Unknown Unicast Flooding Suppression

This chapter describes how to configure unknown unicast flooding suppression on the Cisco ASR 1000 Series Routers. This chapter contains these topics:

About Unknown Unicast Flooding on Bridge Domain

Occasionally, unknown unicast traffic is flooded to all the provider edge devices because the device does not know the destination MAC address of a received packet. By default, the unknown unicast traffic will be flooded to all devices. To prevent forwarding such traffic, you can configure the unknown-unicast-suppress command.

Limitations for Unknown Unicast Suppression

If Unknown Unicast Flooding Suppression is enabled, unicast traffic towards an unknown host will be dropped. A host becomes unknown or silent when its MAC address ages out from the MAC address table on the PE. The PE might rely on Unknown Unicast Flooding to re-learn the MAC address.

Enabling Unknown Unicast Flooding on Bridge Domain

To enable unknown unicast flooding suppression, perform the following steps.

Summary Steps

? By default, the unknown unicast flooding is disabled.

  1. configure terminal
  2. bridge-domain {interface number}

Detailed Steps

Command or ActionPurpose
Step 1
configure terminal
Example:
Router# configure terminal
Enters global configuration mode.
Step 2
bridge-domain {interface number}
Example:
Router(config)# bridge-domain 10
Configures the bridge domain on the interface.
Step 3
flooding-suppression unknown-unicast
Example:
Router(config-bdomain)# flooding-suppression unknown-unicast
Enables unknown unicast flooding suppression on the bridge domain.
Step 4
end
Example:
Router(config-bdomain)# end
(Optional) Returns to privileged EXEC mode.

Verifying the Unknown Unicast Flooding Suppression

Verify that you have enabled the unknown unicast flooding suppression by entering the following command:

Device(config-bdomain)# do show run | sec bridge

bridge-domain 10

flooding-suppression unknown-unicast

This example shows the packets that are suppressed and dropped.

QFP L2BD Bridge Domain Information

BD id1
State enabledYes
Aging timeout (sec)300
Aging active entryYes
Max mac limit65536
Unkwn mac limit floodYes
mac_learn_enabledYes
mac_learn_controledYes
Unknown unicast olistYes
otv_aed_enabledNo
otv_enabledNo
mcast_snooping_enabledNo
Featureevpn, uuf-suppression

Feature Information for Unknown Unicast Flooding Suppression

Table 1: Feature Information for Unknown Unicast Flooding Suppression

Feature NameReleasesFeature Information
Unknown Unicast Flooding SuppressionCisco IOS XE Bengaluru 17.4This feature was introduced.

Bridge Domain Statistics

StatisticValue
Total bridgedpkts: 0, bytes: 0
Total unknown unicastpkts: 0, bytes: 0
Total broadcastedpkts: 0, bytes: 0
Total to BDIpkts: 0, bytes: 0
Total injectedpkts: 0, bytes: 0
Total mac-sec violation droppkts: 0, bytes: 0
Total mac-sec move droppkts: 0, bytes: 0
Total mac-sec unknown droppkts: 0, bytes: 0
Total source filter droppkts: 0, bytes: 0
Total bfib policy droppkts: 0, bytes: 0
Total replication start droppkts: 0, bytes: 0
Total recycle tail droppkts: 0, bytes: 0
Total static MAC move droppkts: 0, bytes: 0
Total BD disabled droppkts: 0, bytes: 0
Total STP state droppkts: 0, bytes: 0
Total UUF suppression droppkts: 0, bytes: 0
Models: Unknown Unicast Flooding Supperssion Software, Unicast Flooding Supperssion Software, Flooding Supperssion Software, Supperssion Software, Software

PDF preview unavailable. Download the PDF instead.

m-unknown-unicast-flooding-suppression DITA Open Toolkit XEP 4.30.961; modified using iText 2.1.7 by 1T3XT

Related Documents

PreviewCisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
A comprehensive guide to configuring the Cisco Unified Border Element (CUBE) using Cisco IOS XE 17.5, covering SIP, H.323, codecs, call admission control, media path, and other essential features for enterprise voice and video communication.
PreviewIP Switching Cisco Express Forwarding Configuration Guide, Cisco IOS XE Release 2
A comprehensive guide detailing the configuration and operation of Cisco Express Forwarding (CEF) and its distributed counterpart (dCEF) within Cisco IOS XE software, focusing on optimizing network performance and scalability for Cisco routers.
PreviewCisco IOS XE Bengaluru 17.4.x プログラマビリティ コンフィギュレーション ガイド
Cisco IOS XE Bengaluru 17.4.x のプログラマビリティ設定に焦点を当てた、包括的な設定ガイドです。Python スクリプティング、NETCONF、RESTCONF、gNMI、Guest Shell などのネットワーク自動化機能を活用する方法を詳述しています。
PreviewCisco ASR 900 Router Series Configuration Guide, Cisco IOS XE 16
This configuration guide details the setup and management of Cisco ASR 900 Router Series devices utilizing Cisco IOS XE 16 software. It offers comprehensive instructions on interface configuration, protocol setup, system management, and troubleshooting for network administrators.
PreviewQuality of Service Configuration Guidelines for Cisco ASR 900 Series with Cisco IOS XE 17
Comprehensive guide to configuring Quality of Service (QoS) features on Cisco ASR 900 Series routers running Cisco IOS XE 17. It details essential aspects of network traffic management, including classification, marking, policing, shaping, and congestion management.
PreviewHigh Availability Configuration Guide for Cisco IOS XE 17
This guide details the configuration of High Availability (HA) features, including Stateful Switchover (SSO) and Nonstop Forwarding (NSF), within Cisco IOS XE software. It is designed for network professionals managing Cisco ASR 1000 Series routers to enhance network resilience and minimize service downtime.
PreviewCisco TrustSec Integration Guide for SD-WAN
This guide details the integration of Cisco TrustSec with Cisco SD-WAN, focusing on Security Group Tag (SGT) propagation using inline tagging and SXP. It covers configuration, supported hardware, and best practices for network segmentation and security.
PreviewCisco Catalyst 9300 Switches Software Configuration Guide: Cisco IOS XE Dublin 17.12.x
Learn how to configure Cisco Catalyst 9300 Switches with Cisco IOS XE Dublin 17.12.x. This guide covers initial setup, Web UI configuration, network settings, and best practices for enterprise network deployment.