No agreement check configuration example, Network requirements, Configuration procedure – H3C Technologies H3C S5560 Series Switches User Manual
Page 132: Configuring tc snooping
98
No Agreement Check configuration example
Network requirements
As shown in
, Device A connects to a third-party device that has a different spanning tree
implementation. Both devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream device.
Figure 29 Network diagram
Configuration procedure
# Enable No Agreement Check on GigabitEthernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface gigabitethernet 1/0/1
[DeviceA-GigabitEthernet1/0/1] stp no-agreement-check
Configuring TC Snooping
As shown in
, an IRF fabric connects to two user networks through double links.
•
Device A and Device B form an IRF fabric.
•
The spanning tree feature is disabled on Device A and Device B and enabled on all devices in user
network 1 and user network 2.
•
The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.
When the network topology changes, it takes time for the IRF fabric to update its MAC address table and
ARP table. During this period, traffic in the network might be interrupted.