MAC Information configuration ································································································································ 28
Overview ········································································································································································· 28
Introduction to MAC Information ························································································································· 28
How MAC Information works ······························································································································ 28
Configuring MAC Information ······································································································································ 28
Overview ········································································································································································· 31
Basic concepts ······················································································································································· 31
Configuring an aggregation group ····························································································································· 38
Configuration guidelines ······································································································································ 38
Port isolation configuration ········································································································································ 56
Introduction to port isolation ········································································································································· 56
Spanning tree configuration ······································································································································ 58
STP ··················································································································································································· 58
STP protocol packets ············································································································································· 58
Basic concepts in STP ············································································································································ 59
RSTP ················································································································································································· 65
PVST ················································································································································································· 66
MSTP ················································································································································································ 66
STP, RSTP, and PVST limitations ·························································································································· 66
ii