120
restart).
Port Configurations:
◆ Port – The switch port number of the port..
◆ Enable – Controls whether loop protection is enabled on this switch port.
◆ Action – Configures the action performed when a loop is detected on a port. Valid values
are Shutdown Port, Shutdown Port and Log or Log Only.
◆ Tx Mode – Controls whether the port is actively generating loop protection PDU's, or
whether it is just passively looking for looped PDU's.
WEB INTERFACE
To configure authentication for management access in the web interface:
1. Click Configuration, Loop Protection.
2. Configure the general settins and port configurations.
3. Click Save.
4.8. Spanning Tree
The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to
provide backup links between switches, bridges or routers. This allows the switch to interact
with other bridging devices (that is, an STA-compliant switch, bridge or router) in your
network to ensure that only one route exists between any two stations on the network, and
provide backup links which automatically take over when a primary link goes down.
The spanning tree algorithms supported by this switch include these versions:
◆ STP – Spanning Tree Protocol (IEEE 802.1D)
◆ RSTP – Rapid Spanning Tree Protocol (IEEE 802.1w)
◆ MSTP – Multiple Spanning Tree Protocol (IEEE 802.1s)
STP - STP uses a distributed algorithm to select a bridging device (STPcompliant switch,
bridge or router) that serves as the root of the spanning tree network. It selects a root port on
each bridging device (except for the root device) which incurs the lowest path cost when
forwarding a packet from that device to the root device. Then it selects a designated bridging
device from each LAN which incurs the lowest path cost when forwarding a packet from that
LAN to the root device. All ports connected to designated bridging devices are assigned as
designated ports. After determining the lowest cost spanning tree, it enables all root ports