What is connected to the port where do you see the broadcast. Are you getting the broadcast on everyport or on some specific ports.The valid broadcast would be an ARP broadcast or bootp/DHCP broadcast on the ports.
Where is the intervlan routing happening.is it on 6500 or the L3 3750 switches.
The two switch are not connected to each other. 2960 (L2) is connected to firewalls (PIX, Checkpoint). 3750 (L3) is connected to Router (Cisco), Server (Linux/DNS), Firewalls (PIX/Checkpoint), Switch (3500). The 2960 switch has management vlan configured. The 3750 switch has multiple SVI configured. DHCP service is disabled in both switches. Both switch interfaces connected to an active host shows the same symptoms.
As I said that it could be a valid broadcast on the ports as mentioned in my earlier post. If you are getting a large broadcast on the switchports, I would suggest you to use a sniffer and configured the SPAN mirroring on the ports to see that kind of traffic is that.This will clearify our doubts about the traffic on the switchports.If its not a valid broadcast, we should be able to find the PC which is generating the broadcast traffic.
Please find the link below for SPAN config on the switches:
Thanks. I already suspect that its ARP broadcast but its too fast to accumulate specially in the 3750. I just power up the 3750 switch and been up for 6 hours. Its in a test (lab) environment. BTW, the 6500 I mentioned is running CATOS :)
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...