When a switch is flooded with Address Resolution Protocol (ARP) or control packets, high CPU utilization can cause the CPU
to overload. These issues can occur:
Routing protocol can flap because the protocol control packets are not received, and neighboring adjacencies are dropped.
Spanning Tree Protocol (STP) reconverges because the STP bridge protocol data unit (BPDU) cannot be sent or received.
CLI is slow or unresponsive.
Using protocol storm protection, you can control the rate at which control packets are sent to the switch by specifying the
upper threshold for the packet flow rate. The supported protocols are ARP, ARP snooping, Dynamic Host Configuration Protocol
(DHCP) v4, DHCP snooping, Internet Group Management Protocol (IGMP), and IGMP snooping.
When the packet rate exceeds the defined threshold, the switch drops all traffic arriving on the specified virtual port for
30 seconds. The packet rate is measured again, and protocol storm protection is again applied if necessary.
For further protection, you can manually error disable the virtual port, blocking all incoming traffic on the virtual port.
You can manually enable the virtual port or set a time interval for automatic re-enabling of the virtual port.
Excess packets are dropped on no more than two virtual ports.
Protocol storm protection is disabled by default. When it is enabled, auto-recovery of the virtual port is disabled by default.