8
3.7.3. VLAN-based Mirroring ...................................................................................................................................... 87
3.7.4. Flow-based Mirroring ....................................................................................................................................... 87
3.8. Spanning Tree Protocol .......................................................................................................... 88
3.8.1. Classic STP, Multiple STP, and Rapdi STP .......................................................................................................... 88
3.8.2. STP Operation ................................................................................................................................................... 88
3.8.3. MSTP in the Network ........................................................................................................................................ 89
3.8.4. Optional STP Features ...................................................................................................................................... 92
3.8.4.1. BPDU Flooding .............................................................................................................................................. 92
3.8.4.2. Edge Port ...................................................................................................................................................... 92
3.8.4.3. PDU Filtering ................................................................................................................................................. 92
3.8.4.4. Root Guard ................................................................................................................................................... 93
3.8.4.5. Loop Guard ................................................................................................................................................... 93
3.8.4.6. BPDU Protection ........................................................................................................................................... 93
3.8.5. STP Configuring Examples ................................................................................................................................ 94
3.8.5.1. Configuring STP ............................................................................................................................................ 94
3.8.5.2. Configuring MSTP ......................................................................................................................................... 95
3.9. IGMP Snooping ...................................................................................................................... 97
3.9.1. IGMP Snooping Querier .................................................................................................................................... 97
3.9.2. Configuring IGMP Snooping ............................................................................................................................. 97
3.9.3. IGMPv3/SSM Snooping ................................................................................................................................... 100
3.10. MLD Snooping .................................................................................................. 101
3.10.1. MLD Snooping Configuration Example ........................................................................................................... 101
3.10.1.1. MLD Snooping Configuration Example ....................................................................................................... 102
3.10.1.2. MLD Snooping Verification Example .......................................................................................................... 103
3.10.2. MLD Snooping First Leave Configuration Example ......................................................................................... 103
3.10.2.1. MLD Snooping Configuration...................................................................................................................... 104
3.10.3. MLD Snooping Querier Configuration Example .............................................................................................. 104
3.11. LLDP and LLDP-MED ......................................................................................... 106
3.11.1. LLDP and Data Center Application .................................................................................................................. 106
3.11.2. Configuring LLDP ............................................................................................................................................ 106
3.12. sFlow ................................................................................................................. 108
3.12.1. sFlow Sampling ............................................................................................................................................... 109
3.12.1.1. Packet Flow Sampling ................................................................................................................................. 110
3.12.1.2. Counter Sampling ....................................................................................................................................... 110
3.12.2. Configuring sFlow ........................................................................................................................................... 110
3.13. Link Dependency .............................................................................................. 112