Configuration Restrictions And Guidelines; Configuration Procedure; Configuring Protection Functions - HP 3100 Series Configuration Manual

Table of Contents

Advertisement

Figure 23 TC snooping application scenario
User network 1
In the network, Device transparently transmits the received BPDUs and does not participate in
spanning tree calculations. When a topology change occurs to user networks, Device may need a
long time to learn the correct MAC address table entries and ARP entries, resulting in long network
disruption. To avoid the network disruption, you can enable TC snooping on Device.
With TC snooping enabled, a device actively updates the MAC address table entries and ARP
entries upon receiving TC-BPDUs, so that the device can normally forward the user traffic.
For more information about MAC address table entries, see "Configuring the MAC address table."
For more information about ARP, see Layer 3—IP Services Configuration Guide.

Configuration restrictions and guidelines

TC snooping and STP are mutually exclusive. You must globally disable the spanning tree
feature before enable TC snooping.
TC snooping does not take effect on the ports on which BPDU tunneling is enabled for spanning
tree protocols. For more information about BPDU tunneling, see "Configuring BPDU tunneling."
TC snooping does not support PVST TC-BPDUs. As a result, TC snooping does not take effect
in a PVST network.

Configuration procedure

To configure TC snooping:
Step
Enter system view.
1.
Globally disable the
2.
spanning tree feature.
Enable TC snooping.
3.

Configuring protection functions

A spanning tree device supports the following protection functions:
Device
Command
system-view
undo stp enable
stp tc-snooping
84
User network 2
Description
N/A
By default, the spanning tree
feature is disabled globally.
Disabled by default.

Advertisement

Table of Contents
loading

Table of Contents