25-5
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter25 Configuring Port-Based Tra ffic Control Configuring Protected Ports
To disable storm control, use the no storm-control {broadcast | multicast | unicast} level interface
configuration command.
This example shows how to enable unicast storm control on a port with an 87-pe rcent rising suppression
level and a 65-percent falling suppression level:
Switch# configure terminal
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# storm-control unicast level 87 65
This example shows how to enable broadcast address storm control on a po rt to a l evel of 20 perc en t.
When the broadcast traffic exceeds the configured level of 20 percent of the total available bandwidth of
the port within the traffic-storm-control interval, the switch drops all broadcast traffic until the end of
the traffic-storm-control interval:
Switch# configure terminal
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# storm-control broadcast level 20
Configuring Protected Ports
Some applications require that no traffic be forwarded at Layer 2 between ports on the same switch so
that one neighbor does not see the traffic generated by another neighbor. In such an environment, the use
of protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between
these ports on the switch.
Protected ports have these features:
A protected port does not forward any traffic (unicast, multicast, or br oadcast) to an y oth er port t hat
is also a protected port. Data traffic cannot be forwarded bet wee n pro tec ted po rts at L a yer 2; onl y
control traffic, such as PIM packets, is forwarded because these packets ar e pro cesse d by the CPU
and forwarded in software. All data traffic passing between protected po rts must be fo rward ed
through a Layer 3 device.
Forwarding behavior between a protected port and a nonprotected port proceeds as usual.
Because a switch stack represents a single logical switch, Layer 2 traffic is not forwarded between any
protected ports in the switch stack, whether they are on the same or different switches in the stack.
These sections contain this configuration information:
Default Protected Port Configuration, page 25-5
Protected Port Configuration Guidelines, page 25-6
Configuring a Protected Port, page 25-6

Default Protected Port Configuration

The default is to have no protected ports defined.
Step6 show storm-control [interface-id] [broadcast |
multicast | unicast] Verify the storm control suppression levels set on the interface for
the specified traffic type. If you do not enter a traffic type,
broadcast storm control settings are displayed.
Step7 copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose