Can This brand of Linksys Switch plugged into a Cisco switch cause broadcast storms?

Posted on 2008-11-05
Last Modified: 2012-05-05
Can This brand of Linksys Switch plugged into a Cisco switch cause broadcast storms?

EZSX88W Ver 3.1 10/100 8-Port Workgroup Switch.

Please provide a couple scenarios how  broadcast storms could happen with this device or any device.

Please provide causes and resolutions to broadcast storms in different scenarios.

Question by:AndrewKeim
    LVL 21

    Accepted Solution

    Why do you think you have broadcast storms?
    what shows cisco's log?

    as for particular linksys - the answer is negative - under normal circumstances switches does not produce storms. Even more, I you connect you linksys to cisco, and you have some weird traffic on linksys, cisco can react on that automatically and will not forward that traffic to all other ports.
    LVL 2

    Author Comment

    The  network administrator is saying that when multiple computers are plugged into the linksys switch even without a loopback to the switch causes unusually high network traffic.  I can understand the loopback that may cause this issue, but when normal computers are plugged in without loopback than to me that points to a faulty network card, not the linksys switch...
    LVL 21

    Expert Comment

    this is possible under several circumstances:
    1. you have 10 Mbps cards at least in some of Pcs
    2. you have at least broken nic
    3. some of the nics are trying to work in 100 half mode, so causing a lot of collisions.

    My exp shows that cheap switches can not handle collisions well because of very small packet buffers
    LVL 2

    Assisted Solution

    It could also be a bad Linksys switch. Try another. Also if he is looking at that port and comparing it to other ports with only one device plugged in. It will look exessive, because there are multiple devices using that port instead of only one.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Free Trending Threat Insights Every Day

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Suggested Solutions

    Title # Comments Views Activity
    Loop Guard and UDLD 10 49
    HP 1920-16 switch 10 42
    D-link DWL-2600AP - Guest network 1 35
    1 WAN to 2 LAN 4 40
    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now