cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
37472
Views
5
Helpful
6
Replies

Broadcast storm prevention

cuellar52
Level 1
Level 1

Hi,

I just wanted some advice last week while our company was doing some refurbishment a hired contractor came in and plugged on ethernet cable from one wall port directly into another wall port. This caused the end of the world till I managed to trace the issue, I just wanted to ask if anyone knew good prevention methods for storm control incidents.

The current setup was

4x 3750E poe switch stack for users workstations

That runs 2x dot1q trunks to the

2x distribution 3750G switches

then that runs to the

2x 6500 cores

Once the port was plugged into it's self this created a storm that from the first 3750e poe switch started bleeding the storm up the uplinks to affect finally the 6500 cores causing a halt to the entire system.

Standard configuration of a workstation port

interface GigabitEthernet1/0/1

description *** WORKSTATION PORT ***

switchport access vlan 40

switchport mode access

no logging event link-status

mls qos cos override

no snmp trap link-status

no cdp enable

spanning-tree portfast

spanning-tree bpdufilter enable

spanning-tree bpduguard enable

spanning-tree guard root

end

and configuration on all switches

spanning-tree mode rapid-pvst

spanning-tree loopguard default

spanning-tree portfast bpduguard default

spanning-tree extend system-id

Ins't 802.1w spanning tree rapid met to to prevent this issue? or is portfast stuffing this up?  My current solutuion would be to enable on all workstation interfaces storm-control

storm-control broadcast level 20
storm-control action shutdown

ANY OTHER IDEAS? how this can be prevented?

any help would be great cheers

Eddy

2 Accepted Solutions

Accepted Solutions

cadet alain
VIP Alumni
VIP Alumni

Hi,

when BPDU filter  and BPDU guard are configured at the same time on a port then the BPDU filter takes precedence and so BPDU guard has no effect. You should only use BPDU guard by configuring it globally so it will be enabled on access ports and get rid of the BPDU filter.

Regards.

Alain

Don't forget to rate helpful posts.

View solution in original post

Eduardo

I agree with Alain, you need to be very careul with BPDUfilter as it will completely discard BPDUs and you will be vulnerable to a loop between two ports on a switch. I think that this is the fault condition that you described. Please see this post that discusses the same issue:

https://learningnetwork.cisco.com/thread/6604

I think that storm control at 20% and shutdown action could also be very useful. Perhaps make sure that you receive an alert if a port goes into errdisable.

Daniel

View solution in original post

6 Replies 6

Mohit Chauhan
Level 1
Level 1

Hi Eddy,

"spanning-tree portfast bpduguard default" should ideally make all ports enabled with bpduguard, which basically means that if there is any bpdu detected on that port, it is shut down "err-disbale" status.

Those wall ports should be going to the access switches and I would double check those ports having bpdu guard enabled.

Also, it is a good practise to keep unused ports part of a bogus VLAN, and make sure this VLAN is shutdown. I usually use VLAN999 for the same.

Hope the above helps.

Regards,

Mohit

cadet alain
VIP Alumni
VIP Alumni

Hi,

when BPDU filter  and BPDU guard are configured at the same time on a port then the BPDU filter takes precedence and so BPDU guard has no effect. You should only use BPDU guard by configuring it globally so it will be enabled on access ports and get rid of the BPDU filter.

Regards.

Alain

Don't forget to rate helpful posts.

cuellar52
Level 1
Level 1

Hi Cadet Alian,

Thankyou very much for the advice you have provided, I tried the setup you suggested in a lab and SUCCESS!

What I have done is

switch running-config is like this

spanning-tree mode rapid-pvst

spanning-tree loopguard default

spanning-tree portfast bpduguard default

spanning-tree extend system-id

and Interface is

interface GigabitEthernet1/0/1

description *** WORKSTATION PORT ***

switchport access vlan 40

switchport mode access

no logging event link-status

mls qos cos override

no snmp trap link-status

no cdp enable

spanning-tree portfast

spanning-tree bpdufilter enable

spanning-tree guard root

end

I have removed command spanning-tree bpduguard from the interface and have just left this feature enabled in a global scale. But I left the spanning bpdufilter in the interface. This worked in the test lab.

Would this setup be the ideal setup you were suggesting Cadet Alain?

Hi,

I would completely get rid of the BPDU filter feature and let the BPDU guard do the trick on access ports.

Regards.

Alain

Don't forget to rate helpful posts.

Eduardo

I agree with Alain, you need to be very careul with BPDUfilter as it will completely discard BPDUs and you will be vulnerable to a loop between two ports on a switch. I think that this is the fault condition that you described. Please see this post that discusses the same issue:

https://learningnetwork.cisco.com/thread/6604

I think that storm control at 20% and shutdown action could also be very useful. Perhaps make sure that you receive an alert if a port goes into errdisable.

Daniel

cuellar52
Level 1
Level 1

Brillant!! thanks for all your help everyone!

I will be disabling all BPDU filtering features on all my workstation access switches and I will be enabling BPDU guard Globally as this has worked fantastic in a lab.

If anyone is keen to tackle on last questions please help.

I noticed in my config that each workstation port has rootguard enabled.

Standard configuration of a workstation port

interface GigabitEthernet1/0/1

description *** WORKSTATION PORT ***

switchport access vlan 40

switchport mode access

no logging event link-status

mls qos cos override

no snmp trap link-status

no cdp enable

spanning-tree portfast

spanning-tree guard root

end

This is to prevent a switch with a higher prioity coming into the network and taking the root bridge postion. I wouldn't think this feature needs to be enabled on all workstations ports? After all BPDU guard will err-disable any interface that gets any type of BPDU.

Wouldn't this feature best be suited to be enabled on the trunk port going up to the distrubtion switch from the access port switch? Hence just in case something did get pass it would never get to the core root bridge?

Is this correct?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card