No Agreement Check Configuration Example; Configuring Tc Snooping - HP 6125XLG Configuration Manual

Blade switch layer 2 lan switching
Table of Contents

Advertisement

No Agreement Check configuration example

Network requirements
As shown in
Device A connects to a third-party device that has a different spanning tree implementation. Both
devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 29 Network diagram
XGE1/1/5
Device A
Root port
Configuration procedure
# Enable No Agreement Check on Ten-GigabitEthernet 1/1/5 of Device A.
<DeviceA> system-view
[DeviceA] interface ten-gigabitethernet 1/1/5
[DeviceA-Ten-GigabitEthernet1/1/5] stp no-agreement-check

Configuring TC Snooping

As shown in
Device A and Device B form an IRF fabric.
The spanning tree feature is disabled on Device A and Device B and enabled on all devices in user
network 1 and user network 2.
User network 1 and user network 2 are connected to the IRF fabric through double links.
The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.
When the network topology changes, it takes time for the IRF fabric to update its MAC address table and
ARP table. During this period, traffic in the network might be interrupted.
Figure
29:
XGE1/1/5
Designated port
Figure
30:
Root bridge
Device B
111

Advertisement

Table of Contents
loading

Table of Contents