EasyManuals Logo

Cisco Catalyst 4500 Series Software Configuration Guide

Cisco Catalyst 4500 Series
2086 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1508 background imageLoading...
Page #1508 background image
57-4
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 57 Configuring Control Plane Policing and Layer 2 Control Packet QoS
Configuring Control Plane Policing
General Guidelines for Control Plane Policing
Guidelines for control plane policing include the following:
If a given traffic class does not have a designated class map, and you want to protect this traffic, we
recommend that you:
Create specific class maps for such unknown traffic packets and add the user-defined class maps
to system-cpp-policy.
Or, rate-limit such traffic to prevent CPU hogging.
For instance, in a VSS setup, if you have defined class map cpp-vsl-mgmt for VSL management
traffic (exclusively Layer 2 packets), do not use the cpp-vsl-mgmt class map to protect supervisor
keep-alive traffic (IP packets), or BFD packets. This can cause VSL link failures. Instead, create
separate class maps, such as cpp-ip for supervisor keep-alive traffic, and cpp-bfd for BFD packets.
VSL link failures may also ensue if you enter class-default as the class name for traffic that does not
have a designated class map.
Port security might cancel the effect of CoPP for non-IP control packets.
Although source MAC learning on a Catalyst 4500 series switch is performed in software, learning
control packets' source MAC addresses (for example, IEEE BPDU, CDP, SSTP BPDU, GARP/) is
not allowed. After you configure port security on a port where you expect a high rate of potentially
unanticipated control packets, the system generates a copy of the packet to the CPU (until the source
address is learned), instead of forwarding it.
The current architecture of the Catalyst 4500 supervisor engine does not allow you to apply policing
on the copy of packets sent to the CPU. You can only apply policing on packets that are forwarded
to the CPU. Copies of packets are sent to the CPU at the same rate as control packets, and port
security is not triggered because learning from control packets is not allowed. Policing is not applied
because the packet copy, not the original, is sent to the CPU.
ARP policing is not supported on either the classic series supervisor engines (i.e., supervisor engines
prior to Supervisor Engine 7-E) or fixed configuration switches. It is supported on the Catalyst
4900M and 4948E switches, Supervisor Engine 6-E, and Supervisor Engine 6L-E (use “match
protocol arp” to classify).
Only ingress CoPP is supported; control-plane related CLIs support only the input keyword.
Use ACLs and class-maps to identify data plane and management plane traffic that are handled by
CPU.
“police” is the only action supported in CoPP policy-map.
Avoid using the log keyword in the CoPP policy ACLs.
Default Configuration
CoPP is disabled by default.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals