Spanning Tree - Siemens SCALANCE W1780 Configuration Manual

Industrial wireless lan
Table of Contents

Advertisement

Technical basics

4.7 Spanning Tree

SNMPv3 supports:
● Fully encrypted user authentication
● Encryption of the entire data traffic
● Access control of the MIB objects at the user/group level
With the introduction of SNMPv3, you can no longer transfer user configurations to other
devices without taking special action, e.g. by loading a configuration file.
According to the standard, the SNMPv3 protocol uses a unique SNMP engine ID as an internal
identifier for an SNMP agent. This ID must be unique in the network. It is used to authenticate
access data of SNMPv3 users and to encrypt it.
Depending on whether you have enabled or disabled the "SNMPv3 User Migration" function,
the SNMP engine ID is generated differently.
Restriction when using the function
Use the "SNMPv3 User Migration" function only to transfer configured SNMPv3 users to a
substitute device when replacing a device.
Do not use the function to transfer configured SNMPv3 users to multiple devices. If you load a
configuration with created SNMPv3 users on several devices, these devices use the same
SNMP engine ID. If you use these devices in the same network, your configuration contradicts
the SNMP standard.
Compatibility with predecessor products
You can only transfer SNMPv3 users to a different device if you have created the users as
migratable users. To create a migratable user the "SNMPv3 User Migration" function must be
activated when you create the user.
4.7
Spanning Tree
Avoiding loops
The Spanning Tree algorithm detects redundant physical network structures and prevents the
formation of loops by disabling redundant paths. It evaluates the distance and performance of
a connection or bases the decisions on settings made by the user. Data is then exchanged only
over the remaining connection paths.
If the preferred data path fails, the Spanning Tree algorithm then searches for the most efficient
path possible with the remaining nodes.
Root bridge and bridge priority
The identification of the most efficient connection is always related to the root bridge, a network
component that can be considered as a root element of a tree-like network structure. With the
"Bridge Priority" parameter, you can influence the selection of the root bridge. The computer
with the lowest value set for this parameter automatically becomes the root bridge. If two
computers have the same priority value, the computer with the lower MAC address becomes
the root bridge.
40
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Scalance w1740Scalance w1780 seriesScalance w1740 seriesScalance w1788-2 m12 eecScalance w1788-1 m12Scalance w1788-2 m12 ... Show all

Table of Contents