EasyManua.ls Logo

HP V1910 Switch Series User Manual

HP V1910 Switch Series
470 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #198 background imageLoading...
Page #198 background image
184
A port state is not exclusively associated with a port role. Table 73 lists the port states supported by each
port role, where “” indicates that the port supports the state and “—” indicates that the port does not
support the state.
Table 73 Ports states supported by different port roles
Port role (ri
g
ht) Root
port/master
p
ort
Designated
port
Boundary
port
Alternate
port
Backup port
Port state (below)
Forwarding
Learning
Discarding
How MSTP works
MSTP divides an entire Layer 2 network into multiple MST regions, which are interconnected by a
calculated CST. Inside an MST region, multiple spanning trees, called MSITs, are calculated. Among
these MSTIs, MSTI 0 is the CIST.
Similar to STP, MSTP uses configuration BPDUs to calculate spanning trees. However, an important
difference is that an MSTP BPDU carries the MSTP configuration on the device from which this BPDU is
sent.
CIST calculation
The calculation of a CIST tree is also the process of configuration BPDU comparison. During this process,
the device with the highest priority is elected as the root bridge of the CIST. MSTP generates an IST within
each MST region through calculation, and, at the same time, MSTP regards each MST region as a single
device and generates a CST among these MST regions through calculation. The CST and ISTs constitute
the CIST of the entire network.
MSTI calculation
Within an MST region, MSTP generates different MSTIs for different VLANs based on the VLAN-to-MSTI
mappings. For each spanning tree, MSTP performs a separate calculation process similar to spanning
tree calculation in STP. For more information, see “How STP works.”
In MSTP, a VLAN packet is forwarded along the following paths:
Within an MST region, the packet is forwarded along the corresponding MSTI.
Between two MST regions, the packet is forwarded along the CST.
Implementation of MSTP on devices
MSTP is compatible with STP and RSTP. STP and RSTP protocol packets can be recognized by devices
running MSTP and used for spanning tree calculation.
In addition to basic MSTP functions, the following functions are provided for ease of management:
Root bridge hold
Root bridge backup
Root guard
BPDU guard
Loop guard

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP V1910 Switch Series and is the answer not in the manual?

HP V1910 Switch Series Specifications

General IconGeneral
Product SeriesV1910
VLAN SupportYes
QoSYes
Ports8, 24, or 48 10/100/1000 ports
MAC Address Table Size8K entries
Power SupplyInternal power supply
Jumbo Frame SupportYes
Operating Humidity10% to 90% (non-condensing)

Summary

Configuration through the web interface

Default login information

Provides the default username and password for accessing the web interface.

Configuration at the CLI

Getting started with the CLI

Introduces using the Command Line Interface for device management.

Device maintenance

Software upgrade

Describes the process of upgrading the system software.

Port management configuration

Configuring a port

Guides through setting port operation parameters.

User management

Configuring users

Describes adding and managing local user accounts and groups.

SNMP configuration

Enabling SNMP

Guides on enabling and configuring SNMP settings.

VLAN configuration

Creating VLANs

Details the process of creating new VLANs.

MAC address configuration

MSTP configuration

Link aggregation and LACP configuration

Configuring link aggregation and LACP

Guides on setting up link aggregation and LACP.

DHCP overview

DHCP snooping configuration

Functions of DHCP snooping

Lists recording IP-to-MAC and ensuring authorized servers.

Diagnostic tools

Ping

Explains the ping command for verifying reachability.

Trace route

Describes the trace route command for tracing IP packets.

ARP management

ARP attack defense configuration

ARP detection

Introduces ARP detection to prevent man-in-the-middle attacks.

802.1X configuration

Configuring 802.1X globally

Guides on enabling and configuring 802.1X authentication globally.

AAA configuration

Introduction to AAA

Introduces Authentication, Authorization, and Accounting.

RADIUS configuration

Users

PKI configuration

ACL configuration

QoS configuration

PoE configuration

Related product manuals