No Agreement Check Configuration Example; Configuring Tc Snooping - HP 5120 EI Series Lan Switching Configuration Manual

Hide thumbs Also See for 5120 EI Series:
Table of Contents

Advertisement

No Agreement Check configuration example

Network requirements
As shown in
Device A connects to a third-party device that has a different spanning tree implementation. Both
devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 26 Network diagram
Configuration procedure
# Enable No Agreement Check on GigabitEthernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface gigabitethernet 1/0/1
[DeviceA-GigabitEthernet1/0/1] stp no-agreement-check

Configuring TC snooping

Figure 27
shows a topology change (TC) snooping application scenario. Device A and Device B form an
IRF fabric and do not have the spanning tree feature enabled. The IRF fabric connects to two user
networks, in which all devices are enabled with the spanning tree feature. The user networks are
dual-uplinked to the IRF fabric for high availability. The IRF fabric transparently transmits BPDUs in every
user network.
Figure 27 TC snooping application scenario
Figure
26:
93

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

5500 ei series5500 si series

Table of Contents