touchpoint

In addition to terminal devices, all personnel, places, and things connected to the network should also be considered.

View Details

resource

Understand best practices, explore innovative solutions, and establish connections with other partners throughout the Baker community.

×

touchpoint

touchpoint

In addition to terminal devices, all personnel, places, and things connected to the network should also be considered.

Learn more

resource

resource

Understand best practices, explore innovative solutions, and establish connections with other partners throughout the Baker community.

Contact Us
How IP Phones Handle Network Storms?

Introduction

Overview

In a network affected by a network storm, internet access on a PC may become very slow, and IP phones may fail to operate normally. When a phone is first connected, it may fail to obtain an IP address. Phones that were previously working may become unresponsive or display a warning icon on the screen.

The examples below show the warning symbols that may appear on the phone. In general, the larger the brackets around the lightning symbol, the more severe the network storm is.

Network storm warning icons on the phone screen Stronger network storm warning icon on the phone screen Severe network storm warning icon on the phone screen

In some environments, a PC may still be able to access the network while the phone cannot obtain an IP address or may even freeze. This does not necessarily indicate a fault with the phone. A phone CPU and a PC CPU are designed for different purposes and have different traffic-handling capabilities.

If a network storm warning appears, it should be treated as an alert about the network environment rather than a defect in the phone itself.

On monochrome-screen models, the warning may appear as a tornado-like icon. On very old firmware versions, the phone may show a text-based warning instead. These indicate the same underlying issue.

Network storm warning symbol on monochrome-screen phones

Applicable Models

This guide applies to all of our IP phone models.

Target Audience

This document is intended for users or support personnel who need to troubleshoot network storm conditions or configure a static IP address on the phone.

How to Check and Prevent Network Storms

Common Causes

General background information about network storms can be found at the following link:

https://baike.baidu.com/item/%E7%BD%91%E7%BB%9C%E9%A3%8E%E6%9A%B4/7308277?fr=aladdin

Common phone-side causes of a network storm include the following:

1. A loop is created by the phone’s two Ethernet ports. Since the phone provides dual network ports, some users connect both ports to the upstream switch or router, which can create a loop.

Dual Ethernet ports on the phone

Notes:

(1) The LAN port is a bridged extension of the WAN port. It is intended for situations where only one wall network cable is available at a desk, but both the PC and the phone need network access. In this case, connect the incoming network cable to the WAN port, then connect the LAN port to the PC.

(2) If enough network outlets are available, the PC and the phone should each use their own separate network connection. In that case, the phone LAN port should remain unused.

Recommended cabling example for WAN and LAN connections

2. The WAN and LAN connections are reversed. When both network ports are used, the WAN port must be connected to the upstream switch or router, while the LAN port should connect only to another local network device, such as a PC.

Note: If the ports are connected incorrectly, the network may not fail immediately. However, problems may appear later during operation. To avoid potential issues, always use the correct port mapping.

How to Prevent It

To avoid network storm issues caused by incorrect cabling, make sure the phone WAN port is connected to the upstream switch or router. The LAN port should either remain disconnected or be connected only to a downstream terminal device such as a PC.

How to Troubleshoot It

1. A practical way to investigate network storm conditions is to use Wireshark for live packet capture. You can refer to the following example guide:

https://jingyan.baidu.com/article/60ccbceb65ff2164cbb19777.html

2. Wireshark can be downloaded and installed from common software sources.

3. During a network storm, the LAN usually contains a very large number of broadcast packets. In Wireshark, this becomes visible immediately. In the example below, more than 882,723 packets are captured in just over 18 seconds, which is equivalent to more than 40,000 packets per second.

Using packet capture to identify a network storm

4. You may also use the following method, although it is less intuitive than Wireshark packet analysis:

https://jingyan.baidu.com/article/29697b9101f95fab21de3c6c.html

5. The troubleshooting method below is intended for users who have a basic understanding of the network structure. Use the following topology as a reference:

Reference network switch topology for fault isolation

Follow these steps:

① Open Wireshark on a PC, connect the PC to point A, and begin capturing packets.

Result (1): If the PC still shows a network storm at this point, unplug and reconnect lines B, C, D, E, F, and G one by one. After disconnecting each line, wait about 5 seconds before reconnecting it. If the traffic returns to normal after one specific line is unplugged, you can conclude that the abnormal condition is on that branch. Then continue troubleshooting further down that branch using the same method.

Result (2): If the packet traffic looks normal at point A, and the devices under B, C, D, E, F, and G are all working properly, then the issue is likely under branch A. Continue with the next step.

② Keep A connected to the upstream switch, connect the PC to A1, and start packet capture again.

Result (a): If the PC still shows a network storm, unplug and reconnect A2, A3, and A4 one by one. After disconnecting each line, wait about 5 seconds before reconnecting it. If the traffic returns to normal after one specific line is removed, the abnormal condition is on that downstream branch. Continue troubleshooting along that path.

Result (b): If the traffic at A1 looks normal and all devices under B, C, D, E, F, G, A2, A3, and A4 are working correctly, then the problem is likely under A1. Continue isolating the fault in the same step-by-step way.

Note: For example, if Step 1 shows that the storm appears when branch E is connected, then in Step 2 you should continue investigating E1, E2, E3, and E4 under that branch. Adjust the isolation path according to your actual network layout.

catalogue
Professional industrial communication manufacturer, providing high reliability communication guarantee!
Cooperation Consultation
customer service Phone
We use cookie to improve your online experience. By continuing to browse this website, you agree to our use of cookie.

Cookies

This Cookie Policy explains how we use cookies and similar technologies when you access or use our website and related services. Please read this Policy together with our Terms and Conditions and Privacy Policy so that you understand how we collect, use, and protect information.

By continuing to access or use our Services, you acknowledge that cookies and similar technologies may be used as described in this Policy, subject to applicable law and your available choices.

Updates to This Cookie Policy

We may revise this Cookie Policy from time to time to reflect changes in legal requirements, technology, or our business practices. When we make updates, the revised version will be posted on this page and will become effective from the date of publication unless otherwise required by law.

Where required, we will provide additional notice or request your consent before applying material changes that affect your rights or choices.

What Are Cookies?

Cookies are small text files placed on your device when you visit a website or interact with certain online content. They help websites recognize your browser or device, remember your preferences, support essential functionality, and improve the overall user experience.

In this Cookie Policy, the term “cookies” also includes similar technologies such as pixels, tags, web beacons, and other tracking tools that perform comparable functions.

Why We Use Cookies

We use cookies to help our website function properly, remember user preferences, enhance website performance, understand how visitors interact with our pages, and support security, analytics, and marketing activities where permitted by law.

We use cookies to keep our website functional, secure, efficient, and more relevant to your browsing experience.

Categories of Cookies We Use

Strictly Necessary Cookies

These cookies are essential for the operation of the website and cannot be disabled in our systems where they are required to provide the service you request. They are typically set in response to actions such as setting privacy preferences, signing in, or submitting forms.

Without these cookies, certain parts of the website may not function correctly.

Functional Cookies

Functional cookies enable enhanced features and personalization, such as remembering your preferences, language settings, or previously selected options. These cookies may be set by us or by third-party providers whose services are integrated into our website.

If you disable these cookies, some services or features may not work as intended.

Performance and Analytics Cookies

These cookies help us understand how visitors use our website by collecting information such as traffic sources, page visits, navigation behavior, and general interaction patterns. In many cases, this information is aggregated and does not directly identify individual users.

We use this information to improve website performance, usability, and content relevance.

Targeting and Advertising Cookies

These cookies may be placed by our advertising or marketing partners to help deliver more relevant ads and measure the effectiveness of campaigns. They may use information about your browsing activity across different websites and services to build a profile of your interests.

These cookies generally do not store directly identifying personal information, but they may identify your browser or device.

First-Party and Third-Party Cookies

Some cookies are set directly by our website and are referred to as first-party cookies. Other cookies are set by third-party services, such as analytics providers, embedded content providers, or advertising partners, and are referred to as third-party cookies.

Third-party providers may use their own cookies in accordance with their own privacy and cookie policies.

Information Collected Through Cookies

Depending on the type of cookie used, the information collected may include browser type, device type, IP address, referring website, pages viewed, time spent on pages, clickstream behavior, and general usage patterns.

This information helps us maintain the website, improve performance, enhance security, and provide a better user experience.

Your Cookie Choices

You can control or disable cookies through your browser settings and, where available, through our cookie consent or preference management tools. Depending on your location, you may also have the right to accept or reject certain categories of cookies, especially those used for analytics, personalization, or advertising purposes.

Please note that blocking or deleting certain cookies may affect the availability, functionality, or performance of some parts of the website.

Restricting cookies may limit certain features and reduce the quality of your experience on the website.

Cookies in Mobile Applications

Where our mobile applications use cookie-like technologies, they are generally limited to those required for core functionality, security, and service delivery. Disabling these essential technologies may affect the normal operation of the application.

We do not use essential mobile application cookies to store unnecessary personal information.

How to Manage Cookies

Most web browsers allow you to manage cookies through browser settings. You can usually choose to block, delete, or receive alerts before cookies are stored. Because browser controls vary, please refer to your browser provider’s support documentation for details on how to manage cookie settings.

Contact Us

If you have any questions about this Cookie Policy or our use of cookies and similar technologies, please contact us at support@becke.cc .