Page 2
The information in this document is subject to change without notice. All contents in this document, including statements, information, and recommendations, are believed to be accurate, but they are presented without warranty of any kind, express or implied. H3C shall not be liable for technical or editorial errors or omissions contained herein.
Preface The H3C WX3000E documentation set includes eight configuration guides, which describe the software features for the H3C WX3000E Series Wireless Switches Switching Engine and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
GUI conventions Convention Description Window names, button names, field names, and menu items are in Boldface. For Boldface example, the New User window appears; click OK. > Multi-level menus are separated by angle brackets. For example, File > Create > Folder. Symbols Convention Description...
Contents Ethernet interface configuration ·································································································································· 1 Ethernet interface naming conventions ··························································································································· 1 Configuring basic settings of an Ethernet interface ······································································································· 1 Configuring Duplex Mode and Speed on an Ethernet Interface ········································································· 1 Setting speed options for auto negotiation on an Ethernet interface ·································································· 2 ...
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
To do… Use the command… Remarks interface-type interface Enter Ethernet interface view — interface-number Optional By default, the description of an interface is text Set the interface description description interface-name in the format of Interface. For example, GigabitEthernet1/0/1 Interface. Optional Set the duplex mode of the By default, the duplex mode is auto.
To avoid congestion on GigabitEthernet 1/4, set 100 Mbps as the only option available for speed negotiation on port GigabitEthernet 1/1, GigabitEthernet 1/2, and GigabitEthernet 1/3. As a result, the transmission rate on each port connected to a server is limited to 100 Mbps. Follow these steps to set speed options for auto negotiation on an Ethernet interface: To do…...
To do… Use the command… Remarks Enter system view system-view — interface-type interface Enter Ethernet interface view — interface-number Required Set a physical state change delay-time link-delay By default, physical state change suppression suppression interval is disabled. Configuring loopback testing on an Ethernet interface If an Ethernet interface does not work normally, you can enable loopback testing on it to identify the problem.
Even though the settings are made on the port group, they are saved on an interface basis rather than on a port group basis. You can only view the settings in the view of each interface by use the display current-configuration or display this command.
NOTE: When you want to perform storm control for different type of packets, you can configure a suppression threshold ratio or use the storm-constrain command to configure storm control for each type of packets. However, when you want to perform storm control for the same type of packets, you cannot use the two methods at the same time;...
Page 13
Shuts down automatically. The interface shuts down automatically and stops forwarding any traffic. • When the blocked traffic is detected dropping below the lower threshold, the port does not forward the traffic. To bring up the interface, use the undo shutdown command or disable the storm control function.
Setting the statistics polling interval Follow these steps to set the statistics polling interval globally or on an Ethernet interface: To do… Use the command… Remarks Enter system view system-view — interface-type interface Enter Ethernet interface view — interface-number Optional interval Set the statistics polling interval flow-interval...
Page 15
Figure 2 Single-port loopback Figure 3 Multi-port loopback You can enable loopback detection to detect loops on an interface and, if the interface supports the loopback-detection action command, configure the protective action to take on the receiving interface when a loop is detected, for example, to shut down the interface. Depending on whether a protective action is configured, the device takes the actions in Table 1 to alleviate the impact of the loop condition.
Page 16
To do… Use the command… Remarks Required Enable global loopback detection loopback-detection enable Disabled by default. Optional By default, multi-port loopback Enable multi-port loopback loopback-detection detection is disabled, and the detection multi-port-mode enable device can only detect single-port loopback. Optional loopback-detection interval-time Set the loopback detection interval time...
Setting the MDI mode of an Ethernet interface NOTE: Fiber interfaces do not support the MDI mode setting. You can use both crossover and straight-through Ethernet cables to connect copper Ethernet interfaces. To accommodate these two types of cables, a copper Ethernet interface can operate in one of the following Medium Dependent Interface (MDI) modes: •...
To do… Use the command… Remarks Enter system view system-view — interface-type interface Enter Ethernet interface view — interface-number Required Enable bridging on the Ethernet port bridge enable interface Disabled by default. Testing the cable connection of an Ethernet interface NOTE: •...
Page 19
To do… Use the command… Remarks interface-type Clear the interface or reset counters interface [ Available in user interface-number subinterface statistics view...
Page 20
Contents Loopback and null interface configuration ················································································································· 1 Configuring a loopback interface ··································································································································· 1 Introduction to the loopback interface···················································································································· 1 Configuration procedure ········································································································································· 1 Configuring the null interface ·········································································································································· 2 Introduction to the null interface ······························································································································ 2 ...
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
To do… Use the command… Remarks Enter system view system-view — Create a loopback interface and interface loopback — interface-number enter loopback interface view Optional text Set the interface description description By default, the description of a loopback interface name interface is Interface.
Displaying and maintaining loopback and null interfaces To do… Use the command… Remarks display interface loopback [ brief [ down ] ] [ | { begin | exclude | regular-expression include } Display information about loopback Available in any view interfaces display interface loopback interface-number...
Page 24
Contents MAC address table configuration ······························································································································ 1 Overview ············································································································································································ 1 How a MAC address table entry is created ·········································································································· 1 Types of MAC address table entries ······················································································································ 2 MAC address table-based frame forwarding ······································································································· 2 Configuring the MAC address table ·······························································································································...
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • • The port numbers in this chapter are for illustration only.
The device performs the learning process each time it receives a frame from an unknown source MAC address, until the MAC address table is fully populated. Manually configuring MAC address entries With dynamic MAC address learning, a device does not distinguish between illegitimate and legitimate frames, which can invite security hazards.
Configuring static, dynamic, and blackhole MAC address table entries To fence off MAC address spoofing attacks and improve port security, you can manually add MAC address table entries to bind ports with MAC addresses. You can also configure blackhole MAC address entries to filter out packets with certain source or destination MAC addresses.
To do… Use the command… Remarks Optional seconds Configure the aging timer for mac-address timer { aging 300 seconds by default. dynamic MAC address entries | no-aging } The no-aging keyword disables the aging timer. You can reduce broadcasts on a stable network by disabling the aging timer to prevent dynamic entries from unnecessarily aging out.
Configuring a static multicast MAC address entry in interface view Follow these steps to configure static multicast MAC address entries in interface view To do... Use the command... Remarks Enter system view system-view — Enter Ethernet interface/Layer 2 Required aggregate interface view In Ethernet interface view or Layer interface-type interface...
MAC address table configuration example Network requirements The MAC address of Host A is 000f-e235-dc71 and belongs to VLAN 1. It is connected to • GigabitEthernet 1/0/1 of the device. To prevent MAC address spoofing, add a static entry for the host in the MAC address table of the device.
Page 31
Contents Ethernet link aggregation configuration ····················································································································· 1 Overview ············································································································································································ 1 Basic concepts ·························································································································································· 1 Aggregating links in static mode ···························································································································· 4 Aggregating links in dynamic mode ······················································································································ 5 Load sharing criteria for link aggregation groups ································································································ 7 ...
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
Page 33
NOTE: The rate of an aggregate interface equals the total rate of its member ports in the Selected state, and its duplex mode is the same as the selected member ports. For more information about the states of member ports in an aggregation group, see “Aggregation states of member ports in an aggregation group.”...
Class-one configurations do not affect the aggregation state of the member port even if they are • different from those on the aggregate interface. GVRP and MSTP settings are examples of class-one configurations. NOTE: The class-one configuration for a member port is effective only when the member port leaves the aggregation group.
LACP timeout interval The LACP timeout interval specifies how long a member port waits to receive LACPDUs from the peer port. If a local member port fails to receive LACPDUs from the peer within three times the LACP timeout interval, the member port assumes that the peer port has failed.
The one at the top is selected as the reference port. If two ports have the same aggregation priority, duplex mode, and speed, the one with the lower port number wins out. Setting the aggregation state of each member port After selecting the reference port, the static aggregation group sets the aggregation state of each member port, as shown in Figure...
Selecting a reference port The local system (the actor) and the remote system (the partner) negotiate a reference port using the following workflow: Compare the system ID (comprising the system LACP priority and the system MAC address). The system with the lower LACP priority value wins out. If they are the same, compare the system MAC addresses.
NOTE: To ensure stable aggregation state and service continuity, do not change port attributes or class-two • configurations on any member port. In a dynamic aggregation group, when the aggregation state of a local port changes, the • aggregation state of the peer port also changes. •...
Table 5 Features incompatible with Layer 2 aggregation groups Feature Reference Security Configuration Guide MAC authentication MAC authentication in the Security Configuration Guide Port security Port security in the Security Configuration Guide IP source guard IP source guard in the Security Configuration Guide 802.1X 802.1X in the...
Configuring a dynamic aggregation group NOTE: To guarantee a successful dynamic aggregation, make sure that the peer ports of the ports aggregated at one end are also aggregated. The two ends can automatically negotiate the aggregation state of each member port. Follow these steps to configure a Layer 2 dynamic aggregation group: To do...
Configuring an aggregate interface NOTE: In addition to the preceding configurations, most of the configurations that can be performed on Ethernet interfaces can also be performed on aggregate interfaces. Configuring the description of an aggregate interface You can configure the description of an aggregate interface for administration purposes such as describing the purpose of the interface.
Shutting down an aggregate interface Shutting down or bringing up an aggregate interface affects the aggregation state and link state of ports in the corresponding aggregation group in the following ways: • When an aggregate interface is shut down, all Selected ports in the corresponding aggregation group become unselected and their link state becomes down.
Displaying and maintaining Ethernet link aggregation To do... Use the command... Remarks display interface bridge-aggregation [ brief [ down ] ] [ | { begin | exclude | include } regular-expression Display information for an Available in any view aggregate interface display interface bridge-aggregation interface-number [ brief ] [ | { begin | exclude |...
Configure a Layer 2 static aggregation group on Device A and Device B respectively, and enable • VLAN 10 at one end of the aggregate link to communicate with VLAN 10 at the other end, and VLAN 20 at one end to communicate with VLAN 20 at the other end. •...
NOTE: This configuration will be automatically synchronized to all member ports in aggregation group 1. [DeviceA] interface bridge-aggregation 1 [DeviceA-Bridge-Aggregation1] port link-type trunk [DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20 Please wait... Done. Configuring GigabitEthernet1/0/1... Done. Configuring GigabitEthernet1/0/2... Done. Configuring GigabitEthernet1/0/3... Done. [DeviceA-Bridge-Aggregation1] quit # Configure Device A to use the source and destination MAC addresses of packets as the global link-aggregation load sharing criteria.
Page 46
Device A and Device B are connected through their respective Layer 2 Ethernet interfaces • GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3. Configure a Layer 2 dynamic aggregation group on Device A and Device B respectively, enable • VLAN 10 at one end of the aggregate link to communicate with VLAN 10 at the other end, and VLAN 20 at one end to communicate with VLAN 20 at the other end.
Page 47
[DeviceA] interface gigabitethernet 1/0/3 [DeviceA-GigabitEthernet1/0/3] port link-aggregation group 1 [DeviceA-GigabitEthernet1/0/3] quit # Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to VLANs 10 and 20. [DeviceA] interface bridge-aggregation 1 [DeviceA-Bridge-Aggregation1] port link-type trunk [DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20 Please wait...
Page 48
Contents Port isolation configuration ·········································································································································· 1 Introduction to port isolation ············································································································································ 1 Configuring an isolation group ······································································································································· 1 Adding a port to an isolation group ······················································································································ 1 Displaying and maintaining isolation groups ················································································································ 2 Port isolation configuration example······························································································································· 2 ...
VLAN resource demanding. To save VLAN resources, you can use the port isolation feature, which can isolate ports without using VLANs and allows for great flexibility and security. The switching engine on the WX3000E series wireless switches supports multiple isolation groups which can be configured manually.
To do… Use the command… Remarks Enter Required interface-type Ethernet interface Use one of the commands. interface-number interface • In Ethernet interface view, the view subsequent configurations apply to the Enter Layer 2 current port Enter interface aggregate interface bridge-aggregation •...
Page 51
Figure 1 Networking diagram for port isolation configuration Configuration procedure # Create isolation group 2. <Device> system-view [Device] port-isolate group 2 # Assign GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 to isolation group 2 as isolated ports. [Device] interface gigabitethernet 1/0/1 [Device-GigabitEthernet1/0/1] port-isolate enable group 2 [Device-GigabitEthernet1/0/1] quit [Device] interface gigabitethernet 1/0/2...
Page 52
Contents Spanning tree configuration ········································································································································ 1 STP ······················································································································································································ 1 STP protocol packets ················································································································································ 1 Basic concepts in STP ··············································································································································· 2 Calculation process of the STP algorithm ·············································································································· 3 RSTP ···················································································································································································· 8 MSTP ··················································································································································································· 9 ...
• The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • • The port numbers in this chapter are for illustration only.
Configuration BPDUs, used for calculating a spanning tree and maintaining the spanning tree • topology. Topology change notification (TCN) BPDUs, which notify network devices of network topology • changes. A configuration BPDU contains the following information for network devices to complete spanning tree calculation.
Figure 1 Schematic diagram of designated bridges and designated ports Path cost Path cost is a reference value used for link selection in STP. STP calculates path costs to select the most robust links and block redundant links that are less robust, to prune the network into a loop-free tree. Calculation process of the STP algorithm The STP algorithm uses the following calculation process: Initial state...
Page 56
Step Description The device compares the calculated configuration BPDU with the configuration BPDU on the port whose port role is to be determined: • If the calculated configuration BPDU is superior, the device considers this port as the designated port, replaces the configuration BPDU on the port with the calculated configuration BPDU, and periodically sends out the calculated configuration BPDU.
Page 57
Figure 2 Network diagram for the STP algorithm As shown in Figure 2, the priority values of Device A, Device B, and Device C are 0, 1, and 2, and the path costs of links among the three devices are 5, 10, and 4 respectively. Initial state of each device Table 4 Initial state of each device Device...
Page 58
Table 5 Comparison process and result on each device Configuration BPDU Device Comparison process on ports after comparison • Port A1 receives the configuration BPDU of Port B1 {1, 0, 1, Port B1}, finds that its existing configuration BPDU {0, 0, 0, Port A1} is superior to the received configuration BPDU, and discards the received one.
Configuration BPDU Device Comparison process on ports after comparison • Port C2 receives the updated configuration BPDU of Port B2 {0, 5, 1, Port B2}, finds that the received configuration BPDU is superior to its • Port C1: {0, 0, 0, existing configuration BPDU {0, 10, 2, Port C2}, and updates its Port A2} configuration BPDU.
Upon network initiation, every device regards itself as the root bridge, generates configuration • BPDUs with itself as the root, and sends the configuration BPDUs at a regular hello interval. If it is the root port that received a configuration BPDU and the received configuration BPDU is •...
MSTP STP and RSTP limitations STP does not support rapid state transition of ports. A newly elected port must wait twice the forward delay time before transiting to the forwarding state, even if it connects to a point-to-point link or is an edge port.
Same VLAN-to-instance mapping configuration • • Same MSTP revision level Physically linked together • Multiple MST regions can exist in a switched network. You can assign multiple devices to the same MST region. In Figure 4, the switched network comprises four MST regions, MST region 1 through MST region 4, and all devices in each MST region have the same MST region configuration.
Port roles A port can play different roles in different MSTIs. As shown in Figure 6, an MST region comprises Device A, Device B, Device C, and Device D. Port A1 and port A2 of Device A connect to the common root bridge.
Forwarding: the port receives and sends BPDUs, learns MAC addresses, and forwards user traffic. • • Learning: the port receives and sends BPDUs, and learns MAC addresses, but does not forward user traffic. Learning is an intermediate port state. Discarding: the port receives and sends BPDUs, but does not learn MAC addresses or forward user •...
Implementation of MSTP on devices MSTP is compatible with STP and RSTP. STP and RSTP protocol packets can be recognized by devices running MSTP and used for spanning tree calculation. In addition to basic MSTP functions, the following functions are provided for ease of management: Root bridge hold •...
Page 67
Task Remarks Configuring the mode a port uses to recognize/send Optional MSTP packets Enabling the output of port state transition information Optional Enabling the spanning tree feature Required Optional Setting the spanning tree mode By default, the device works in MSTP mode. Configuring an MST region Required Configuring the device priority...
NOTE: If GVRP and a spanning tree protocol are enabled on a device at the same time, GVRP packets are • forwarded along the CIST. To advertise a certain VLAN within the network through GVRP, make sure that this VLAN is mapped to the CIST when you configure the VLAN-to-instance mapping table. For more information about GVRP, see the chapter “GVRP configuration.”...
Configuring an MST region Follow these steps to configure an MST region: To do... Use the command... Remarks Enter system view system-view — Enter MST region view stp region-configuration — Optional name Configure the MST region name region-name The MST region name is the MAC address by default.
A spanning tree can have one root bridge only. If two or more devices are selected as the root bridge in a spanning tree at the same time, the device with the lowest MAC address wins out. When the root bridge of an instance fails or is shut down, the secondary root bridge (if you have specified one) can take over the role of the primary root bridge.
CAUTION: After configuring a device as the root bridge or a secondary root bridge, you cannot change the • priority of the device. During root bridge selection, if all devices in a spanning tree have the same priority, the one with the •...
Max age ƒ 2 × (hello time + 1 second) H3C does not recommend you to manually set the spanning tree timers. Instead, you can specify the network diameter and let spanning tree protocols automatically calculate the timers based on the network diameter.
If the forward delay timer is too short, temporary redundant paths may be introduced. If the forward delay timer is too long, it may take a long time for the network to converge. H3C recommends you to use the default setting.
By setting an appropriate maximum port rate, you can limit the rate at which the port sends BPDUs and prevent spanning tree protocols from using excessive network resources when the network becomes instable. H3C recommends you to use the default setting. Configuring edge ports If a port directly connects to a user terminal rather than another device or a shared LAN segment, this port is regarded as an edge port.
Configuring path costs of ports Path cost is a parameter related to the rate of a port. On a spanning tree device, a port can have different path costs in different MSTIs. Setting appropriate path costs allows VLAN traffic flows to be forwarded along different physical links, achieving VLAN-based load balancing.
Page 76
Path cost Link speed Port type IEEE IEEE 802.1t Private standard 802.1d-1998 Aggregate interface 500,000 1,400 containing 4 Selected ports Single Port 200,000 Aggregate interface 100,000 containing 2 Selected ports 100 Mbps Aggregate interface 66,666 containing 3 Selected ports Aggregate interface 50,000 containing 4 Selected ports Single Port...
NOTE: When the path cost of a port changes, the system re-calculates the role of the port and initiates a state transition. Configuration example # In MSTP mode, specify the device to calculate the default path costs of its ports by using IEEE 802.1d- 1 998.
You can configure the link type as point-to-point for a Layer 2 aggregate interface or a port that • works in full duplex mode. H3C recommends you to use the default setting and let the device to automatically detect the port link type.
To do... Use the command... Remarks Enter Ethernet interface view or Layer 2 aggregate interface view interface-type interface Required Enter interface view or port group interface-number view Use either command. Enter port group view port-group-name port-group manual Required Configure the mode the port uses stp compliance { auto | dot1s | legacy } to recognize/send MSTP packets auto by default.
To do... Use the command... Remarks Enter Ethernet interface view or Layer 2 aggregate interface view interface-type interface Required Enter interface view or port group interface-number view Use either command. Enter port group view port-group manual port-group-name Optional Enable the spanning tree feature Enabling the spanning tree feature stp enable for the port or group of ports...
NOTE: An mCheck operation takes effect on a device that operates in MSTP, or RSTP mode. Configuring the VLAN Ignore feature Traffic of a VLAN on a complex network may be blocked by the spanning tree. Figure 7 VLAN connectivity blocked by MSTP As shown in Figure Port A1 on Device A allows the traffic of VLAN 1 to pass through, and Port A2 allows the traffic of...
Before enabling Digest Snooping, ensure that associated devices of different vendors are connected and run spanning tree protocols. Configuring the Digest Snooping feature You can enable Digest Snooping only on the H3C device that is connected to a third-party device that uses its private key to calculate the configuration digest.
To prevent loops, do not enable Digest Snooping on MST region edge ports. • H3C recommends you to enable Digest Snooping first and then the spanning tree feature. To avoid • traffic interruption, do not configure Digest Snooping when the network is already working well.
Figure 9 Digest Snooping configuration Configuration procedure # Enable Digest Snooping on GigabitEthernet 1/0/1 of Device A and enable global Digest Snooping on Device A. <DeviceA> system-view [DeviceA] interface gigabitethernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] stp config-digest-snooping [DeviceA-GigabitEthernet1/0/1] quit [DeviceA] stp config-digest-snooping # Enable Digest Snooping on GigabitEthernet 1/0/1 of Device B and enable global Digest Snooping on Device B.
Figure 10 Rapid state transition of an MSTP designated port Figure 1 1 shows rapid state transition of an RSTP designated port. Figure 11 Rapid state transition of an RSTP designated port If the upstream device is a third-party device, the rapid state transition implementation may be limited. For example, when the upstream device uses a rapid transition mechanism similar to that of RSTP, and the downstream device adopts MSTP and does not work in RSTP mode, the root port on the downstream device receives no agreement packet from the upstream device and sends no agreement packets to the...
To do... Use the command... Remarks Enter system view system-view — Enter Ethernet interface view or Layer 2 aggregate interface view Required interface-type interface-number interface Enter interface or port group view Use either command. Enter port group view port-group-name port-group manual Required Enable No Agreement Check stp no-agreement-check...
Enabling BPDU guard For access layer devices, the access ports can directly connect to the user terminals (such as PCs) or file servers. The access ports are configured as edge ports to allow rapid transition. When these ports receive configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new spanning tree calculation process.
To do... Use the command... Remarks Enter Ethernet interface view or Layer 2 aggregate interface view Required Enter interface view or port group interface-type interface-number interface view Use either command. Enter port group view port-group-name port-group manual Required Enable the root guard function for stp root-protection the port(s) Disabled by default.
6 by default. time NOTE: H3C does not recommend you disable this feature. Enabling BPDU drop In a spanning tree network, after receiving BPDUs, the device performs STP calculation according to the received BPDUs and forwards received BPDUs to other devices in the network. This allows malicious attackers to forge BPDUs to attack the network: By continuously sending forged BPDUs, they can make all the devices in the network perform STP calculations all the time.
To do... Use the command... Remarks display stp bpdu-statistics [ interface interface-type interface-number [ instance Display BPDU statistics on ports Available in any view instance-id ] ] [ | { begin | exclude | regular-expression include } Display information about ports shut display stp down-port [ | { begin | down by spanning tree protection Available in any view...
Page 91
Figure 13 Network diagram for MSTP configuration MST region Device A Device B Permit: all VLAN GE1/0/3 GE1/0/3 Permit: VLAN 10, 20 Permit: VLAN 20, 30 GE1/0/3 GE1/0/3 Permit: VLAN 20, 40 Device C Device D Configuration procedure VLAN and VLAN member port configuration (details not shown) Create VLAN 10, VLAN 20, and VLAN 30 on Device A and Device B respectively, VLAN 10, VLAN 20, and VLAN 40 on Device C, and VLAN 20, VLAN 30, and VLAN 40 on Device D.
Page 92
[DeviceB-mst-region] region-name example [DeviceB-mst-region] instance 1 vlan 10 [DeviceB-mst-region] instance 3 vlan 30 [DeviceB-mst-region] instance 4 vlan 40 [DeviceB-mst-region] revision-level 0 # Activate MST region configuration. [DeviceB-mst-region] active region-configuration [DeviceB-mst-region] quit # Specify the current device as the root bridge of MSTI 3. [DeviceB] stp instance 3 root primary # Enable the spanning tree feature globally.
Page 93
[DeviceD] stp enable Verification You can use the display stp brief command to display brief spanning tree information on each device after the network is stable. # Display brief spanning tree information on Device A. [DeviceA] display stp brief MSTID Port Role STP State...
Page 94
Figure 14 MSTIs mapped to different VLANs...
• The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
A VLAN is logically divided on an organizational basis rather than on a physical basis. For example, all workstations and servers used by a particular workgroup can be assigned to the same VLAN, regardless of their physical locations. VLAN technology delivers the following benefits: Confining broadcast traffic within individual VLANs.
NOTE: The Ethernet II encapsulation format is used here. Besides the Ethernet II encapsulation format, • Ethernet also supports other encapsulation formats, including 802.2 LLC, 802.2 SNAP, and 802.3 raw. The VLAN tag fields are added to frames encapsulated in these formats for VLAN identification. For a frame with multiple VLAN tags, the device handles it according to its outer-most VLAN tag and •...
NOTE: As the default VLAN, VLAN 1 cannot be created or removed. • You cannot manually create or delete VLANs reserved for special purposes. • • You cannot use the undo vlan command to delete the dynamic VLANs. You cannot delete a VLAN with a QoS policy configured. •...
VLAN, see the chapter “Voice VLAN configuration.” • H3C recommends that you set the same PVID ID for local and remote ports. Make sure that a port is assigned to its PVID. Otherwise, when the port receives frames tagged with •...
The following table shows how ports of different link types handle frames: Actions (in the inbound direction) Port type Actions (in the outbound direction) Untagged frame Tagged frame • Receives the frame if its VLAN ID is the same as the PVID. Tags the frame with the Removes the VLAN tag and sends the Access...
Use the To do… Remarks command… Required interface Enter Ethernet interface-type Use any command. interface view interface-number • The configuration made in Ethernet interface view applies only to the port. Enter Layer 2 interface • The configuration made in port group view aggregate bridge-aggregation applies to all ports in the port group.
To do… Use the command… Remarks Required interface-type Enter Ethernet interface Use any command. interface-number interface view • The configuration made in Ethernet interface view applies only to the port. • The configuration made in port group Enter Layer 2 interface view applies to all ports in the port aggregate...
To do… Use the command… Remarks Required interface-type Enter Ethernet interface Use any command. interface-number interface view • The configuration made in Ethernet interface view applies only to the port. Enter Layer 2 • The configuration made in port interface bridge-aggregation aggregate interface-number group view applies to all ports in the...
Page 105
Host A and Host C belong to Department A, and access the enterprise network through different • devices. Host B and Host D belong to Department B. They also access the enterprise network through different devices. • To ensure communication security and avoid broadcast storms, VLANs are configured in the enterprise network to isolate Layer 2 traffic of different departments.
If no VLAN is available, the device tags the frame with the PVID of the receiving port and forwards the frame. When the port receives a tagged frame, the port forwards the frame if the VLAN ID of the frame is •...
NOTE: When a port is assigned to the corresponding VLAN in a MAC address-to-VLAN entry, but has not • been assigned to the VLAN by using the port hybrid vlan command, the port sends packets from the VLAN with VLAN tags removed. If you configure both static and dynamic MAC-based VLAN assignment on the same port, dynamic •...
Page 109
To do... Use the command... Remarks Enter system view system-view — mac-address mac-vlan mac-address Associate a specific MAC mac-mask vlan-id [ mask ] vlan Required address with a VLAN priority [ priority interface-type Enter Ethernet interface Required interface-number interface view Use either command.
To do... Use the command... Remarks Optional Disable the PVID of the port from forwarding packets with By default, when a port receives a unknown source MAC packet with an unknown source MAC port pvid disable addresses that do not match address that does not match to any any MAC address-to-VLAN MAC address-to-VLAN entry, it...
[DeviceA-GigabitEthernet1/0/1] mac-vlan enable [DeviceA-GigabitEthernet1/0/1] quit # To enable the laptops to access Server 1 and Server 2, configure the uplink port GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 200. [DeviceA] interface gigabitethernet 1/0/2 [DeviceA-GigabitEthernet1/0/2] port link-type trunk [DeviceA-GigabitEthernet1/0/2] port trunk permit vlan 100 200 [DeviceA-GigabitEthernet1/0/2] quit Configuration on Device B...
MAC-based VLAN is usually configured on the downlink ports of access layer devices, and cannot be configured together with the link aggregation function. Protocol-based VLAN configuration Introduction to protocol-based VLAN You use the protocol-based VLAN feature to assign packets to VLANs by their application type. The protocol-based VLAN feature assigns inbound packets to different VLANs based on their protocol type and encapsulation format.
Page 114
To do… Use the command… Remarks Required interface-type Enter Ethernet interface Use any command. interface-number interface view • The configuration made in Ethernet interface view applies only to the port. • The configuration made in port Enter Layer 2 interface bridge-aggregation group view applies to all ports in aggregate interface-number...
Protocol-based VLAN configuration example Network requirements In a lab environment, as shown in Figure 7, most hosts run the IPv4 protocol, and the rest of the hosts run the IPv6 protocol for teaching purpose. To avoid interference, isolate IPv4 traffic and IPv6 traffic at Layer Figure 7 Network diagram for protocol-based VLAN configuration Configuration consideration Create VLANs 100 and 200.
Page 116
[Device-vlan200] quit [Device] vlan 100 [Device-vlan100] protocol-vlan 1 ipv4 [Device-vlan100] quit # Configure port GigabitEthernet 1/0/1 as a hybrid port that forwards packets of VLANs 100 and 200 untagged. [Device] interface gigabitethernet 1/0/1 [Device-GigabitEthernet1/0/1] port link-type hybrid [Device-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged Please wait...
Interface: GigabitEthernet 1/0/1 VLAN ID Protocol Index Protocol Type ====================================================== ipv4 ipv6 Interface: GigabitEthernet 1/0/2 VLAN ID Protocol Index Protocol Type ====================================================== ipv4 ipv6 Configuration guidelines Protocol-based VLAN configuration applies to hybrid ports only. Displaying and maintaining VLAN To do... Use the command…...
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
Number OUI address Vendor 0004-0D00-0000 Avaya phone 00D0-1E00-0000 Pingtel phone 0060-B900-0000 Philips/NEC phone 00E0-7500-0000 Polycom phone 00E0-BB00-0000 3Com phone NOTE: In general, as the first 24 bits of a MAC address (in binary format), an OUI address is a globally •...
Page 120
assigned to a voice VLAN transmit voice traffic exclusively, which prevents the impact of data traffic on the transmission of voice traffic. Figure 9 Only IP phones access the network Both modes forward tagged packets according to their tags. Table 2 Table 3 list the required configurations on ports of different link types in order for these ports to support tagged or untagged voice traffic sent from IP phones when different voice VLAN assignment...
MAC addresses checking. TIP: H3C does not recommend you transmit both voice traffic and non-voice traffic in a voice VLAN. If you have to, ensure that the voice VLAN security mode is disabled.
Table 4 How a voice VLAN-enabled port processes packets in security/normal mode Voice VLAN Packet type Packet processing mode mode Untagged packets If the source MAC address of a packet matches an OUI address configured for the device, it is forwarded in the voice Packets carrying the VLAN;...
To do... Use the command... Remarks Enter system view system-view — interface-type interface Enter interface view — interface-number Configure the interface to trust the Required QoS priority settings in incoming Use either command voice traffic, but not to modify the voice vlan qos trust By default, an interface modifies the CoS and DSCP values marked for...
To do... Use the command... Remarks Optional By default, the automatic voice Configure the port to operate in VLAN assignment mode is automatic voice VLAN assignment voice vlan mode auto enabled. mode The voice VLAN assignment modes on different ports are independent of one another.
To do... Use the command... Remarks Optional For the configuration procedure, This operation is required for Configure the voice VLAN as the see the chapter “VLAN untagged inbound voice traffic PVID of the trunk or hybrid port configuration.” and prohibited for tagged inbound voice traffic.
Figure 10 Network diagram for automatic voice VLAN assignment mode configuration Configuration procedure # Create VLAN 2. <DeviceA> system-view [DeviceA] vlan 2 Please wait... Done. # Set the voice VLAN aging time to 30 minutes. [DeviceA] voice vlan aging 30 # Since GigabitEthernet 1/0/1 may receive both voice traffic and data traffic at the same time, to ensure the quality of voice packets and effective bandwidth use, configure voice VLANs to work in security mode.
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
Figure 1 How GARP works For example, a GVRP-enabled port registers and deregisters VLAN in the following cases. When the port receives a VLAN attribute declaration, it registers the VLAN attribute and joins the • VLAN. When the port receives a VLAN withdrawal, it deregisters the VLAN and leaves the VLAN. •...
Page 132
H3C's implementation of GARP uses the following timers to control GARP message transmission: Hold timer The Hold timer sets the delay that a GARP participant waits before sending a Join or Leave message. When an attribute value changes or a Join or Leave message arrives, the GARP participant does not send the message immediately.
Page 133
GARP PDU format Figure 2 GARP PDU format Ethernet frame Length DSAP SSAP Ctrl GARP PDU Protocol ID Message 1 Message n End mark Attribute type Attribute list Attribute 1 Attribute n End mark Attribute length Attribute event Attribute value As shown in Figure 2, GARP PDUs are encapsulated in IEEE 802.3 Ethernet frames.
The destination MAC addresses of GARP messages are multicast MAC addresses, and vary with GARP applications. For example, the destination MAC address of GVRP is 01-80-C2-00-00-21. GVRP GVRP overview As a GARP application, GVRP uses the operating mechanism of GARP to maintain and propagate dynamic VLAN registrations throughout a switched LAN.
Configuring GVRP functions Before enabling GVRP on a port, you must enable GVRP globally. In addition, GVRP can be configured only on trunk ports, and you must assign the involved trunk ports to all dynamic VLANs. Follow these steps to configure GVRP functions on a trunk port: To do…...
Configuring the GARP timers Follow these steps to configure the GARP timers: To do… Use the command… Remarks Enter system view system-view –– Optional 1000 centiseconds by default. timer-value Configure the GARP LeaveAll timer garp timer leaveall The LeaveAll timer applies to all ports.
Displaying and maintaining GVRP To do… Use the command… Remarks display garp statistics [ interface interface-list Display statistics about GARP on ports ] [ | { begin | exclude | Available in any view regular-expression include } display garp timer [ interface interface-list Display GARP timers on ports ] [ | { begin | exclude |...
Page 138
Configuration procedure Configure Device A # Enable GVRP globally. <DeviceA> system-view [DeviceA] gvrp # Configure port GigabitEthernet 1/0/1 as a trunk port, and assign it to all VLANs. [DeviceA] interface gigabitethernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] port link-type trunk [DeviceA-GigabitEthernet1/0/1] port trunk permit vlan all # Enable GVRP on trunk port GigabitEthernet 1/0/1.
According to the output, information about VLAN 1, static VLAN information of VLAN 3 on the local device, and dynamic VLAN information of VLAN 2 on Device A are all registered through GVRP. GVRP fixed registration mode configuration example Network requirements As shown in Figure Device A and Device B are connected through their ports GigabitEthernet 1/0/1.
# Create VLAN 3 (a static VLAN). [DeviceB] vlan 3 [DeviceB-vlan3] quit Verify the configuration Use the display gvrp local-vlan command to display the local VLAN information maintained by GVRP on ports. For example: # Display the local VLAN information maintained by GVRP on port GigabitEthernet 1/0/1 of Device A. [DeviceA] display gvrp local-vlan interface gigabitethernet 1/0/1 Following VLANs exist in GVRP local database: 1(default), 2...
Page 141
[DeviceA-GigabitEthernet1/0/1] quit # Create VLAN 2 (a static VLAN). [DeviceA] vlan 2 [DeviceA-vlan2] quit Configure Device B # Enable GVRP globally. <DeviceB> system-view [DeviceB] gvrp # Configure port GigabitEthernet 1/0/1 as a trunk port, and assign it to all VLANs. [DeviceB] interface gigabitethernet 1/0/1 [DeviceB-GigabitEthernet1/0/1] port link-type trunk [DeviceB-GigabitEthernet1/0/1] port trunk permit vlan all...
Page 142
Contents LLDP configuration ························································································································································ 1 Overview ············································································································································································ 1 Background ······························································································································································· 1 Basic concepts ·························································································································································· 1 How LLDP works ······················································································································································· 6 Protocols and standards ·········································································································································· 6 LLDP configuration task list ··············································································································································· 6 Performing basic LLDP configuration ······························································································································· 7 ...
The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
Page 144
Figure 1 Ethernet II-encapsulated LLDPDU format Destination MAC address Source MAC address Type Data = LLDPU (1500 bytes) The fields in the Ethernet II-encapsulated LLDPDU are described in Table Table 1 Fields in an Ethernet II-encapsulated LLDPDU Field Description The MAC address to which the LLDPDU is advertised. It is fixed to Destination MAC address 0x0180-C200-000E, a multicast MAC address.
Page 145
Table 2 Fields in a SNAP-encapsulated LLDPDU Field Description The MAC address to which the LLDPDU is advertised. It is fixed at Destination MAC address 0x0180-C200-000E, a multicast MAC address. Source MAC address The MAC address of the sending port. The SNAP type for the upper layer protocol.
Page 146
Type Description Remarks Time To Live Life of the transmitted information on the receiving device End of LLDPDU Marks the end of the TLV sequence in the LLDPDU Port Description Port description of the sending port System Name Assigned name of the sending device System Description Description of the sending device Optional...
Page 147
NOTE: The Power Stateful Control TLV is defined in IEEE P802.3at D1.0. The later versions no longer support this TLV. H3C devices send this type of TLVs only after receiving them. LLDP-MED TLVs LLDP-MED TLVs provide multiple advanced applications for voice over IP (VoIP), such as basic configuration, network policy configuration, and address and directory management.
How LLDP works Operating Modes of LLDP LLDP can operate in one of the following modes: TxRx mode. A port in this mode sends and receives LLDPDUs. • Tx mode. A port in this mode only sends LLDPDUs. • • Rx mode.
Task Remarks Setting the LLDP re-initialization delay Optional Enabling LLDP polling Optional Configuring the advertisable TLVs Optional Configuring the management address and its Optional encoding format Setting other LLDP parameters Optional Setting an encapsulation format for LLDPDUs Optional Configuring CDP compatibility Optional Configuring LLDP trapping Optional...
Follow these steps to set the LLDP operating mode: To do… Use the command… Remarks Enter system view system-view — interface-type Enter Ethernet Enter Layer 2 Ethernet interface Required interface-number interface view interface view or port group Use either command. port-group-name Enter port group view port-group manual...
To do… Use the command… Remarks Enter Enter Layer 2 interface-type interface-number Ethernet Ethernet interface interface Required interface view view or Use either command. Enter port group port group port-group-name port-group manual view view lldp tlv-enable { basic-tlv { all | port-description | system-capability | system-description | Optional system-name } | dot1-tlv { all | port-vlan-id |...
To do… Use the command… Remarks Optional Configure the encoding format of the lldp management address as character management-address-for By default, the management address is string mat string encapsulated in the numeric format. Setting other LLDP parameters The Time to Live TLV carried in an LLDPDU determines how long the device information carried in the LLDPDU can be saved on a recipient device.
By default, LLDPDUs are encapsulated in Ethernet II frames. If the neighbor devices encapsulate LLDPDUs in SNAP frames, configure the encapsulation format for LLDPDUs as SNAP to guarantee normal communication with the neighbors. Follow these steps to set the encapsulation format for LLDPDUs to SNAP: To do…...
Disable: CDP packets cannot be transmitted or received. • To make CDP-compatible LLDP take effect on specific ports, first enable CDP-compatible LLDP globally, and then configure CDP-compatible LLDP to operate in TxRx mode. Follow these steps to enable LLDP to be compatible with CDP: To do…...
Displaying and maintaining LLDP To do… Use the command… Remarks Display the global LLDP display lldp local-information [ global | interface-type interface-number information or the information interface ] [ | Available in any view contained in the LLDP TLVs to be { begin | exclude | include } regular-expression sent through a port...
Page 156
Configuration procedure Configure Switch A # Enable LLDP globally. <SwitchA> system-view [SwitchA] lldp enable # Enable LLDP on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 (you can skip this step because LLDP is enabled on ports by default), and set the LLDP operating mode to Rx. [SwitchA] interface gigabitethernet 1/0/1 [SwitchA-GigabitEthernet1/0/1] lldp enable [SwitchA-GigabitEthernet1/0/1] lldp admin-status rx...
Page 157
Number of MED neighbors Number of CDP neighbors Number of sent optional TLV Number of received unknown TLV : 0 Port 2 [GigabitEthernet1/0/2]: Port status of LLDP : Enable Admin status : Rx_Only Trap flag : No Polling interval : 0s Number of neighbors: Number of MED neighbors Number of CDP neighbors...
Trap flag : No Polling interval : 0s Number of neighbors Number of MED neighbors Number of CDP neighbors Number of sent optional TLV Number of received unknown TLV As the sample output shows, GigabitEthernet 1/0/2 of Switch A does not connect to any neighboring devices.
Page 159
[SwitchA] lldp compliance cdp # Enable LLDP (you can skip this step because LLDP is enabled on ports by default), configure LLDP to operate in TxRx mode, and configure CDP-compatible LLDP to operate in TxRx mode on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. [SwitchA] interface gigabitethernet 1/0/1 [SwitchA-GigabitEthernet1/0/1] lldp enable [SwitchA-GigabitEthernet1/0/1] lldp admin-status txrx...
Need help?
Do you have a question about the WX3000E Series and is the answer not in the manual?
Questions and answers