Configuring Tc Snooping - HP 3600 v2 series Configuration Manual

Hide thumbs Also See for 3600 v2 series:
Table of Contents

Advertisement

Device A connects to a third-party device that has a different spanning tree implementation. Both
devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 26 No Agreement Check configuration
Configuration procedure
2.
# Enable No Agreement Check on Ethernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ethernet 1/0/1
[DeviceA-Ethernet1/0/1] stp no-agreement-check

Configuring TC snooping

Figure 27
shows a topology change (TC) snooping application scenario. Device A and Device B form an
IRF fabric and do not have the spanning tree feature enabled. The IRF fabric connects to two user
networks, in which all devices are enabled with the spanning tree feature. The user networks are
dual-uplinked to the IRF fabric for high availability. The IRF fabric transparently transmits BPDUs in every
user network.
Figure 27 TC snooping application scenario
In the network, the IRF fabric transparently transmits the received BPDUs and does not participate in
spanning tree calculations. When a topology change occurs to the IRF fabric or user network networks,
the IRF fabric may need a long time to learn the correct MAC address table entries and ARP entries,
resulting in long network disruption. To avoid the network disruption, you can enable TC snooping on the
IRF fabric.
94

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents