ii
Configuration Prerequisites ···········································································································1-32
Configuration Procedure················································································································1-32
Configuration Example ··················································································································1-32
Configuring the VLAN Ignore Feature···································································································1-33
Configuration Procedure················································································································1-33
Configuration Example ··················································································································1-33
Configuring Digest Snooping ················································································································1-34
Configuration Prerequisites ···········································································································1-34
Configuration Procedure················································································································1-34
Configuration Example ··················································································································1-35
Configuring No Agreement Check ········································································································1-36
Configuration Prerequisites ···········································································································1-37
Configuration Procedure················································································································1-37
Configuration Example ··················································································································1-38
Configuring Protection Functions··········································································································1-38
Configuration prerequisites ···········································································································1-39
Enabling BPDU Guard···················································································································1-39
Enabling Root Guard ·····················································································································1-40
Enabling Loop Guard·····················································································································1-40
Enabling TC-BPDU Guard·············································································································1-41
Displaying and Maintaining MSTP ········································································································1-42
MSTP Configuration Example···············································································································1-42