No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE20E-S2 V800R010C10SPC500 Configuration Guide - Security 01

This is NE20E-S2 V800R010C10SPC500 Configuration Guide - Security

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Introduction to Layer 2 Traffic Suppression

Introduction to Layer 2 Traffic Suppression

The traffic involved in Layer 2 traffic suppression includes broadcast, multicast, and unknown unicast traffic.

Layer 2 Traffic Classification

Traffic on a Layer 2 network is classified into the following types:

  • Unicast traffic: consists of packets that have known destination MAC addresses in the MAC table. The NE20E forwards these packets based on the mappings in the MAC table.

  • Unknown unicast traffic: consists of packets that have destination MAC addresses that are not in the MAC table. The NE20E broadcasts these packets.

  • Multicast traffic: consists of packets that have known multicast destination MAC addresses in the MAC table. The NE20E broadcasts these packets based on the mappings in the MAC table.

  • Unknown multicast traffic: consists of packets that have destination MAC addresses that are not in the MAC table. The Internet Group Management Protocol (IGMP) snooping-enabled NE20E broadcasts these packets.

  • Broadcast traffic: consists of packets that have broadcast destination MAC addresses. The NE20E broadcasts these packets.

To ensure the forwarding of unicast traffic, you can limit the bandwidth for forwarding the unknown unicast traffic, multicast traffic, and broadcast traffic by configuring traffic suppression.

Traffic Suppression

If the broadcast traffic is not suppressed, a great amount of network bandwidth is consumed when a great deal of broadcast traffic flows through the network. The network performance is degraded, even interrupting the communication.

In such a case, you need to configure broadcast traffic suppression on the switch to ensure that the NE20E can reserve some bandwidth for forwarding unicast traffic when broadcast traffic bursts across the network.

Translation
Download
Updated: 2019-01-02

Document ID: EDOC1100055397

Views: 25967

Downloads: 52

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Share
Previous Next