Configuring Source Protocol Filtering - 3Com SuperStack II PathBuilder S330 Reference Manual

Wan access switches
Hide thumbs Also See for SuperStack II PathBuilder S330:
Table of Contents

Advertisement

104
C
4: C
HAPTER
ONFIGURING
P
B
S330/S310 M
ATH
UILDER
ODULES
To configure the spanning tree:
1 From the Bridge menu, select [2] Spanning Tree Configuration to open the
Spanning Tree Configuration menu, shown in Figure 94.
Figure 94 Spanning Tree Configuration Menu
2 Set the following spanning tree parameters:
Spanning Tree Operation — Enables or disables the spanning tree.
Bridge Priority — The value of the write-able portion of the bridge ID (the first
two octets of the eight-octet bridge ID). The Bridge Priority is a hex value in the
range 0..FFFF). The other (last) six octets of the bridge ID are given by the value of
dot1dBaseBridge Address.
Hello Timer — The time interval between issuing Spanning Tree Protocol
configuration messages (1-10 seconds).
Forward Delay Timer — The amount of time in the "learning" and "listening"
states. In other words, half the amount of time that must elapse between the time
when it is decided that a port should become part of the spanning tree and the
time when data traffic is allowed to be forwarded to and from that port (4 to 30
seconds).
Max Age Timer — The maximum age of Spanning Tree Protocol information
learned from the network on any port before it is discarded (6 to 40 seconds).
For further information on spanning tree and how it operates, see "Spanning
Tree" in Appendix B.
Configuring Source Protocol Filtering
Source protocol filtering allows the bridge to filter out packets with certain
protocols. You can use this type of filtering to prevent certain type of protocol
traffic from being bridged across the ATM network. Protocols such as IPX and
AppleTalk, for example, can be filtered on the sending end. This is useful in
restricting your local Novell network or AppleTalk data traffic from being
transmitted on long distance ATM links, thereby saving bandwidth and providing
security.
, P
,
A
ORTS
AND
PPLICATIONS

Advertisement

Table of Contents
loading

This manual is also suitable for:

Superstack ii pathbuilder s310

Table of Contents