H3C Technologies H3C S12500 Series Switches User Manual

Page 9

Advertising
background image

iii

Configuring the root bridge or a secondary root bridge ·························································································· 73

 

Configuring the current switch as the root bridge of a specific spanning tree ··············································· 74

 

Configuring the current switch as a secondary root bridge of a specific spanning tree······························· 74

 

Configuring the switch priority ····································································································································· 74

 

Configuring the maximum hops of an MST region ···································································································· 75

 

Configuring the network diameter of a switched network ························································································· 75

 

Configuring spanning tree timers ································································································································· 76

 

Configuration restrictions and guidelines ··········································································································· 76

 

Configuration procedure ······································································································································ 77

 

Configuring the timeout factor ······································································································································ 77

 

Configuring the maximum port rate ····························································································································· 78

 

Configuration guidelines ······································································································································ 78

 

Configuration procedure ······································································································································ 78

 

Configuring edge ports ················································································································································· 78

 

Configuration restrictions and guidelines ··········································································································· 78

 

Configuration procedure ······································································································································ 79

 

Configuring path costs of ports ···································································································································· 79

 

Specifying a standard for the switch to use when calculating the default path cost ····································· 79

 

Configuring the path costs of ports ····················································································································· 81

 

Configuration example ········································································································································· 81

 

Configuring the port priority ········································································································································· 82

 

Configuring the port link type ······································································································································· 83

 

Configuration restrictions and guidelines ··········································································································· 83

 

Configuration procedure ······································································································································ 83

 

Configuring the mode a port uses to recognize/send MSTP packets ······································································ 83

 

Enabling the spanning tree feature ······························································································································ 84

 

Enabling the spanning tree protocol in STP, RSTP, or MSTP mode ································································· 84

 

Enabling the spanning tree protocol in PVST mode ·························································································· 85

 

Performing mCheck ························································································································································ 85

 

Performing mCheck globally ································································································································ 86

 

Performing mCheck in interface view ················································································································· 86

 

Configuring the VLAN Ignore feature ·························································································································· 86

 

Configuration procedure ······································································································································ 87

 

Configuration example ········································································································································· 87

 

Configuring Digest Snooping ······································································································································· 88

 

Configuration restrictions and guidelines ··········································································································· 88

 

Configuration procedure ······································································································································ 88

 

Configuration example ········································································································································· 89

 

Configuring No Agreement Check ······························································································································ 90

 

Configuration prerequisites ·································································································································· 91

 

Configuration procedure ······································································································································ 91

 

Configuration example ········································································································································· 92

 

Configuring TC snooping ·············································································································································· 92

 

Configuration restrictions and guidelines ··········································································································· 93

 

Configuration procedure ······································································································································ 93

 

Configuring protection functions ·································································································································· 94

 

Enabling BPDU guard ··········································································································································· 94

 

Enabling root guard ·············································································································································· 94

 

Enabling loop guard ············································································································································· 95

 

Enabling TC-BPDU guard······································································································································ 96

 

Displaying and maintaining the spanning tree ··········································································································· 96

 

Spanning tree configuration examples ························································································································ 97

 

MSTP configuration example ······························································································································· 97

 

PVST configuration example ······························································································································ 101

 

Advertising
This manual is related to the following products: