPTrap.
■ If the interface is configured without storm-control action command, it will create a log alert
and block the traffic
■ Shutdown option will shut the port down when offending traffic reaches the threshold and
the port can be re-enabled via shut/no shut command on the interface or via error-disable
detection and recovery feature. There is no specific storm-control option for errdisable
detect cause command but it is enable by default. errdisable recovery cause storm-control
command is required to re-enable the interface.
■ SW1(config)#errdisable detect cause ?
■ all Enable error detection on all cases
■ arp-inspection Enable error detection for arp inspection
■ bpduguard Enable error detection on bpdu-guard
■ dhcp-rate-limit Enable error detection on dhcp-rate-limit
■ dtp-flap Enable error detection on dtp-flapping
■ gbic-invalid Enable error detection on gbic-invalid
■ inline-power Enable error detection for inline-power
■ l2ptguard Enable error detection on l2protocol-tunnel
■ link-flap Enable error detection on linkstate-flapping
■ loopback Enable error detection on loopback
■ pagp-flap Enable error detection on pagp-flapping
■ pppoe-ia-rate-limit Enable error detection on PPPoE IA rate-limit
■ psp Enable error detection on PSP
■ security-violation Enable error detection on 802.1x-guard
■ sfp-config-mismatch Enable error detection on SFP config mismatch
■ small-frame Enable error detection on small_frame
■ SW1#sh errdisable detect | i storm-control
■ storm-control Enabled port
■ SW1#conf t
■ Enter configuration commands, one per line. End with CNTL/Z.
■ SW1(config)#errdisable recovery cause storm-control
■ SW1(config)#errdisable recovery interval 30
■ SW1(config)#exit
■ SW1#sh errdisable recovery | i storm
■ storm-control Enabled
■ Trap option will only send SNMP trap message but will not shut the port down.
■ Below is the example to configure an interface to control broadcast and multicast packets
storm by shutting down the port and sends snmp traps if the broadcast reaches 50.0 bps,
multicast packets reaches 50 pps, or unicast traffic reaches 50 percent storm reaches 0.5
percent per second.
■ SWITCH1#sh run int f0/23
■ interface f0/23
■ storm-control broadcast level bps 50.5m 40k
■ storm-control multicast level pps 50m 40k
■ storm-control unicast level 50 40
■ storm-control action shutdown
■ storm-control action trap
■ end
■ SW1#sh storm-control f0/23
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Forwarding 50.5m bps 40k bps 0 bps
■ SW1#sh storm-control f0/23
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Forwarding 50.5m bps 40k bps 0 bps
■ SW1#sh storm-control f0/23 broadcast
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Forwarding 50.5m bps 40k bps 0 bps
• SW1#sh storm-control f0/23 multicast
• Interface Filter State Upper Lower Current
• --------- ------------- ----------- ----------- ----------
• Fa0/23 Forwarding 50m pps 40k pps 0 pps
• SW1#sh storm-control f0/23 unicast
• Interface Filter State Upper Lower Current
• --------- ------------- ----------- ----------- ----------
• Fa0/23 Forwarding 50.00% 40.00% 0.00%
■ Let’s run some testing with two switches. SW1 and SW2 are connected to each other via
FastEthernet0/23 and FastEthernet0/24.
■ SW1#sh cdp nei
■ CapabilityCodes: R - Router,T -Trans Bridge, B - Source Route Bridge
■ S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
■ D - Remote, C - CVTA, M -Two-port Mac Relay
■ Device ID Local Intrfce Holdtme Capability Platform Port ID
■ SW2 Fas 0/23 164 S I WS-C3560- Fas 0/23
■ SW2 Fas 0/24 168 S I WS-C3560- Fas 0/24
■ SVIVLAN10 is configured on each switch and port
F0/23-24 are configured as trunk.
■ ! SW1 and SW2
■ vlan 10
■ exit
■ int r f0/23-24
■ switchport trunk encapsulation dot1q
■ switchport mode trunk
■ switchport nonegotiate
■ no shut
• ! SW1
• int vlan 10
• ip addr 10.10.10.1 255.255.255.0
• no shut
• ! SW2
• int vlan 10
• ip addr 10.10.10.2 255.255.255.0
• no shut
■ SW1 is the root forVLAN10 and port F0/23 is the root port in SW2.
■ SW1# sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ This bridge is the root
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ Bridge ID Priority 4106 (priority 4096 sys-id-ext 10)
■ Address 0023.0467.6880
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ AgingTime 300 sec
■ Interface Role Sts Cost Prio.NbrType
■ ------------------- ---- --- --------- -------- --------------------------------
■ Fa0/19 Desg FWD 19 128.21 P2p
■ Fa0/20 Desg FWD 19 128.22 P2p
■ Fa0/23 Desg FWD 19 128.25 P2p
■ Fa0/24 Desg FWD 19 128.26 P2p
■ SW2#sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ Cost 19
■ Port 25 (FastEthernet0/23)
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10)
■ Address 0022.be79.0f00
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ AgingTime 300 sec
■ Interface Role Sts Cost Prio.NbrType
■ ------------------- ---- --- --------- -------- --------------------------------
■ Fa0/19 Desg FWD 19 128.21 P2p
■ Fa0/20 Desg FWD 19 128.22 P2p
■ Fa0/23 Root FWD 19 128.25 P2p
■ Fa0/24 Altn BLK 19 128.26 P2p
■ SW1 is configured to block unicast packet storm if it reaches 100 packets per second.
■ ! SW1
■ interface FastEthernet0/23
■ storm-control unicast level pps 100
■ Flooding SW1 from SW2 with ping 10.10.10.1 re 999999 timeout 0 will trigger the storm-control
to create an alert but since it is not configured to either shutdown the port nor sending trap,
nothing actually happens on the port.
■ %STORM_CONTROL-3-FILTERED: A Unicast storm detected on Fa0/23. A packet filter action has
been applied on the interface.
■ Now the port is configured to shutdown when a violation occurs and errdisable recovery is
also applied.
■ ! SW1
■ errdisable recovery cause storm-control
■ errdisable recovery interval 30
■ interface FastEthernet0/23
■ storm-control unicast level pps 100
■ storm-control action shutdown
■ storm-control action trap
■ Sending packets from SW2 to SW1
■ SW2#ping 10.10.10.1 re 99999 tim 0
■ Type escape sequence to abort.
■ Sending 99999, 100-byte ICMP Echos to 10.10.10.1, timeout is 0 seconds:
■ ..............!.......................................................
■ SW1 will block the port f0/23 and errdisable recovery will keep trying to re-enable the port. However,
since the port is still receiving flooding packet and shutdown action is enforced, errdisable is unable to
recover the port. sh storm-control f0/23 unicast also shows that the port is down. Port f0/23 is no
longer forwarding in SW1.
■ SW1# sh log
■ 00:59:28: %PM-4-ERR_RECOVER: Attempting to recover from storm-control err-disable state on
Fa0/23
■ 00:59:32: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up
■ 00:59:33: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to up
■ 01:00:01: %PM-4-ERR_DISABLE: storm-control error detected on Fa0/23, putting Fa0/23 in err-disable
state
■ 01:00:01: %STORM_CONTROL-3-SHUTDOWN: A packet storm was detected on Fa0/23. The interface
has been disabled.
■ 01:00:02: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to
down
■ 01:00:03: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to down
■ SW1#sh storm-control f0/23 unicast
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Link Down 100 pps 100 pps 0 pps
• SW1#sh spann vlan 10
• VLAN0010
• Spanning tree enabled protocol ieee
• Root ID Priority 4106
• Address 0023.0467.6880
• This bridge is the root
• HelloTime 2 sec Max Age 20 sec Forward Delay 15
sec
• Bridge ID Priority 4106 (priority 4096 sys-id-ext 10)
• Address 0023.0467.6880
• HelloTime 2 sec Max Age 20 sec Forward Delay 15
sec
• AgingTime 15 sec
• Interface Role Sts Cost Prio.NbrType
• ------------------- ---- --- --------- -------- -----------------------------
---
• Fa0/19 Desg FWD 19 128.21 P2p
• Fa0/20 Desg FWD 19 128.22 P2p
• Fa0/24 Desg FWD 19 128.26 P2p
■ SW2 also sees that the port f0/23 is down due to the adjacent port f0/23 in SW1 is down and
SpanningTree shows that port f0/24 is starting to be active and become Root port.
■ ! SW2 shows port f0/23 is down
■ 01:00:36: %LINK-3-UPDOWN: Interface FastEthernet0/23, change.........................................
■ ....................................d state to up
■ 01:00:37: %LINEPROTO-5-UPDOWN: Line protocol on Interface Fa..................................
■ .................................................stEthernet0/23, changed state to up.....................
■ SW2#sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ Cost 19
■ Port 26 (FastEthernet0/24)
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10)
■ Address 0022.be79.0f00
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ AgingTime 15 sec
■ Interface Role Sts Cost Prio.NbrType
■ ------------------- ---- --- --------- -------- --------------------------------
■ Fa0/19 Desg FWD 19 128.21 P2p
■ Fa0/20 Desg FWD 19 128.22 P2p
■ Fa0/24 Root LRN 19 128.26 P2p
■ After the flooding stops, SW1 port f0/23 recovers via errdisable recovery and spanning tree
starts forwarding again.
■ SW1# sh log
■ 01:10:48: %PM-4-ERR_RECOVER:Attempting to recover from storm-control err-disable state
on Fa0/23
■ 01:10:51: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up
■ 01:10:52: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed
state to up
■ SW1#sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ This bridge is the root
■ HelloTime 2 sec MaxAge 20 sec Forward Delay 15 sec
■ Bridge ID Priority 4106 (priority 4096 sys-id-ext 10)
■ Address 0023.0467.6880
■ HelloTime 2 sec MaxAge 20 sec Forward Delay 15 sec
■ AgingTime 300 sec
• Interface Role Sts Cost Prio.NbrType
• ------------------- ---- --- --------- -------- ----------------
----------------
• Fa0/19 Desg FWD 19 128.21 P2p
• Fa0/20 Desg FWD 19 128.22 P2p
• Fa0/23 Desg FWD 19 128.25 P2p
• Fa0/24 Desg FWD 19 128.26 P2p
• SW1#sh storm-control f0/23 uni
• Interface Filter State Upper Lower
Current
• --------- ------------- ----------- ----------- ----------
• Fa0/23 Forwarding 100 pps 100 pps 0
pps
■ SW2 spanning tree is also back to its previous forwarding state.
■ SW2#sh spann vlan 10
■ VLAN0010
■ Spanning tree enabled protocol ieee
■ Root ID Priority 4106
■ Address 0023.0467.6880
■ Cost 19
■ Port 25 (FastEthernet0/23)
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10)
■ Address 0022.be79.0f00
■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec
■ AgingTime 300 sec
■ Interface Role Sts Cost Prio.NbrType
■ ------------------- ---- --- --------- -------- --------------------------------
■ Fa0/19 Desg FWD 19 128.21 P2p
■ Fa0/20 Desg FWD 19 128.22 P2p
■ Fa0/23 Root FWD 19 128.25 P2p
■ Fa0/24 Altn BLK 19 128.26 P2p
■ In addition to storm-control, frames that are smaller than 67 bytes are considered small frames
and will not be counted towards the limit.The newer Cisco IOS release 12.2(44)SE and later can
include these small frames via commands below
■ errdisable detect cause small-frame
■ errdisable recovery cause small-frame
■ int f0/23
■ small-frame violation-rate pps
■ small-frame violation rate 1000
■ Exit
■ The small-frame violation-rate pps is default and threshold value is only in RisingThreshold
from 1 to 10,000 pps.
■ In Port-Channel, Storm-Control has to be applied in the Port-Channel and not the interface member.
■ SW1(config-if)#do sh etherc sum
■ Flags: D - down P - bundled in port-channel
■ I - stand-alone s - suspended
■ H - Hot-standby (LACP only)
■ R - Layer3 S - Layer2
■ U - in use f - failed to allocate aggregator
■ M - not in use, minimum links not met
■ u - unsuitable for bundling
■ w - waiting to be aggregated
■ d - default port
■ Number of channel-groups in use: 1
■ Number of aggregators: 1
■ Group Port-channel Protocol Ports
■ ------+-------------+-----------+-----------------------------------------------
■ 1 Po1(SU) LACP Fa0/23(P) Fa0/24(P)
■ SW1(config-if)#int f0/23
■ SW1(config-if)#storm-control unicast level pps 100
■ Command Rejected: Storm-control feature cannot be applied on a port part of a port-channel
■ SW1(config-if)#do sh etherc sum
■ Flags: D - down P - bundled in port-channel
■ I - stand-alone s - suspended
■ H - Hot-standby (LACP only)
■ R - Layer3 S - Layer2
■ U - in use f - failed to allocate aggregator
■ M - not in use, minimum links not met
■ u - unsuitable for bundling
■ w - waiting to be aggregated
■ d - default port
■ Number of channel-groups in use: 1
■ Number of aggregators: 1
■ Group Port-channel Protocol Ports
■ ------+-------------+-----------+-----------------------------------------------
■ 1 Po1(SU) LACP Fa0/23(P) Fa0/24(P)
■ When storm-control is not configured to shutdown nor sends trap, it will actually block the
traffic. However, this will not be shown in the interface packet counter but only available on
the show storm-control command.
■ SW2#ping 10.10.10.1 re 9999999
■ Type escape sequence to abort.
■ Sending 9999999, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds:
■ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!.!!!!.!!!!..!!!!!.!!!!.!!!!.!!!!!..!!!!!!!.!!!.!!!!!..!!!!!.!!!!.!!!!.!!!!.!!!..!!!!!.!!!!!.!!!.!!!!!..!!!!!.!!!.!!!!.
■ SW1#sh storm-control f0/23 u
■ Interface Filter State Upper Lower Current
■ --------- ------------- ----------- ----------- ----------
■ Fa0/23 Blocking 1 pps 1 pps 1 pps
Follow us @
 www.facebook.com/NetProtocolXpert
 www.instagram.com/netprotocol_xpert
 plus.google.com/collection/k8HMDB
 twitter.com/NPX_cisco
 www.linkedin.com/company/netprotocol-xpert
 netprotocolxpert.blogspot.in
 remote.com/netprotocolxpert
 www.netprotocolxpert.in

More Related Content

What's hot

Routing fundamentals with mikrotik
Routing fundamentals with mikrotikRouting fundamentals with mikrotik
Routing fundamentals with mikrotik
Achmad Mardiansyah
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
Shawn Zandi
 
EtherChannel Configuration
EtherChannel ConfigurationEtherChannel Configuration
EtherChannel Configuration
NetProtocol Xpert
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
Thomas Graf
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
APNIC
 
Mikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCCMikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCC
GLC Networks
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
Kishore Kumar
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
APNIC
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
Joel W. King
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
Febrian ‎
 
Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조
Seung-Hoon Baek
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
Niasta Learning
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
Faelix Ltd
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
Cisco Canada
 
Mlag invisibile layer 2 redundancy
Mlag invisibile layer 2 redundancyMlag invisibile layer 2 redundancy
Mlag invisibile layer 2 redundancy
Cumulus Networks
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
NetProtocol Xpert
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context TrainingTariq Bader
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
KwonSun Bae
 

What's hot (20)

Routing fundamentals with mikrotik
Routing fundamentals with mikrotikRouting fundamentals with mikrotik
Routing fundamentals with mikrotik
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
EtherChannel Configuration
EtherChannel ConfigurationEtherChannel Configuration
EtherChannel Configuration
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
 
Mikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCCMikrotik Load Balancing with PCC
Mikrotik Load Balancing with PCC
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
DMVPN
DMVPNDMVPN
DMVPN
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Mlag invisibile layer 2 redundancy
Mlag invisibile layer 2 redundancyMlag invisibile layer 2 redundancy
Mlag invisibile layer 2 redundancy
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context Training
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 

Viewers also liked

Eigrp is restricted to stub connections
Eigrp is restricted to stub connections Eigrp is restricted to stub connections
Eigrp is restricted to stub connections
NetProtocol Xpert
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
NetProtocol Xpert
 
Start Up Cookbook
Start Up CookbookStart Up Cookbook
Pembangunan mapan dalam islam
Pembangunan mapan dalam islamPembangunan mapan dalam islam
Pembangunan mapan dalam islam
SITI NUR QURAISHA ZAWI
 
ο ιωαννης καποδιστριας 2
ο ιωαννης καποδιστριας 2ο ιωαννης καποδιστριας 2
ο ιωαννης καποδιστριας 2
alexkonta
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
Hamed Moghaddam
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
Noctorous Jamal
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Registro publico
Registro publicoRegistro publico
Registro publico
Carina Rendon
 
Arduino uno
Arduino unoArduino uno
Arduino uno
Urdi Instenalco
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
東原 李
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
Ram Dutt Shukla
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 

Viewers also liked (16)

Eigrp is restricted to stub connections
Eigrp is restricted to stub connections Eigrp is restricted to stub connections
Eigrp is restricted to stub connections
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
 
Start Up Cookbook
Start Up CookbookStart Up Cookbook
Start Up Cookbook
 
Pembangunan mapan dalam islam
Pembangunan mapan dalam islamPembangunan mapan dalam islam
Pembangunan mapan dalam islam
 
ο ιωαννης καποδιστριας 2
ο ιωαννης καποδιστριας 2ο ιωαννης καποδιστριας 2
ο ιωαννης καποδιστριας 2
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Registro publico
Registro publicoRegistro publico
Registro publico
 
Arduino uno
Arduino unoArduino uno
Arduino uno
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 

Similar to Storm-Control

04 ptcc protection feautres
04 ptcc protection feautres04 ptcc protection feautres
04 ptcc protection feautresduytn1
 
Packet Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 SwitchingPacket Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 SwitchingJohnson Liu
 
DOCUMENT FOR SOTF PROTECTION FINAL
DOCUMENT FOR SOTF PROTECTION FINALDOCUMENT FOR SOTF PROTECTION FINAL
DOCUMENT FOR SOTF PROTECTION FINALEKANANDHAN G
 
CCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updatedCCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updated
CCIERNSTRICKS.COM
 
CCIE R&S Real TS-1 Config
CCIE R&S Real TS-1 ConfigCCIE R&S Real TS-1 Config
CCIE R&S Real TS-1 Config
CCIERNSTRICKS.COM
 
CCIE R&S Real Lab H3 Config
CCIE R&S Real Lab H3 ConfigCCIE R&S Real Lab H3 Config
CCIE R&S Real Lab H3 Config
CCIERNSTRICKS.COM
 
CCIE R&S Real Lab H2 Config
CCIE R&S Real Lab H2 ConfigCCIE R&S Real Lab H2 Config
CCIE R&S Real Lab H2 Config
CCIERNSTRICKS.COM
 
CCIE R&S Real Lab H1 Config
CCIE R&S Real Lab H1 ConfigCCIE R&S Real Lab H1 Config
CCIE R&S Real Lab H1 Config
CCIERNSTRICKS.COM
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
Salem Trabelsi
 
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdfFree CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
Networkershome
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
VISHNU N
 
Switch security
Switch securitySwitch security
Switch security
nullowaspmumbai
 
Microcontroller Based Devices By Novatek Electro (India) Pvt. Ltd, Delhi
Microcontroller Based Devices By Novatek Electro (India) Pvt. Ltd, DelhiMicrocontroller Based Devices By Novatek Electro (India) Pvt. Ltd, Delhi
Microcontroller Based Devices By Novatek Electro (India) Pvt. Ltd, Delhi
IndiaMART InterMESH Limited
 
Ccn pv6 switch_lab1-2_clearing_attached_switches_student
Ccn pv6 switch_lab1-2_clearing_attached_switches_studentCcn pv6 switch_lab1-2_clearing_attached_switches_student
Ccn pv6 switch_lab1-2_clearing_attached_switches_studentmart_ixu
 
WEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docx
WEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docxWEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docx
WEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docx
philipnelson29183
 
os-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).ppt
os-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).pptos-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).ppt
os-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).ppt
Thien Phan Bản
 
LM555.PDF. usos variables como para prender luces secuenciales usando también...
LM555.PDF. usos variables como para prender luces secuenciales usando también...LM555.PDF. usos variables como para prender luces secuenciales usando también...
LM555.PDF. usos variables como para prender luces secuenciales usando también...
juanantonio513729
 
1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured
1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured
1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured
Javier Cuzco
 
99189325 7745-alarm-troubleshoot
99189325 7745-alarm-troubleshoot99189325 7745-alarm-troubleshoot
99189325 7745-alarm-troubleshoot
Nabil Al_Mutawakel
 
Configuring dynamic switchport security
Configuring dynamic switchport securityConfiguring dynamic switchport security
Configuring dynamic switchport securityIT Tech
 

Similar to Storm-Control (20)

04 ptcc protection feautres
04 ptcc protection feautres04 ptcc protection feautres
04 ptcc protection feautres
 
Packet Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 SwitchingPacket Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 Switching
 
DOCUMENT FOR SOTF PROTECTION FINAL
DOCUMENT FOR SOTF PROTECTION FINALDOCUMENT FOR SOTF PROTECTION FINAL
DOCUMENT FOR SOTF PROTECTION FINAL
 
CCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updatedCCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updated
 
CCIE R&S Real TS-1 Config
CCIE R&S Real TS-1 ConfigCCIE R&S Real TS-1 Config
CCIE R&S Real TS-1 Config
 
CCIE R&S Real Lab H3 Config
CCIE R&S Real Lab H3 ConfigCCIE R&S Real Lab H3 Config
CCIE R&S Real Lab H3 Config
 
CCIE R&S Real Lab H2 Config
CCIE R&S Real Lab H2 ConfigCCIE R&S Real Lab H2 Config
CCIE R&S Real Lab H2 Config
 
CCIE R&S Real Lab H1 Config
CCIE R&S Real Lab H1 ConfigCCIE R&S Real Lab H1 Config
CCIE R&S Real Lab H1 Config
 
6.5.1.2 packet tracer layer 2 security instructor
6.5.1.2 packet tracer   layer 2 security instructor6.5.1.2 packet tracer   layer 2 security instructor
6.5.1.2 packet tracer layer 2 security instructor
 
Free CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdfFree CCNP switching workbook by networkershome pdf
Free CCNP switching workbook by networkershome pdf
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
 
Switch security
Switch securitySwitch security
Switch security
 
Microcontroller Based Devices By Novatek Electro (India) Pvt. Ltd, Delhi
Microcontroller Based Devices By Novatek Electro (India) Pvt. Ltd, DelhiMicrocontroller Based Devices By Novatek Electro (India) Pvt. Ltd, Delhi
Microcontroller Based Devices By Novatek Electro (India) Pvt. Ltd, Delhi
 
Ccn pv6 switch_lab1-2_clearing_attached_switches_student
Ccn pv6 switch_lab1-2_clearing_attached_switches_studentCcn pv6 switch_lab1-2_clearing_attached_switches_student
Ccn pv6 switch_lab1-2_clearing_attached_switches_student
 
WEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docx
WEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docxWEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docx
WEEK3LABNYACCESS1.docxNYACCESS1#Mar  1 000251.790 LINK.docx
 
os-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).ppt
os-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).pptos-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).ppt
os-exe3-23-may2011-sr-i-776s21tr-lineprotection-120425095503-phpapp02 (2).ppt
 
LM555.PDF. usos variables como para prender luces secuenciales usando también...
LM555.PDF. usos variables como para prender luces secuenciales usando también...LM555.PDF. usos variables como para prender luces secuenciales usando también...
LM555.PDF. usos variables como para prender luces secuenciales usando también...
 
1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured
1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured
1 mrk511232 ben-e_en_product_guide__rec670_1.2_pre-configured
 
99189325 7745-alarm-troubleshoot
99189325 7745-alarm-troubleshoot99189325 7745-alarm-troubleshoot
99189325 7745-alarm-troubleshoot
 
Configuring dynamic switchport security
Configuring dynamic switchport securityConfiguring dynamic switchport security
Configuring dynamic switchport security
 

More from NetProtocol Xpert

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
NetProtocol Xpert
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
NetProtocol Xpert
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
NetProtocol Xpert
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
NetProtocol Xpert
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
NetProtocol Xpert
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
NetProtocol Xpert
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
NetProtocol Xpert
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
NetProtocol Xpert
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
NetProtocol Xpert
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
NetProtocol Xpert
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
NetProtocol Xpert
 
Regular expression examples
Regular expression examplesRegular expression examples
Regular expression examples
NetProtocol Xpert
 
Converting ipv4 to ipv6 and vice versa
Converting ipv4 to ipv6 and vice versaConverting ipv4 to ipv6 and vice versa
Converting ipv4 to ipv6 and vice versa
NetProtocol Xpert
 
Password recovery cisco catalyst 3850
Password recovery cisco catalyst 3850Password recovery cisco catalyst 3850
Password recovery cisco catalyst 3850
NetProtocol Xpert
 
Cisco 2960x switch password recovery
Cisco 2960x switch password recoveryCisco 2960x switch password recovery
Cisco 2960x switch password recovery
NetProtocol Xpert
 

More from NetProtocol Xpert (20)

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
 
Regular expression examples
Regular expression examplesRegular expression examples
Regular expression examples
 
Converting ipv4 to ipv6 and vice versa
Converting ipv4 to ipv6 and vice versaConverting ipv4 to ipv6 and vice versa
Converting ipv4 to ipv6 and vice versa
 
Password recovery cisco catalyst 3850
Password recovery cisco catalyst 3850Password recovery cisco catalyst 3850
Password recovery cisco catalyst 3850
 
Cisco 2960x switch password recovery
Cisco 2960x switch password recoveryCisco 2960x switch password recovery
Cisco 2960x switch password recovery
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

Storm-Control

  • 2. ■ Storm Control blocks an interface upon receiving unicast, multicast, or broadcast packets flood based on the threshold value within one second period of time. This can be handy to prevent or at least reduce network flooding activities that can impact the network performance. ■ When the offending traffic reaches the Rising Threshold (RT), the interface blocks all traffic until the offending traffic rate drops below the Falling Threshold (FT). If FT is not specified, only RT will be used to measure. ■ The threshold value is from 0 to 100 where as 0 is to block any traffic and 100 is turning off the limit. The threshold value can be bits-per-second (bps), packets-per-second (pps), or percentage.
  • 3. ■ When the port is blocking multicast traffic, BPDU and CDP frames will not be blocked. However, other multicast traffic such as routing updates or HSRP hellos will be blocked, regardless. So be careful when using this feature and be mindful of the implication to the routing protocols or FHRP. ■ There are three four penalties that can be implemented if the traffic reaches its threshold, Shutdown or SNMP Trap message. The third penalty is to combine Shutdown and SNMP Trap so the port will be shutdown while also sending SNMPTrap. ■ If the interface is configured without storm-control action command, it will create a log alert and block the traffic ■ Shutdown option will shut the port down when offending traffic reaches the threshold and the port can be re-enabled via shut/no shut command on the interface or via error-disable detection and recovery feature. There is no specific storm-control option for errdisable detect cause command but it is enable by default. errdisable recovery cause storm-control command is required to re-enable the interface.
  • 4. ■ SW1(config)#errdisable detect cause ? ■ all Enable error detection on all cases ■ arp-inspection Enable error detection for arp inspection ■ bpduguard Enable error detection on bpdu-guard ■ dhcp-rate-limit Enable error detection on dhcp-rate-limit ■ dtp-flap Enable error detection on dtp-flapping ■ gbic-invalid Enable error detection on gbic-invalid ■ inline-power Enable error detection for inline-power ■ l2ptguard Enable error detection on l2protocol-tunnel ■ link-flap Enable error detection on linkstate-flapping ■ loopback Enable error detection on loopback ■ pagp-flap Enable error detection on pagp-flapping ■ pppoe-ia-rate-limit Enable error detection on PPPoE IA rate-limit ■ psp Enable error detection on PSP ■ security-violation Enable error detection on 802.1x-guard ■ sfp-config-mismatch Enable error detection on SFP config mismatch ■ small-frame Enable error detection on small_frame
  • 5. ■ SW1#sh errdisable detect | i storm-control ■ storm-control Enabled port ■ SW1#conf t ■ Enter configuration commands, one per line. End with CNTL/Z. ■ SW1(config)#errdisable recovery cause storm-control ■ SW1(config)#errdisable recovery interval 30 ■ SW1(config)#exit ■ SW1#sh errdisable recovery | i storm ■ storm-control Enabled
  • 6. ■ Trap option will only send SNMP trap message but will not shut the port down. ■ Below is the example to configure an interface to control broadcast and multicast packets storm by shutting down the port and sends snmp traps if the broadcast reaches 50.0 bps, multicast packets reaches 50 pps, or unicast traffic reaches 50 percent storm reaches 0.5 percent per second. ■ SWITCH1#sh run int f0/23 ■ interface f0/23 ■ storm-control broadcast level bps 50.5m 40k ■ storm-control multicast level pps 50m 40k ■ storm-control unicast level 50 40 ■ storm-control action shutdown ■ storm-control action trap ■ end
  • 7. ■ SW1#sh storm-control f0/23 ■ Interface Filter State Upper Lower Current ■ --------- ------------- ----------- ----------- ---------- ■ Fa0/23 Forwarding 50.5m bps 40k bps 0 bps ■ SW1#sh storm-control f0/23 ■ Interface Filter State Upper Lower Current ■ --------- ------------- ----------- ----------- ---------- ■ Fa0/23 Forwarding 50.5m bps 40k bps 0 bps ■ SW1#sh storm-control f0/23 broadcast ■ Interface Filter State Upper Lower Current ■ --------- ------------- ----------- ----------- ---------- ■ Fa0/23 Forwarding 50.5m bps 40k bps 0 bps • SW1#sh storm-control f0/23 multicast • Interface Filter State Upper Lower Current • --------- ------------- ----------- ----------- ---------- • Fa0/23 Forwarding 50m pps 40k pps 0 pps • SW1#sh storm-control f0/23 unicast • Interface Filter State Upper Lower Current • --------- ------------- ----------- ----------- ---------- • Fa0/23 Forwarding 50.00% 40.00% 0.00%
  • 8. ■ Let’s run some testing with two switches. SW1 and SW2 are connected to each other via FastEthernet0/23 and FastEthernet0/24. ■ SW1#sh cdp nei ■ CapabilityCodes: R - Router,T -Trans Bridge, B - Source Route Bridge ■ S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, ■ D - Remote, C - CVTA, M -Two-port Mac Relay ■ Device ID Local Intrfce Holdtme Capability Platform Port ID ■ SW2 Fas 0/23 164 S I WS-C3560- Fas 0/23 ■ SW2 Fas 0/24 168 S I WS-C3560- Fas 0/24
  • 9. ■ SVIVLAN10 is configured on each switch and port F0/23-24 are configured as trunk. ■ ! SW1 and SW2 ■ vlan 10 ■ exit ■ int r f0/23-24 ■ switchport trunk encapsulation dot1q ■ switchport mode trunk ■ switchport nonegotiate ■ no shut • ! SW1 • int vlan 10 • ip addr 10.10.10.1 255.255.255.0 • no shut • ! SW2 • int vlan 10 • ip addr 10.10.10.2 255.255.255.0 • no shut
  • 10. ■ SW1 is the root forVLAN10 and port F0/23 is the root port in SW2. ■ SW1# sh spann vlan 10 ■ VLAN0010 ■ Spanning tree enabled protocol ieee ■ Root ID Priority 4106 ■ Address 0023.0467.6880 ■ This bridge is the root ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ Bridge ID Priority 4106 (priority 4096 sys-id-ext 10) ■ Address 0023.0467.6880 ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ AgingTime 300 sec ■ Interface Role Sts Cost Prio.NbrType ■ ------------------- ---- --- --------- -------- -------------------------------- ■ Fa0/19 Desg FWD 19 128.21 P2p ■ Fa0/20 Desg FWD 19 128.22 P2p ■ Fa0/23 Desg FWD 19 128.25 P2p ■ Fa0/24 Desg FWD 19 128.26 P2p
  • 11. ■ SW2#sh spann vlan 10 ■ VLAN0010 ■ Spanning tree enabled protocol ieee ■ Root ID Priority 4106 ■ Address 0023.0467.6880 ■ Cost 19 ■ Port 25 (FastEthernet0/23) ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10) ■ Address 0022.be79.0f00 ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ AgingTime 300 sec ■ Interface Role Sts Cost Prio.NbrType ■ ------------------- ---- --- --------- -------- -------------------------------- ■ Fa0/19 Desg FWD 19 128.21 P2p ■ Fa0/20 Desg FWD 19 128.22 P2p ■ Fa0/23 Root FWD 19 128.25 P2p ■ Fa0/24 Altn BLK 19 128.26 P2p
  • 12. ■ SW1 is configured to block unicast packet storm if it reaches 100 packets per second. ■ ! SW1 ■ interface FastEthernet0/23 ■ storm-control unicast level pps 100 ■ Flooding SW1 from SW2 with ping 10.10.10.1 re 999999 timeout 0 will trigger the storm-control to create an alert but since it is not configured to either shutdown the port nor sending trap, nothing actually happens on the port. ■ %STORM_CONTROL-3-FILTERED: A Unicast storm detected on Fa0/23. A packet filter action has been applied on the interface.
  • 13. ■ Now the port is configured to shutdown when a violation occurs and errdisable recovery is also applied. ■ ! SW1 ■ errdisable recovery cause storm-control ■ errdisable recovery interval 30 ■ interface FastEthernet0/23 ■ storm-control unicast level pps 100 ■ storm-control action shutdown ■ storm-control action trap
  • 14. ■ Sending packets from SW2 to SW1 ■ SW2#ping 10.10.10.1 re 99999 tim 0 ■ Type escape sequence to abort. ■ Sending 99999, 100-byte ICMP Echos to 10.10.10.1, timeout is 0 seconds: ■ ..............!.......................................................
  • 15. ■ SW1 will block the port f0/23 and errdisable recovery will keep trying to re-enable the port. However, since the port is still receiving flooding packet and shutdown action is enforced, errdisable is unable to recover the port. sh storm-control f0/23 unicast also shows that the port is down. Port f0/23 is no longer forwarding in SW1. ■ SW1# sh log ■ 00:59:28: %PM-4-ERR_RECOVER: Attempting to recover from storm-control err-disable state on Fa0/23 ■ 00:59:32: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up ■ 00:59:33: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to up ■ 01:00:01: %PM-4-ERR_DISABLE: storm-control error detected on Fa0/23, putting Fa0/23 in err-disable state ■ 01:00:01: %STORM_CONTROL-3-SHUTDOWN: A packet storm was detected on Fa0/23. The interface has been disabled. ■ 01:00:02: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to down ■ 01:00:03: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to down
  • 16. ■ SW1#sh storm-control f0/23 unicast ■ Interface Filter State Upper Lower Current ■ --------- ------------- ----------- ----------- ---------- ■ Fa0/23 Link Down 100 pps 100 pps 0 pps • SW1#sh spann vlan 10 • VLAN0010 • Spanning tree enabled protocol ieee • Root ID Priority 4106 • Address 0023.0467.6880 • This bridge is the root • HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec • Bridge ID Priority 4106 (priority 4096 sys-id-ext 10) • Address 0023.0467.6880 • HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec • AgingTime 15 sec • Interface Role Sts Cost Prio.NbrType • ------------------- ---- --- --------- -------- ----------------------------- --- • Fa0/19 Desg FWD 19 128.21 P2p • Fa0/20 Desg FWD 19 128.22 P2p • Fa0/24 Desg FWD 19 128.26 P2p
  • 17. ■ SW2 also sees that the port f0/23 is down due to the adjacent port f0/23 in SW1 is down and SpanningTree shows that port f0/24 is starting to be active and become Root port. ■ ! SW2 shows port f0/23 is down ■ 01:00:36: %LINK-3-UPDOWN: Interface FastEthernet0/23, change......................................... ■ ....................................d state to up ■ 01:00:37: %LINEPROTO-5-UPDOWN: Line protocol on Interface Fa.................................. ■ .................................................stEthernet0/23, changed state to up.....................
  • 18. ■ SW2#sh spann vlan 10 ■ VLAN0010 ■ Spanning tree enabled protocol ieee ■ Root ID Priority 4106 ■ Address 0023.0467.6880 ■ Cost 19 ■ Port 26 (FastEthernet0/24) ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10) ■ Address 0022.be79.0f00 ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ AgingTime 15 sec ■ Interface Role Sts Cost Prio.NbrType ■ ------------------- ---- --- --------- -------- -------------------------------- ■ Fa0/19 Desg FWD 19 128.21 P2p ■ Fa0/20 Desg FWD 19 128.22 P2p ■ Fa0/24 Root LRN 19 128.26 P2p
  • 19. ■ After the flooding stops, SW1 port f0/23 recovers via errdisable recovery and spanning tree starts forwarding again. ■ SW1# sh log ■ 01:10:48: %PM-4-ERR_RECOVER:Attempting to recover from storm-control err-disable state on Fa0/23 ■ 01:10:51: %LINK-3-UPDOWN: Interface FastEthernet0/23, changed state to up ■ 01:10:52: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to up
  • 20. ■ SW1#sh spann vlan 10 ■ VLAN0010 ■ Spanning tree enabled protocol ieee ■ Root ID Priority 4106 ■ Address 0023.0467.6880 ■ This bridge is the root ■ HelloTime 2 sec MaxAge 20 sec Forward Delay 15 sec ■ Bridge ID Priority 4106 (priority 4096 sys-id-ext 10) ■ Address 0023.0467.6880 ■ HelloTime 2 sec MaxAge 20 sec Forward Delay 15 sec ■ AgingTime 300 sec • Interface Role Sts Cost Prio.NbrType • ------------------- ---- --- --------- -------- ---------------- ---------------- • Fa0/19 Desg FWD 19 128.21 P2p • Fa0/20 Desg FWD 19 128.22 P2p • Fa0/23 Desg FWD 19 128.25 P2p • Fa0/24 Desg FWD 19 128.26 P2p • SW1#sh storm-control f0/23 uni • Interface Filter State Upper Lower Current • --------- ------------- ----------- ----------- ---------- • Fa0/23 Forwarding 100 pps 100 pps 0 pps
  • 21. ■ SW2 spanning tree is also back to its previous forwarding state. ■ SW2#sh spann vlan 10 ■ VLAN0010 ■ Spanning tree enabled protocol ieee ■ Root ID Priority 4106 ■ Address 0023.0467.6880 ■ Cost 19 ■ Port 25 (FastEthernet0/23) ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ Bridge ID Priority 16394 (priority 16384 sys-id-ext 10) ■ Address 0022.be79.0f00 ■ HelloTime 2 sec Max Age 20 sec Forward Delay 15 sec ■ AgingTime 300 sec ■ Interface Role Sts Cost Prio.NbrType ■ ------------------- ---- --- --------- -------- -------------------------------- ■ Fa0/19 Desg FWD 19 128.21 P2p ■ Fa0/20 Desg FWD 19 128.22 P2p ■ Fa0/23 Root FWD 19 128.25 P2p ■ Fa0/24 Altn BLK 19 128.26 P2p
  • 22. ■ In addition to storm-control, frames that are smaller than 67 bytes are considered small frames and will not be counted towards the limit.The newer Cisco IOS release 12.2(44)SE and later can include these small frames via commands below ■ errdisable detect cause small-frame ■ errdisable recovery cause small-frame ■ int f0/23 ■ small-frame violation-rate pps ■ small-frame violation rate 1000 ■ Exit ■ The small-frame violation-rate pps is default and threshold value is only in RisingThreshold from 1 to 10,000 pps.
  • 23. ■ In Port-Channel, Storm-Control has to be applied in the Port-Channel and not the interface member. ■ SW1(config-if)#do sh etherc sum ■ Flags: D - down P - bundled in port-channel ■ I - stand-alone s - suspended ■ H - Hot-standby (LACP only) ■ R - Layer3 S - Layer2 ■ U - in use f - failed to allocate aggregator ■ M - not in use, minimum links not met ■ u - unsuitable for bundling ■ w - waiting to be aggregated ■ d - default port ■ Number of channel-groups in use: 1 ■ Number of aggregators: 1 ■ Group Port-channel Protocol Ports ■ ------+-------------+-----------+----------------------------------------------- ■ 1 Po1(SU) LACP Fa0/23(P) Fa0/24(P)
  • 24. ■ SW1(config-if)#int f0/23 ■ SW1(config-if)#storm-control unicast level pps 100 ■ Command Rejected: Storm-control feature cannot be applied on a port part of a port-channel ■ SW1(config-if)#do sh etherc sum ■ Flags: D - down P - bundled in port-channel ■ I - stand-alone s - suspended ■ H - Hot-standby (LACP only) ■ R - Layer3 S - Layer2 ■ U - in use f - failed to allocate aggregator ■ M - not in use, minimum links not met ■ u - unsuitable for bundling ■ w - waiting to be aggregated ■ d - default port ■ Number of channel-groups in use: 1 ■ Number of aggregators: 1 ■ Group Port-channel Protocol Ports ■ ------+-------------+-----------+----------------------------------------------- ■ 1 Po1(SU) LACP Fa0/23(P) Fa0/24(P)
  • 25. ■ When storm-control is not configured to shutdown nor sends trap, it will actually block the traffic. However, this will not be shown in the interface packet counter but only available on the show storm-control command. ■ SW2#ping 10.10.10.1 re 9999999 ■ Type escape sequence to abort. ■ Sending 9999999, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: ■ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!.!!!!.!!!!..!!!!!.!!!!.!!!!.!!!!!..!!!!!!!.!!!.!!!!!..!!!!!.!!!!.!!!!.!!!!.!!!..!!!!!.!!!!!.!!!.!!!!!..!!!!!.!!!.!!!!. ■ SW1#sh storm-control f0/23 u ■ Interface Filter State Upper Lower Current ■ --------- ------------- ----------- ----------- ---------- ■ Fa0/23 Blocking 1 pps 1 pps 1 pps
  • 26. Follow us @  www.facebook.com/NetProtocolXpert  www.instagram.com/netprotocol_xpert  plus.google.com/collection/k8HMDB  twitter.com/NPX_cisco  www.linkedin.com/company/netprotocol-xpert  netprotocolxpert.blogspot.in  remote.com/netprotocolxpert  www.netprotocolxpert.in