EasyManua.ls Logo

HP 3100 Series

HP 3100 Series
225 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
iii
Implementation of MSTP on devices ······································································································· 60
Protocols and standards ·································································································································· 60
Spanning tree configuration task list ················································································································ 61
Configuration restrictions and guidelines ································································································· 61
STP configuration task list ························································································································ 61
RSTP configuration task list ····················································································································· 62
PVST configuration task list ····················································································································· 63
MSTP configuration task list ····················································································································· 64
Setting the spanning tree mode ······················································································································· 65
Configuring an MST region ······························································································································ 65
Configuration restrictions and guidelines ································································································· 66
Configuration procedure ··························································································································· 66
Configuring the root bridge or a secondary root bridge ··················································································· 66
Configuration restrictions and guidelines ································································································· 67
Configuring the current device as the root bridge of a specific spanning tree ········································· 67
Configuring the current device as a secondary root bridge of a specific spanning tree ··························· 67
Configuring the device priority ························································································································· 68
Configuring the maximum hops of an MST region ··························································································· 68
Configuring the network diameter of a switched network ················································································ 69
Configuring spanning tree timers ····················································································································· 69
Configuration restrictions and guidelines ································································································· 70
Configuration procedure ··························································································································· 70
Configuring the timeout factor ·························································································································· 70
Configuring the maximum port rate ·················································································································· 71
Configuring edge ports ····································································································································· 71
Configuration restrictions and guidelines ································································································· 72
Configuration procedure ··························································································································· 72
Configuring path costs of ports ························································································································ 72
Specifying a standard for the device to use when it calculates the default path cost ······························ 72
Configuring path costs of ports ················································································································ 74
Configuration example ····························································································································· 74
Configuring the port priority ······························································································································ 75
Configuring the port link type ··························································································································· 75
Configuration restrictions and guidelines ································································································· 75
Configuration procedure ··························································································································· 76
Configuring the mode a port uses to recognize/send MSTP packets ······························································ 76
Enabling outputting port state transition information ························································································ 77
Enabling the spanning tree feature ·················································································································· 77
Configuration restrictions and guidelines ································································································· 77
Enabling the spanning tree feature (in STP/RSTP/MSTP mode) ···························································· 78
Enabling the spanning tree feature (in PVST mode) ················································································ 78
Performing mCheck ········································································································································· 79
Performing mCheck globally ···················································································································· 79
Performing mCheck in interface view ······································································································· 79
Configuring Digest Snooping ··························································································································· 79
Configuration restrictions and guidelines ································································································· 80
Configuration procedure ··························································································································· 80
Digest Snooping configuration example··································································································· 80
Configuring No Agreement Check ··················································································································· 81
Configuration prerequisites ······················································································································ 82
Configuration procedure ··························································································································· 82
No Agreement Check configuration example ··························································································· 83
Configuring TC snooping ································································································································· 83
Configuration restrictions and guidelines ································································································· 84
Configuration procedure ··························································································································· 84
Configuring protection functions ······················································································································ 84
Configuration prerequisites ······················································································································ 85
Enabling BPDU guard ······························································································································ 85
Enabling root guard ·································································································································· 86
Enabling loop guard ································································································································· 87
Enabling TC-BPDU guard ························································································································ 87
Enabling BPDU drop ································································································································ 88

Table of Contents

Related product manuals