Solved

Defining a network port (cisco switch)

Posted on 2004-08-20
5
895 Views
Last Modified: 2010-04-11
Cisco says: Enabling a network port can reduce flooded traffic on our network. The network report receives all traffic with unknown destination addresses instead of the switch flooding them to all ports in the same VLAN.

Can someone give me an example, of when and how you would use something like this in a basic network?

http://mvpbaseball.cc/post.jpg  is my network
0
Comment
Question by:dissolved
  • 2
  • 2
5 Comments
 
LVL 11

Expert Comment

by:NetoMeter Screencasts
ID: 11855451
Hi!
I am sorry but I can not understand:

1. What is the problem:
"The network report receives all traffic with unknown destination addresses instead of the switch flooding them to all ports in the same VLAN"
2. I do not see VLANs on your diagram.
3. Which port on which device do you want to enable/disable and what is the reason for that (again what is the problem that you are trying to fix)

I appologize again and definitely do not mean to offend you but I would appreciate if you can be more precise with your post:)

NetoMeter
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 11855754
dissolved, can you post a link to the document that you quoted?
0
 

Author Comment

by:dissolved
ID: 11856147
lrmoore, it was from Ciscos website. I printed it out at work.
It was titled "Using the command line interface" for a 2924xl switch. I looked lrmoore, but couldnt find the link (plus right now I'm on 56k connection yikes)

Just wondering what "defining a port" does. Thats all.
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 11856334
Assume this is what you're talking about:
http://www.cisco.com/en/US/products/hw/switches/ps607/products_command_reference_chapter09186a008007eb21.html#xtocid128029

Defining one switch port as a network port is another way to reduce the amount of flooding on a VLAN. The Cisco 2900 series switch supports one network port per VLAN. After the network port is defined, all packets with unknown unicast addresses are forwarded to the network port and not flooded to the other ports in the VLAN. This configuration works well in a desktop-switch configuration when many of the ports are connected to workstations. By connecting the network port to a legacy LAN segment where there is a lot of traffic to many different addresses, unknown addresses are flooded to that part of the network where unknown addresses might exist and are not forwarded to connected workstations with well-known addresses.

Beginning in privileged EXEC mode, complete these tasks to define a port to be the network port:

Task  Command  
Step 1 Enter global configuration mode.
 configure terminal
 
Step 2 Define the interface to be configured.
 interface interface
 
Step 3 Define the port as the network port.
 port network
 
Step 4 Return to EXEC mode.
 end
 
Step 5 Verify the entry.
 show running-config
 

What it means: take one port of the switch and configure it as a "network" port using the steps above, and connect that network port to an uplink to connect to the rest of the LAN. It provides some measure of packet storm control. In all my years of working with Cisco products, I've never come across a reason to use it. Primarily because of the prevelant use of TCP/IP at layer 3 instead of broadcast/unicast packets at layer 2. "well-known" addresses are MAC-addresses only. That is the only thing this switch keeps a table of..

Limited flooding is part of the normal switching process. There are situations, however, when continuous flooding can cause adverse performance effects on the network.


0
 

Author Comment

by:dissolved
ID: 11856987
You da man thanks
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now