HP 3100 Series Configuration Manual page 5

Table of Contents

Advertisement

Implementation of MSTP on devices ······································································································· 60
Protocols and standards ·································································································································· 60
Spanning tree configuration task list ················································································································ 61
Configuration restrictions and guidelines ································································································· 61
STP configuration task list ························································································································ 61
RSTP configuration task list ····················································································································· 62
PVST configuration task list ····················································································································· 63
MSTP configuration task list ····················································································································· 64
Setting the spanning tree mode ······················································································································· 65
Configuring an MST region ······························································································································ 65
Configuration restrictions and guidelines ································································································· 66
Configuration procedure ··························································································································· 66
Configuring the root bridge or a secondary root bridge ··················································································· 66
Configuration restrictions and guidelines ································································································· 67
Configuring the current device as the root bridge of a specific spanning tree ········································· 67
Configuring the current device as a secondary root bridge of a specific spanning tree ··························· 67
Configuring the device priority ························································································································· 68
Configuring the maximum hops of an MST region ··························································································· 68
Configuring the network diameter of a switched network ················································································ 69
Configuring spanning tree timers ····················································································································· 69
Configuration restrictions and guidelines ································································································· 70
Configuration procedure ··························································································································· 70
Configuring the timeout factor ·························································································································· 70
Configuring the maximum port rate ·················································································································· 71
Configuring edge ports ····································································································································· 71
Configuration restrictions and guidelines ································································································· 72
Configuration procedure ··························································································································· 72
Configuring path costs of ports ························································································································ 72
Specifying a standard for the device to use when it calculates the default path cost ······························ 72
Configuring path costs of ports ················································································································ 74
Configuration example ····························································································································· 74
Configuring the port priority ······························································································································ 75
Configuring the port link type ··························································································································· 75
Configuration restrictions and guidelines ································································································· 75
Configuration procedure ··························································································································· 76
Configuring the mode a port uses to recognize/send MSTP packets ······························································ 76
Enabling outputting port state transition information ························································································ 77
Enabling the spanning tree feature ·················································································································· 77
Configuration restrictions and guidelines ································································································· 77
Enabling the spanning tree feature (in STP/RSTP/MSTP mode) ···························································· 78
Enabling the spanning tree feature (in PVST mode) ················································································ 78
Performing mCheck ········································································································································· 79
Performing mCheck globally ···················································································································· 79
Performing mCheck in interface view ······································································································· 79
Configuring Digest Snooping ··························································································································· 79
Configuration restrictions and guidelines ································································································· 80
Configuration procedure ··························································································································· 80
Digest Snooping configuration example··································································································· 80
Configuring No Agreement Check ··················································································································· 81
Configuration prerequisites ······················································································································ 82
Configuration procedure ··························································································································· 82
No Agreement Check configuration example ··························································································· 83
Configuring TC snooping ································································································································· 83
Configuration restrictions and guidelines ································································································· 84
Configuration procedure ··························································································································· 84
Configuring protection functions ······················································································································ 84
Configuration prerequisites ······················································································································ 85
Enabling BPDU guard ······························································································································ 85
Enabling root guard ·································································································································· 86
Enabling loop guard ································································································································· 87
Enabling TC-BPDU guard ························································································································ 87
Enabling BPDU drop ································································································································ 88
iii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

Table of Contents