No Agreement Check Configuration Example; Configuring Tc Snooping - H3C S3600V2 SERIES Layer 2-Lan Switching Configuration Manual

Hide thumbs Also See for S3600V2 SERIES:
Table of Contents

Advertisement

No Agreement Check configuration example

Network requirements
As shown in
Device A connects to a third-party device that has a different spanning tree implementation. Both
devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 28 Network diagram
Configuration procedure
# Enable No Agreement Check on Ethernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ethernet 1/0/1
[DeviceA-Ethernet1/0/1] stp no-agreement-check

Configuring TC snooping

Figure 29
shows a topology change (TC) snooping application scenario. Device A and Device B form an
IRF fabric and do not have the spanning tree feature enabled. The IRF fabric connects to two user
networks, in which all devices are enabled with the spanning tree feature. The user networks are
dual-uplinked to the IRF fabric for high availability. The IRF fabric transparently transmits BPDUs in every
user network.
Figure 29 TC snooping application scenario
Figure
28:
97

Advertisement

Table of Contents
loading

Table of Contents