No Agreement Check configuration example
Network requirements
As shown in
Device A connects to a third-party device that has a different spanning tree implementation. Both
•
devices are in the same region.
•
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 28 Network diagram
Configuration procedure
# Enable No Agreement Check on Ethernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ethernet 1/0/1
[DeviceA-Ethernet1/0/1] stp no-agreement-check
Configuring TC snooping
Figure 29
shows a topology change (TC) snooping application scenario. Device A and Device B form an
IRF fabric and do not have the spanning tree feature enabled. The IRF fabric connects to two user
networks, in which all devices are enabled with the spanning tree feature. The user networks are
dual-uplinked to the IRF fabric for high availability. The IRF fabric transparently transmits BPDUs in every
user network.
Figure 29 TC snooping application scenario
Figure
28:
97