Performing mCheck ························································································································································ 99
Configuration procedure ······································································································································ 99
Configuring Digest Snooping ····································································································································· 100
Configuration procedure ···································································································································· 101
Configuring No Agreement Check ···························································································································· 102
Configuration prerequisites ································································································································ 103
Configuration procedure ···································································································································· 103
Configuring protection functions ································································································································ 104
Enabling BPDU guard ········································································································································· 104
Enabling root guard ············································································································································ 105
Enabling loop guard ··········································································································································· 106
Enabling TC-BPDU guard···································································································································· 107
MSTP configuration example ····························································································································· 109
PVST configuration example ······························································································································ 112
Configuring loop detection ····································································································································· 116
Overview ······································································································································································· 116
Loop detection mechanism ································································································································· 116
Loop detection interval ········································································································································ 117
Loop protection actions ······································································································································· 117
Port status auto recovery ····································································································································· 118
Enabling loop detection ·············································································································································· 118
Network requirements ········································································································································· 120
Configuration procedure ···································································································································· 121
Verifying the configuration ································································································································· 122
Configuring VLANs ················································································································································· 124
Overview ······································································································································································· 124
VLAN frame encapsulation ································································································································ 124
Protocols and standards ····································································································································· 125
Configuring basic VLAN settings································································································································ 125
iv