Download Print this page
H3C WX3000E Series Configuration Manual
H3C WX3000E Series Configuration Manual

H3C WX3000E Series Configuration Manual

Switching engine layer 2

Advertisement

Quick Links

H3C WX3000E Series Wireless Switches
Switching Engine
Layer 2 Configuration Guide
New H3C Technologies Co., Ltd.
http://www.h3c.com.hk
Software version: WX3000-CMW520-R3507P26
Document version: 6W102-20190508

Advertisement

loading
Need help?

Need help?

Do you have a question about the WX3000E Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for H3C WX3000E Series

  • Page 1 H3C WX3000E Series Wireless Switches Switching Engine Layer 2 Configuration Guide New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: WX3000-CMW520-R3507P26 Document version: 6W102-20190508...
  • Page 2 The information in this document is subject to change without notice. All contents in this document, including statements, information, and recommendations, are believed to be accurate, but they are presented without warranty of any kind, express or implied. H3C shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Command Conventions

    Preface The H3C WX3000E documentation set includes eight configuration guides, which describe the software features for the H3C WX3000E Series Wireless Switches Switching Engine and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
  • Page 4: Gui Conventions

    GUI conventions Convention Description Window names, button names, field names, and menu items are in Boldface. For Boldface example, the New User window appears; click OK. > Multi-level menus are separated by angle brackets. For example, File > Create > Folder. Symbols Convention Description...
  • Page 5: Documentation Feedback

    Documentation feedback You can e-mail your comments about product documentation to info@h3c.com. We appreciate your comments.
  • Page 6: Table Of Contents

    Contents Ethernet interface configuration ·································································································································· 1   Ethernet interface naming conventions ··························································································································· 1   Configuring basic settings of an Ethernet interface ······································································································· 1   Configuring Duplex Mode and Speed on an Ethernet Interface ········································································· 1   Setting speed options for auto negotiation on an Ethernet interface ·································································· 2  ...
  • Page 7: Ethernet Interface Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 8: Setting Speed Options For Auto Negotiation On An Ethernet Interface

    To do… Use the command… Remarks interface-type interface Enter Ethernet interface view — interface-number Optional By default, the description of an interface is text Set the interface description description interface-name in the format of Interface. For example, GigabitEthernet1/0/1 Interface. Optional Set the duplex mode of the By default, the duplex mode is auto.
  • Page 9: Configuring Flow Control On An Ethernet Interface

    To avoid congestion on GigabitEthernet 1/4, set 100 Mbps as the only option available for speed negotiation on port GigabitEthernet 1/1, GigabitEthernet 1/2, and GigabitEthernet 1/3. As a result, the transmission rate on each port connected to a server is limited to 100 Mbps. Follow these steps to set speed options for auto negotiation on an Ethernet interface: To do…...
  • Page 10: Configuring Loopback Testing On An Ethernet Interface

    To do… Use the command… Remarks Enter system view system-view — interface-type interface Enter Ethernet interface view — interface-number Required Set a physical state change delay-time link-delay By default, physical state change suppression suppression interval is disabled. Configuring loopback testing on an Ethernet interface If an Ethernet interface does not work normally, you can enable loopback testing on it to identify the problem.
  • Page 11: Enabling The Auto Power-Down Function On An Ethernet Interface

    Even though the settings are made on the port group, they are saved on an interface basis rather than on a port group basis. You can only view the settings in the view of each interface by use the display current-configuration or display this command.
  • Page 12: Configuring Storm Control On An Ethernet Interface

    NOTE: When you want to perform storm control for different type of packets, you can configure a suppression threshold ratio or use the storm-constrain command to configure storm control for each type of packets. However, when you want to perform storm control for the same type of packets, you cannot use the two methods at the same time;...
  • Page 13 Shuts down automatically. The interface shuts down automatically and stops forwarding any traffic. • When the blocked traffic is detected dropping below the lower threshold, the port does not forward the traffic. To bring up the interface, use the undo shutdown command or disable the storm control function.
  • Page 14: Setting The Statistics Polling Interval

    Setting the statistics polling interval Follow these steps to set the statistics polling interval globally or on an Ethernet interface: To do… Use the command… Remarks Enter system view system-view — interface-type interface Enter Ethernet interface view — interface-number Optional interval Set the statistics polling interval flow-interval...
  • Page 15 Figure 2 Single-port loopback Figure 3 Multi-port loopback You can enable loopback detection to detect loops on an interface and, if the interface supports the loopback-detection action command, configure the protective action to take on the receiving interface when a loop is detected, for example, to shut down the interface. Depending on whether a protective action is configured, the device takes the actions in Table 1 to alleviate the impact of the loop condition.
  • Page 16 To do… Use the command… Remarks Required Enable global loopback detection loopback-detection enable Disabled by default. Optional By default, multi-port loopback Enable multi-port loopback loopback-detection detection is disabled, and the detection multi-port-mode enable device can only detect single-port loopback. Optional loopback-detection interval-time Set the loopback detection interval time...
  • Page 17: Setting The Mdi Mode Of An Ethernet Interface

    Setting the MDI mode of an Ethernet interface NOTE: Fiber interfaces do not support the MDI mode setting. You can use both crossover and straight-through Ethernet cables to connect copper Ethernet interfaces. To accommodate these two types of cables, a copper Ethernet interface can operate in one of the following Medium Dependent Interface (MDI) modes: •...
  • Page 18: Testing The Cable Connection Of An Ethernet Interface

    To do… Use the command… Remarks Enter system view system-view — interface-type interface Enter Ethernet interface view — interface-number Required Enable bridging on the Ethernet port bridge enable interface Disabled by default. Testing the cable connection of an Ethernet interface NOTE: •...
  • Page 19 To do… Use the command… Remarks interface-type Clear the interface or reset counters interface [ Available in user interface-number subinterface statistics view...
  • Page 20 Contents Loopback and null interface configuration ················································································································· 1   Configuring a loopback interface ··································································································································· 1   Introduction to the loopback interface···················································································································· 1   Configuration procedure ········································································································································· 1   Configuring the null interface ·········································································································································· 2   Introduction to the null interface ······························································································································ 2  ...
  • Page 21: Loopback And Null Interface Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 22: Configuring The Null Interface

    To do… Use the command… Remarks Enter system view system-view — Create a loopback interface and interface loopback — interface-number enter loopback interface view Optional text Set the interface description description By default, the description of a loopback interface name interface is Interface.
  • Page 23: Displaying And Maintaining Loopback And Null Interfaces

    Displaying and maintaining loopback and null interfaces To do… Use the command… Remarks display interface loopback [ brief [ down ] ] [ | { begin | exclude | regular-expression include } Display information about loopback Available in any view interfaces display interface loopback interface-number...
  • Page 24 Contents MAC address table configuration ······························································································································ 1   Overview ············································································································································································ 1   How a MAC address table entry is created ·········································································································· 1   Types of MAC address table entries ······················································································································ 2   MAC address table-based frame forwarding ······································································································· 2   Configuring the MAC address table ·······························································································································...
  • Page 25: Mac Address Table Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • • The port numbers in this chapter are for illustration only.
  • Page 26: Types Of Mac Address Table Entries

    The device performs the learning process each time it receives a frame from an unknown source MAC address, until the MAC address table is fully populated. Manually configuring MAC address entries With dynamic MAC address learning, a device does not distinguish between illegitimate and legitimate frames, which can invite security hazards.
  • Page 27: Configuring Static, Dynamic, And Blackhole Mac Address Table Entries

    Configuring static, dynamic, and blackhole MAC address table entries To fence off MAC address spoofing attacks and improve port security, you can manually add MAC address table entries to bind ports with MAC addresses. You can also configure blackhole MAC address entries to filter out packets with certain source or destination MAC addresses.
  • Page 28: Configuring The Mac Learning Limit

    To do… Use the command… Remarks Optional seconds Configure the aging timer for mac-address timer { aging 300 seconds by default. dynamic MAC address entries | no-aging } The no-aging keyword disables the aging timer. You can reduce broadcasts on a stable network by disabling the aging timer to prevent dynamic entries from unnecessarily aging out.
  • Page 29: Configuring A Static Multicast Mac Address Entry In Interface View

    Configuring a static multicast MAC address entry in interface view Follow these steps to configure static multicast MAC address entries in interface view To do... Use the command... Remarks Enter system view system-view — Enter Ethernet interface/Layer 2 Required aggregate interface view In Ethernet interface view or Layer interface-type interface...
  • Page 30: Mac Address Table Configuration Example

    MAC address table configuration example Network requirements The MAC address of Host A is 000f-e235-dc71 and belongs to VLAN 1. It is connected to • GigabitEthernet 1/0/1 of the device. To prevent MAC address spoofing, add a static entry for the host in the MAC address table of the device.
  • Page 31 Contents Ethernet link aggregation configuration ····················································································································· 1   Overview ············································································································································································ 1   Basic concepts ·························································································································································· 1   Aggregating links in static mode ···························································································································· 4   Aggregating links in dynamic mode ······················································································································ 5   Load sharing criteria for link aggregation groups ································································································ 7  ...
  • Page 32: Ethernet Link Aggregation Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 33 NOTE: The rate of an aggregate interface equals the total rate of its member ports in the Selected state, and its duplex mode is the same as the selected member ports. For more information about the states of member ports in an aggregation group, see “Aggregation states of member ports in an aggregation group.”...
  • Page 34: Reference Port

    Class-one configurations do not affect the aggregation state of the member port even if they are • different from those on the aggregate interface. GVRP and MSTP settings are examples of class-one configurations. NOTE: The class-one configuration for a member port is effective only when the member port leaves the aggregation group.
  • Page 35: Aggregating Links In Static Mode

    LACP timeout interval The LACP timeout interval specifies how long a member port waits to receive LACPDUs from the peer port. If a local member port fails to receive LACPDUs from the peer within three times the LACP timeout interval, the member port assumes that the peer port has failed.
  • Page 36: Setting The Aggregation State Of Each Member Port

    The one at the top is selected as the reference port. If two ports have the same aggregation priority, duplex mode, and speed, the one with the lower port number wins out. Setting the aggregation state of each member port After selecting the reference port, the static aggregation group sets the aggregation state of each member port, as shown in Figure...
  • Page 37: Selecting A Reference Port

    Selecting a reference port The local system (the actor) and the remote system (the partner) negotiate a reference port using the following workflow: Compare the system ID (comprising the system LACP priority and the system MAC address). The system with the lower LACP priority value wins out. If they are the same, compare the system MAC addresses.
  • Page 38: Load Sharing Criteria For Link Aggregation Groups

    NOTE: To ensure stable aggregation state and service continuity, do not change port attributes or class-two • configurations on any member port. In a dynamic aggregation group, when the aggregation state of a local port changes, the • aggregation state of the peer port also changes. •...
  • Page 39: Configuring A Static Aggregation Group

    Table 5 Features incompatible with Layer 2 aggregation groups Feature Reference Security Configuration Guide MAC authentication MAC authentication in the Security Configuration Guide Port security Port security in the Security Configuration Guide IP source guard IP source guard in the Security Configuration Guide 802.1X 802.1X in the...
  • Page 40: Configuring A Dynamic Aggregation Group

    Configuring a dynamic aggregation group NOTE: To guarantee a successful dynamic aggregation, make sure that the peer ports of the ports aggregated at one end are also aggregated. The two ends can automatically negotiate the aggregation state of each member port. Follow these steps to configure a Layer 2 dynamic aggregation group: To do...
  • Page 41: Configuring An Aggregate Interface

    Configuring an aggregate interface NOTE: In addition to the preceding configurations, most of the configurations that can be performed on Ethernet interfaces can also be performed on aggregate interfaces. Configuring the description of an aggregate interface You can configure the description of an aggregate interface for administration purposes such as describing the purpose of the interface.
  • Page 42: Shutting Down An Aggregate Interface

    Shutting down an aggregate interface Shutting down or bringing up an aggregate interface affects the aggregation state and link state of ports in the corresponding aggregation group in the following ways: • When an aggregate interface is shut down, all Selected ports in the corresponding aggregation group become unselected and their link state becomes down.
  • Page 43: Displaying And Maintaining Ethernet Link Aggregation

    Displaying and maintaining Ethernet link aggregation To do... Use the command... Remarks display interface bridge-aggregation [ brief [ down ] ] [ | { begin | exclude | include } regular-expression Display information for an Available in any view aggregate interface display interface bridge-aggregation interface-number [ brief ] [ | { begin | exclude |...
  • Page 44: Configuration Procedure

    Configure a Layer 2 static aggregation group on Device A and Device B respectively, and enable • VLAN 10 at one end of the aggregate link to communicate with VLAN 10 at the other end, and VLAN 20 at one end to communicate with VLAN 20 at the other end. •...
  • Page 45: Layer 2 Dynamic Aggregation Configuration Example

    NOTE: This configuration will be automatically synchronized to all member ports in aggregation group 1. [DeviceA] interface bridge-aggregation 1 [DeviceA-Bridge-Aggregation1] port link-type trunk [DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20 Please wait... Done. Configuring GigabitEthernet1/0/1... Done. Configuring GigabitEthernet1/0/2... Done. Configuring GigabitEthernet1/0/3... Done. [DeviceA-Bridge-Aggregation1] quit # Configure Device A to use the source and destination MAC addresses of packets as the global link-aggregation load sharing criteria.
  • Page 46 Device A and Device B are connected through their respective Layer 2 Ethernet interfaces • GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3. Configure a Layer 2 dynamic aggregation group on Device A and Device B respectively, enable • VLAN 10 at one end of the aggregate link to communicate with VLAN 10 at the other end, and VLAN 20 at one end to communicate with VLAN 20 at the other end.
  • Page 47 [DeviceA] interface gigabitethernet 1/0/3 [DeviceA-GigabitEthernet1/0/3] port link-aggregation group 1 [DeviceA-GigabitEthernet1/0/3] quit # Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to VLANs 10 and 20. [DeviceA] interface bridge-aggregation 1 [DeviceA-Bridge-Aggregation1] port link-type trunk [DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20 Please wait...
  • Page 48 Contents Port isolation configuration ·········································································································································· 1   Introduction to port isolation ············································································································································ 1   Configuring an isolation group ······································································································································· 1   Adding a port to an isolation group ······················································································································ 1   Displaying and maintaining isolation groups ················································································································ 2   Port isolation configuration example······························································································································· 2  ...
  • Page 49: Port Isolation Configuration

    VLAN resource demanding. To save VLAN resources, you can use the port isolation feature, which can isolate ports without using VLANs and allows for great flexibility and security. The switching engine on the WX3000E series wireless switches supports multiple isolation groups which can be configured manually.
  • Page 50: Displaying And Maintaining Isolation Groups

    To do… Use the command… Remarks Enter Required interface-type Ethernet interface Use one of the commands. interface-number interface • In Ethernet interface view, the view subsequent configurations apply to the Enter Layer 2 current port Enter interface aggregate interface bridge-aggregation •...
  • Page 51 Figure 1 Networking diagram for port isolation configuration Configuration procedure # Create isolation group 2. <Device> system-view [Device] port-isolate group 2 # Assign GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 to isolation group 2 as isolated ports. [Device] interface gigabitethernet 1/0/1 [Device-GigabitEthernet1/0/1] port-isolate enable group 2 [Device-GigabitEthernet1/0/1] quit [Device] interface gigabitethernet 1/0/2...
  • Page 52 Contents Spanning tree configuration ········································································································································ 1   STP ······················································································································································································ 1   STP protocol packets ················································································································································ 1   Basic concepts in STP ··············································································································································· 2   Calculation process of the STP algorithm ·············································································································· 3   RSTP ···················································································································································································· 8   MSTP ··················································································································································································· 9  ...
  • Page 53: Spanning Tree Configuration

    • The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • • The port numbers in this chapter are for illustration only.
  • Page 54: Basic Concepts In Stp

    Configuration BPDUs, used for calculating a spanning tree and maintaining the spanning tree • topology. Topology change notification (TCN) BPDUs, which notify network devices of network topology • changes. A configuration BPDU contains the following information for network devices to complete spanning tree calculation.
  • Page 55: Calculation Process Of The Stp Algorithm

    Figure 1 Schematic diagram of designated bridges and designated ports Path cost Path cost is a reference value used for link selection in STP. STP calculates path costs to select the most robust links and block redundant links that are less robust, to prune the network into a loop-free tree. Calculation process of the STP algorithm The STP algorithm uses the following calculation process: Initial state...
  • Page 56 Step Description The device compares the calculated configuration BPDU with the configuration BPDU on the port whose port role is to be determined: • If the calculated configuration BPDU is superior, the device considers this port as the designated port, replaces the configuration BPDU on the port with the calculated configuration BPDU, and periodically sends out the calculated configuration BPDU.
  • Page 57 Figure 2 Network diagram for the STP algorithm As shown in Figure 2, the priority values of Device A, Device B, and Device C are 0, 1, and 2, and the path costs of links among the three devices are 5, 10, and 4 respectively. Initial state of each device Table 4 Initial state of each device Device...
  • Page 58 Table 5 Comparison process and result on each device Configuration BPDU Device Comparison process on ports after comparison • Port A1 receives the configuration BPDU of Port B1 {1, 0, 1, Port B1}, finds that its existing configuration BPDU {0, 0, 0, Port A1} is superior to the received configuration BPDU, and discards the received one.
  • Page 59: The Configuration Bpdu Forwarding Mechanism Of Stp

    Configuration BPDU Device Comparison process on ports after comparison • Port C2 receives the updated configuration BPDU of Port B2 {0, 5, 1, Port B2}, finds that the received configuration BPDU is superior to its • Port C1: {0, 0, 0, existing configuration BPDU {0, 10, 2, Port C2}, and updates its Port A2} configuration BPDU.
  • Page 60: Rstp

    Upon network initiation, every device regards itself as the root bridge, generates configuration • BPDUs with itself as the root, and sends the configuration BPDUs at a regular hello interval. If it is the root port that received a configuration BPDU and the received configuration BPDU is •...
  • Page 61: Mstp

    MSTP STP and RSTP limitations STP does not support rapid state transition of ports. A newly elected port must wait twice the forward delay time before transiting to the forwarding state, even if it connects to a point-to-point link or is an edge port.
  • Page 62: Mst Region

    Figure 4 Basic concepts in MSTP VLAN 1 MSTI 1 VLAN 1 MSTI 1 VLAN 2 MSTI 2 VLAN 2 MSTI 2 Other VLANs MSTI 0 Other VLANs MSTI 0 MST region 1 MST region 4 MST region 2 MST region 3 VLAN 1 MSTI 1 VLAN 1...
  • Page 63: Vlan-To-Instance Mapping Table

    Same VLAN-to-instance mapping configuration • • Same MSTP revision level Physically linked together • Multiple MST regions can exist in a switched network. You can assign multiple devices to the same MST region. In Figure 4, the switched network comprises four MST regions, MST region 1 through MST region 4, and all devices in each MST region have the same MST region configuration.
  • Page 64: Port Roles

    Port roles A port can play different roles in different MSTIs. As shown in Figure 6, an MST region comprises Device A, Device B, Device C, and Device D. Port A1 and port A2 of Device A connect to the common root bridge.
  • Page 65: How Mstp Works

    Forwarding: the port receives and sends BPDUs, learns MAC addresses, and forwards user traffic. • • Learning: the port receives and sends BPDUs, and learns MAC addresses, but does not forward user traffic. Learning is an intermediate port state. Discarding: the port receives and sends BPDUs, but does not learn MAC addresses or forward user •...
  • Page 66: Implementation Of Mstp On Devices

    Implementation of MSTP on devices MSTP is compatible with STP and RSTP. STP and RSTP protocol packets can be recognized by devices running MSTP and used for spanning tree calculation. In addition to basic MSTP functions, the following functions are provided for ease of management: Root bridge hold •...
  • Page 67 Task Remarks Configuring the mode a port uses to recognize/send Optional MSTP packets Enabling the output of port state transition information Optional Enabling the spanning tree feature Required Optional Setting the spanning tree mode By default, the device works in MSTP mode. Configuring an MST region Required Configuring the device priority...
  • Page 68: Configuring The Spanning Tree

    NOTE: If GVRP and a spanning tree protocol are enabled on a device at the same time, GVRP packets are • forwarded along the CIST. To advertise a certain VLAN within the network through GVRP, make sure that this VLAN is mapped to the CIST when you configure the VLAN-to-instance mapping table. For more information about GVRP, see the chapter “GVRP configuration.”...
  • Page 69: Configuring An Mst Region

    Configuring an MST region Follow these steps to configure an MST region: To do... Use the command... Remarks Enter system view system-view — Enter MST region view stp region-configuration — Optional name Configure the MST region name region-name The MST region name is the MAC address by default.
  • Page 70: Configuring The Device Priority

    A spanning tree can have one root bridge only. If two or more devices are selected as the root bridge in a spanning tree at the same time, the device with the lowest MAC address wins out. When the root bridge of an instance fails or is shut down, the secondary root bridge (if you have specified one) can take over the role of the primary root bridge.
  • Page 71: Configuring The Maximum Hops Of An Mst Region

    CAUTION: After configuring a device as the root bridge or a secondary root bridge, you cannot change the • priority of the device. During root bridge selection, if all devices in a spanning tree have the same priority, the one with the •...
  • Page 72: Configuring Spanning Tree Timers

    Max age ƒ 2 × (hello time + 1 second) H3C does not recommend you to manually set the spanning tree timers. Instead, you can specify the network diameter and let spanning tree protocols automatically calculate the timers based on the network diameter.
  • Page 73: Configuring The Timeout Factor

    If the forward delay timer is too short, temporary redundant paths may be introduced. If the forward delay timer is too long, it may take a long time for the network to converge. H3C recommends you to use the default setting.
  • Page 74: Configuring Edge Ports

    By setting an appropriate maximum port rate, you can limit the rate at which the port sends BPDUs and prevent spanning tree protocols from using excessive network resources when the network becomes instable. H3C recommends you to use the default setting. Configuring edge ports If a port directly connects to a user terminal rather than another device or a shared LAN segment, this port is regarded as an edge port.
  • Page 75: Configuring Path Costs Of Ports

    Configuring path costs of ports Path cost is a parameter related to the rate of a port. On a spanning tree device, a port can have different path costs in different MSTIs. Setting appropriate path costs allows VLAN traffic flows to be forwarded along different physical links, achieving VLAN-based load balancing.
  • Page 76 Path cost Link speed Port type IEEE IEEE 802.1t Private standard 802.1d-1998 Aggregate interface 500,000 1,400 containing 4 Selected ports Single Port 200,000 Aggregate interface 100,000 containing 2 Selected ports 100 Mbps Aggregate interface 66,666 containing 3 Selected ports Aggregate interface 50,000 containing 4 Selected ports Single Port...
  • Page 77: Configuration Example

    NOTE: When the path cost of a port changes, the system re-calculates the role of the port and initiates a state transition. Configuration example # In MSTP mode, specify the device to calculate the default path costs of its ports by using IEEE 802.1d- 1 998.
  • Page 78: Configuring The Mode A Port Uses To Recognize/Send Mstp Packets

    You can configure the link type as point-to-point for a Layer 2 aggregate interface or a port that • works in full duplex mode. H3C recommends you to use the default setting and let the device to automatically detect the port link type.
  • Page 79: Enabling The Output Of Port State Transition Information

    To do... Use the command... Remarks Enter Ethernet interface view or Layer 2 aggregate interface view interface-type interface Required Enter interface view or port group interface-number view Use either command. Enter port group view port-group-name port-group manual Required Configure the mode the port uses stp compliance { auto | dot1s | legacy } to recognize/send MSTP packets auto by default.
  • Page 80: Performing Mcheck

    To do... Use the command... Remarks Enter Ethernet interface view or Layer 2 aggregate interface view interface-type interface Required Enter interface view or port group interface-number view Use either command. Enter port group view port-group manual port-group-name Optional Enable the spanning tree feature Enabling the spanning tree feature stp enable for the port or group of ports...
  • Page 81: Configuring The Vlan Ignore Feature

    NOTE: An mCheck operation takes effect on a device that operates in MSTP, or RSTP mode. Configuring the VLAN Ignore feature Traffic of a VLAN on a complex network may be blocked by the spanning tree. Figure 7 VLAN connectivity blocked by MSTP As shown in Figure Port A1 on Device A allows the traffic of VLAN 1 to pass through, and Port A2 allows the traffic of...
  • Page 82: Configuring Digest Snooping

    Before enabling Digest Snooping, ensure that associated devices of different vendors are connected and run spanning tree protocols. Configuring the Digest Snooping feature You can enable Digest Snooping only on the H3C device that is connected to a third-party device that uses its private key to calculate the configuration digest.
  • Page 83: Digest Snooping Configuration Example

    To prevent loops, do not enable Digest Snooping on MST region edge ports. • H3C recommends you to enable Digest Snooping first and then the spanning tree feature. To avoid • traffic interruption, do not configure Digest Snooping when the network is already working well.
  • Page 84: Configuring No Agreement Check

    Figure 9 Digest Snooping configuration Configuration procedure # Enable Digest Snooping on GigabitEthernet 1/0/1 of Device A and enable global Digest Snooping on Device A. <DeviceA> system-view [DeviceA] interface gigabitethernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] stp config-digest-snooping [DeviceA-GigabitEthernet1/0/1] quit [DeviceA] stp config-digest-snooping # Enable Digest Snooping on GigabitEthernet 1/0/1 of Device B and enable global Digest Snooping on Device B.
  • Page 85: Configuring The No Agreement Check Function

    Figure 10 Rapid state transition of an MSTP designated port Figure 1 1 shows rapid state transition of an RSTP designated port. Figure 11 Rapid state transition of an RSTP designated port If the upstream device is a third-party device, the rapid state transition implementation may be limited. For example, when the upstream device uses a rapid transition mechanism similar to that of RSTP, and the downstream device adopts MSTP and does not work in RSTP mode, the root port on the downstream device receives no agreement packet from the upstream device and sends no agreement packets to the...
  • Page 86: Configuring Protection Functions

    To do... Use the command... Remarks Enter system view system-view — Enter Ethernet interface view or Layer 2 aggregate interface view Required interface-type interface-number interface Enter interface or port group view Use either command. Enter port group view port-group-name port-group manual Required Enable No Agreement Check stp no-agreement-check...
  • Page 87: Enabling Bpdu Guard

    Enabling BPDU guard For access layer devices, the access ports can directly connect to the user terminals (such as PCs) or file servers. The access ports are configured as edge ports to allow rapid transition. When these ports receive configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new spanning tree calculation process.
  • Page 88: Enabling Loop Guard

    To do... Use the command... Remarks Enter Ethernet interface view or Layer 2 aggregate interface view Required Enter interface view or port group interface-type interface-number interface view Use either command. Enter port group view port-group-name port-group manual Required Enable the root guard function for stp root-protection the port(s) Disabled by default.
  • Page 89: Displaying And Maintaining The Spanning Tree

    6 by default. time NOTE: H3C does not recommend you disable this feature. Enabling BPDU drop In a spanning tree network, after receiving BPDUs, the device performs STP calculation according to the received BPDUs and forwards received BPDUs to other devices in the network. This allows malicious attackers to forge BPDUs to attack the network: By continuously sending forged BPDUs, they can make all the devices in the network perform STP calculations all the time.
  • Page 90: Spanning Tree Configuration Examples

    To do... Use the command... Remarks display stp bpdu-statistics [ interface interface-type interface-number [ instance Display BPDU statistics on ports Available in any view instance-id ] ] [ | { begin | exclude | regular-expression include } Display information about ports shut display stp down-port [ | { begin | down by spanning tree protection Available in any view...
  • Page 91 Figure 13 Network diagram for MSTP configuration MST region Device A Device B Permit: all VLAN GE1/0/3 GE1/0/3 Permit: VLAN 10, 20 Permit: VLAN 20, 30 GE1/0/3 GE1/0/3 Permit: VLAN 20, 40 Device C Device D Configuration procedure VLAN and VLAN member port configuration (details not shown) Create VLAN 10, VLAN 20, and VLAN 30 on Device A and Device B respectively, VLAN 10, VLAN 20, and VLAN 40 on Device C, and VLAN 20, VLAN 30, and VLAN 40 on Device D.
  • Page 92 [DeviceB-mst-region] region-name example [DeviceB-mst-region] instance 1 vlan 10 [DeviceB-mst-region] instance 3 vlan 30 [DeviceB-mst-region] instance 4 vlan 40 [DeviceB-mst-region] revision-level 0 # Activate MST region configuration. [DeviceB-mst-region] active region-configuration [DeviceB-mst-region] quit # Specify the current device as the root bridge of MSTI 3. [DeviceB] stp instance 3 root primary # Enable the spanning tree feature globally.
  • Page 93 [DeviceD] stp enable Verification You can use the display stp brief command to display brief spanning tree information on each device after the network is stable. # Display brief spanning tree information on Device A. [DeviceA] display stp brief MSTID Port Role STP State...
  • Page 94 Figure 14 MSTIs mapped to different VLANs...
  • Page 95 Contents VLAN configuration ····················································································································································· 1   Introduction to VLAN ························································································································································ 1   VLAN overview ························································································································································· 1   VLAN fundamentals·················································································································································· 2   VLAN types ······························································································································································· 3   Configuring basic VLAN settings····································································································································· 3   Configuring basic settings of a VLAN interface ············································································································ 4  ...
  • Page 96: Vlan Configuration

    • The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 97: Vlan Fundamentals

    A VLAN is logically divided on an organizational basis rather than on a physical basis. For example, all workstations and servers used by a particular workgroup can be assigned to the same VLAN, regardless of their physical locations. VLAN technology delivers the following benefits: Confining broadcast traffic within individual VLANs.
  • Page 98: Vlan Types

    NOTE: The Ethernet II encapsulation format is used here. Besides the Ethernet II encapsulation format, • Ethernet also supports other encapsulation formats, including 802.2 LLC, 802.2 SNAP, and 802.3 raw. The VLAN tag fields are added to frames encapsulated in these formats for VLAN identification. For a frame with multiple VLAN tags, the device handles it according to its outer-most VLAN tag and •...
  • Page 99: Configuring Basic Settings Of A Vlan Interface

    NOTE: As the default VLAN, VLAN 1 cannot be created or removed. • You cannot manually create or delete VLANs reserved for special purposes. • • You cannot use the undo vlan command to delete the dynamic VLANs. You cannot delete a VLAN with a QoS policy configured. •...
  • Page 100: Port-Based Vlan Configuration

    VLAN, see the chapter “Voice VLAN configuration.” • H3C recommends that you set the same PVID ID for local and remote ports. Make sure that a port is assigned to its PVID. Otherwise, when the port receives frames tagged with •...
  • Page 101: Assigning An Access Port To A Vlan

    The following table shows how ports of different link types handle frames: Actions (in the inbound direction) Port type Actions (in the outbound direction) Untagged frame Tagged frame • Receives the frame if its VLAN ID is the same as the PVID. Tags the frame with the Removes the VLAN tag and sends the Access...
  • Page 102: Assigning A Trunk Port To A Vlan

    Use the To do… Remarks command… Required interface Enter Ethernet interface-type Use any command. interface view interface-number • The configuration made in Ethernet interface view applies only to the port. Enter Layer 2 interface • The configuration made in port group view aggregate bridge-aggregation applies to all ports in the port group.
  • Page 103: Assigning A Hybrid Port To A Vlan

    To do… Use the command… Remarks Required interface-type Enter Ethernet interface Use any command. interface-number interface view • The configuration made in Ethernet interface view applies only to the port. • The configuration made in port group Enter Layer 2 interface view applies to all ports in the port aggregate...
  • Page 104: Port-Based Vlan Configuration Example

    To do… Use the command… Remarks Required interface-type Enter Ethernet interface Use any command. interface-number interface view • The configuration made in Ethernet interface view applies only to the port. Enter Layer 2 • The configuration made in port interface bridge-aggregation aggregate interface-number group view applies to all ports in the...
  • Page 105 Host A and Host C belong to Department A, and access the enterprise network through different • devices. Host B and Host D belong to Department B. They also access the enterprise network through different devices. • To ensure communication security and avoid broadcast storms, VLANs are configured in the enterprise network to isolate Layer 2 traffic of different departments.
  • Page 106: Mac-Based Vlan Configuration

    VLAN ID: 100 VLAN Type: static Route Interface: not configured Description: VLAN 0100 Name: VLAN 0100 Tagged Ports: GigabitEthernet1/0/3 Untagged Ports: GigabitEthernet1/0/1 [DeviceA-GigabitEthernet1/0/3] display vlan 200 VLAN ID: 200 VLAN Type: static Route Interface: not configured Description: VLAN 0200 Name: VLAN 0200 Tagged Ports: GigabitEthernet1/0/3...
  • Page 107: Dynamic Mac-Based Vlan Assignment

    If no VLAN is available, the device tags the frame with the PVID of the receiving port and forwards the frame. When the port receives a tagged frame, the port forwards the frame if the VLAN ID of the frame is •...
  • Page 108: Configuring A Mac-Based Vlan

    NOTE: When a port is assigned to the corresponding VLAN in a MAC address-to-VLAN entry, but has not • been assigned to the VLAN by using the port hybrid vlan command, the port sends packets from the VLAN with VLAN tags removed. If you configure both static and dynamic MAC-based VLAN assignment on the same port, dynamic •...
  • Page 109 To do... Use the command... Remarks Enter system view system-view — mac-address mac-vlan mac-address Associate a specific MAC mac-mask vlan-id [ mask ] vlan Required address with a VLAN priority [ priority interface-type Enter Ethernet interface Required interface-number interface view Use either command.
  • Page 110: Mac-Based Vlan Configuration Example

    To do... Use the command... Remarks Optional Disable the PVID of the port from forwarding packets with By default, when a port receives a unknown source MAC packet with an unknown source MAC port pvid disable addresses that do not match address that does not match to any any MAC address-to-VLAN MAC address-to-VLAN entry, it...
  • Page 111: Configuration Consideration

    Figure 6 Network diagram for MAC-based VLAN configuration VLAN 100 VLAN 200 Server1 Server2 IP: 1.1.1.1/24 IP: 1.1.2.1/24 GE1/0/14 GE1/0/13 GE1/0/4 GE1/0/3 Device B GE1/0/2 GE1/0/2 Device C Device A GE1/0/1 GE1/0/1 VLAN 100 VLAN 200 Laptop1 Laptop2 IP: 1.1.1.2/24 IP: 1.1.2.2/24 MAC: 000d-88f8-4e71 MAC: 0014-222c-aa69...
  • Page 112: Configuration Guidelines

    [DeviceA-GigabitEthernet1/0/1] mac-vlan enable [DeviceA-GigabitEthernet1/0/1] quit # To enable the laptops to access Server 1 and Server 2, configure the uplink port GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 200. [DeviceA] interface gigabitethernet 1/0/2 [DeviceA-GigabitEthernet1/0/2] port link-type trunk [DeviceA-GigabitEthernet1/0/2] port trunk permit vlan 100 200 [DeviceA-GigabitEthernet1/0/2] quit Configuration on Device B...
  • Page 113: Protocol-Based Vlan Configuration

    MAC-based VLAN is usually configured on the downlink ports of access layer devices, and cannot be configured together with the link aggregation function. Protocol-based VLAN configuration Introduction to protocol-based VLAN You use the protocol-based VLAN feature to assign packets to VLANs by their application type. The protocol-based VLAN feature assigns inbound packets to different VLANs based on their protocol type and encapsulation format.
  • Page 114 To do… Use the command… Remarks Required interface-type Enter Ethernet interface Use any command. interface-number interface view • The configuration made in Ethernet interface view applies only to the port. • The configuration made in port Enter Layer 2 interface bridge-aggregation group view applies to all ports in aggregate interface-number...
  • Page 115: Protocol-Based Vlan Configuration Example

    Protocol-based VLAN configuration example Network requirements In a lab environment, as shown in Figure 7, most hosts run the IPv4 protocol, and the rest of the hosts run the IPv6 protocol for teaching purpose. To avoid interference, isolate IPv4 traffic and IPv6 traffic at Layer Figure 7 Network diagram for protocol-based VLAN configuration Configuration consideration Create VLANs 100 and 200.
  • Page 116 [Device-vlan200] quit [Device] vlan 100 [Device-vlan100] protocol-vlan 1 ipv4 [Device-vlan100] quit # Configure port GigabitEthernet 1/0/1 as a hybrid port that forwards packets of VLANs 100 and 200 untagged. [Device] interface gigabitethernet 1/0/1 [Device-GigabitEthernet1/0/1] port link-type hybrid [Device-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged Please wait...
  • Page 117: Displaying And Maintaining Vlan

    Interface: GigabitEthernet 1/0/1 VLAN ID Protocol Index Protocol Type ====================================================== ipv4 ipv6 Interface: GigabitEthernet 1/0/2 VLAN ID Protocol Index Protocol Type ====================================================== ipv4 ipv6 Configuration guidelines Protocol-based VLAN configuration applies to hybrid ports only. Displaying and maintaining VLAN To do... Use the command…...
  • Page 118: Voice Vlan Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 119: Voice Vlan Assignment Modes

    Number OUI address Vendor 0004-0D00-0000 Avaya phone 00D0-1E00-0000 Pingtel phone 0060-B900-0000 Philips/NEC phone 00E0-7500-0000 Polycom phone 00E0-BB00-0000 3Com phone NOTE: In general, as the first 24 bits of a MAC address (in binary format), an OUI address is a globally •...
  • Page 120 assigned to a voice VLAN transmit voice traffic exclusively, which prevents the impact of data traffic on the transmission of voice traffic. Figure 9 Only IP phones access the network Both modes forward tagged packets according to their tags. Table 2 Table 3 list the required configurations on ports of different link types in order for these ports to support tagged or untagged voice traffic sent from IP phones when different voice VLAN assignment...
  • Page 121: Security Mode And Normal Mode Of Voice Vlans

    MAC addresses checking. TIP: H3C does not recommend you transmit both voice traffic and non-voice traffic in a voice VLAN. If you have to, ensure that the voice VLAN security mode is disabled.
  • Page 122: Configuring A Voice Vlan

    Table 4 How a voice VLAN-enabled port processes packets in security/normal mode Voice VLAN Packet type Packet processing mode mode Untagged packets If the source MAC address of a packet matches an OUI address configured for the device, it is forwarded in the voice Packets carrying the VLAN;...
  • Page 123: Configuring A Port To Operate In Automatic Voice Vlan Assignment Mode

    To do... Use the command... Remarks Enter system view system-view — interface-type interface Enter interface view — interface-number Configure the interface to trust the Required QoS priority settings in incoming Use either command voice traffic, but not to modify the voice vlan qos trust By default, an interface modifies the CoS and DSCP values marked for...
  • Page 124: Configuring A Port To Operate In Manual Voice Vlan Assignment Mode

    To do... Use the command... Remarks Optional By default, the automatic voice Configure the port to operate in VLAN assignment mode is automatic voice VLAN assignment voice vlan mode auto enabled. mode The voice VLAN assignment modes on different ports are independent of one another.
  • Page 125: Displaying And Maintaining Voice Vlan

    To do... Use the command... Remarks Optional For the configuration procedure, This operation is required for Configure the voice VLAN as the see the chapter “VLAN untagged inbound voice traffic PVID of the trunk or hybrid port configuration.” and prohibited for tagged inbound voice traffic.
  • Page 126: Configuration Procedure

    Figure 10 Network diagram for automatic voice VLAN assignment mode configuration Configuration procedure # Create VLAN 2. <DeviceA> system-view [DeviceA] vlan 2 Please wait... Done. # Set the voice VLAN aging time to 30 minutes. [DeviceA] voice vlan aging 30 # Since GigabitEthernet 1/0/1 may receive both voice traffic and data traffic at the same time, to ensure the quality of voice packets and effective bandwidth use, configure voice VLANs to work in security mode.
  • Page 127: Manual Voice Vlan Assignment Mode Configuration Example

    <DeviceA> display voice vlan oui Oui Address Mask Description 0001-e300-0000 ffff-ff00-0000 Siemens phone 0003-6b00-0000 ffff-ff00-0000 Cisco phone 0004-0d00-0000 ffff-ff00-0000 Avaya phone 0011-1100-0000 ffff-ff00-0000 IP phone A 0011-2200-0000 ffff-ff00-0000 IP phone B 0060-b900-0000 ffff-ff00-0000 Philips/NEC phone 00d0-1e00-0000 ffff-ff00-0000 Pingtel phone 00e0-7500-0000 ffff-ff00-0000 Polycom phone 00e0-bb00-0000...
  • Page 128 Configuration procedure # Configure the voice VLAN to operate in security mode. A voice VLAN operates in security mode by default. (Optional) <DeviceA> system-view [DeviceA] voice vlan security enable # Add a recognizable OUI address 001 1-2200-0000. [DeviceA] voice vlan mac-address 0011-2200-0000 mask ffff-ff00-0000 description test # Create VLAN 2.
  • Page 129 Contents GVRP configuration ······················································································································································ 1   Introduction to GVRP ························································································································································· 1   GARP ········································································································································································· 1   GVRP ·········································································································································································· 5   Protocols and standards ·········································································································································· 5   GVRP configuration task list ············································································································································· 5   Configuring GVRP functions ············································································································································· 6   Configuring the GARP timers ··········································································································································· 7  ...
  • Page 130: Gvrp Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 131: Garp Messages

    Figure 1 How GARP works For example, a GVRP-enabled port registers and deregisters VLAN in the following cases. When the port receives a VLAN attribute declaration, it registers the VLAN attribute and joins the • VLAN. When the port receives a VLAN withdrawal, it deregisters the VLAN and leaves the VLAN. •...
  • Page 132 H3C's implementation of GARP uses the following timers to control GARP message transmission: Hold timer The Hold timer sets the delay that a GARP participant waits before sending a Join or Leave message. When an attribute value changes or a Join or Leave message arrives, the GARP participant does not send the message immediately.
  • Page 133 GARP PDU format Figure 2 GARP PDU format Ethernet frame Length DSAP SSAP Ctrl GARP PDU Protocol ID Message 1 Message n End mark Attribute type Attribute list Attribute 1 Attribute n End mark Attribute length Attribute event Attribute value As shown in Figure 2, GARP PDUs are encapsulated in IEEE 802.3 Ethernet frames.
  • Page 134: Gvrp

    The destination MAC addresses of GARP messages are multicast MAC addresses, and vary with GARP applications. For example, the destination MAC address of GVRP is 01-80-C2-00-00-21. GVRP GVRP overview As a GARP application, GVRP uses the operating mechanism of GARP to maintain and propagate dynamic VLAN registrations throughout a switched LAN.
  • Page 135: Configuring Gvrp Functions

    Configuring GVRP functions Before enabling GVRP on a port, you must enable GVRP globally. In addition, GVRP can be configured only on trunk ports, and you must assign the involved trunk ports to all dynamic VLANs. Follow these steps to configure GVRP functions on a trunk port: To do…...
  • Page 136: Configuring The Garp Timers

    Configuring the GARP timers Follow these steps to configure the GARP timers: To do… Use the command… Remarks Enter system view system-view –– Optional 1000 centiseconds by default. timer-value Configure the GARP LeaveAll timer garp timer leaveall The LeaveAll timer applies to all ports.
  • Page 137: Displaying And Maintaining Gvrp

    Displaying and maintaining GVRP To do… Use the command… Remarks display garp statistics [ interface interface-list Display statistics about GARP on ports ] [ | { begin | exclude | Available in any view regular-expression include } display garp timer [ interface interface-list Display GARP timers on ports ] [ | { begin | exclude |...
  • Page 138 Configuration procedure Configure Device A # Enable GVRP globally. <DeviceA> system-view [DeviceA] gvrp # Configure port GigabitEthernet 1/0/1 as a trunk port, and assign it to all VLANs. [DeviceA] interface gigabitethernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] port link-type trunk [DeviceA-GigabitEthernet1/0/1] port trunk permit vlan all # Enable GVRP on trunk port GigabitEthernet 1/0/1.
  • Page 139: Gvrp Fixed Registration Mode Configuration Example

    According to the output, information about VLAN 1, static VLAN information of VLAN 3 on the local device, and dynamic VLAN information of VLAN 2 on Device A are all registered through GVRP. GVRP fixed registration mode configuration example Network requirements As shown in Figure Device A and Device B are connected through their ports GigabitEthernet 1/0/1.
  • Page 140: Gvrp Forbidden Registration Mode Configuration Example

    # Create VLAN 3 (a static VLAN). [DeviceB] vlan 3 [DeviceB-vlan3] quit Verify the configuration Use the display gvrp local-vlan command to display the local VLAN information maintained by GVRP on ports. For example: # Display the local VLAN information maintained by GVRP on port GigabitEthernet 1/0/1 of Device A. [DeviceA] display gvrp local-vlan interface gigabitethernet 1/0/1 Following VLANs exist in GVRP local database: 1(default), 2...
  • Page 141 [DeviceA-GigabitEthernet1/0/1] quit # Create VLAN 2 (a static VLAN). [DeviceA] vlan 2 [DeviceA-vlan2] quit Configure Device B # Enable GVRP globally. <DeviceB> system-view [DeviceB] gvrp # Configure port GigabitEthernet 1/0/1 as a trunk port, and assign it to all VLANs. [DeviceB] interface gigabitethernet 1/0/1 [DeviceB-GigabitEthernet1/0/1] port link-type trunk [DeviceB-GigabitEthernet1/0/1] port trunk permit vlan all...
  • Page 142 Contents LLDP configuration ························································································································································ 1   Overview ············································································································································································ 1   Background ······························································································································································· 1   Basic concepts ·························································································································································· 1   How LLDP works ······················································································································································· 6   Protocols and standards ·········································································································································· 6   LLDP configuration task list ··············································································································································· 6   Performing basic LLDP configuration ······························································································································· 7  ...
  • Page 143: Lldp Configuration

    The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless • switch. The WX3000E series comprises WX3024E and WX3010E wireless switches. • The port numbers in this chapter are for illustration only. •...
  • Page 144 Figure 1 Ethernet II-encapsulated LLDPDU format Destination MAC address Source MAC address Type Data = LLDPU (1500 bytes) The fields in the Ethernet II-encapsulated LLDPDU are described in Table Table 1 Fields in an Ethernet II-encapsulated LLDPDU Field Description The MAC address to which the LLDPDU is advertised. It is fixed to Destination MAC address 0x0180-C200-000E, a multicast MAC address.
  • Page 145 Table 2 Fields in a SNAP-encapsulated LLDPDU Field Description The MAC address to which the LLDPDU is advertised. It is fixed at Destination MAC address 0x0180-C200-000E, a multicast MAC address. Source MAC address The MAC address of the sending port. The SNAP type for the upper layer protocol.
  • Page 146 Type Description Remarks Time To Live Life of the transmitted information on the receiving device End of LLDPDU Marks the end of the TLV sequence in the LLDPDU Port Description Port description of the sending port System Name Assigned name of the sending device System Description Description of the sending device Optional...
  • Page 147 NOTE: The Power Stateful Control TLV is defined in IEEE P802.3at D1.0. The later versions no longer support this TLV. H3C devices send this type of TLVs only after receiving them. LLDP-MED TLVs LLDP-MED TLVs provide multiple advanced applications for voice over IP (VoIP), such as basic configuration, network policy configuration, and address and directory management.
  • Page 148: How Lldp Works

    How LLDP works Operating Modes of LLDP LLDP can operate in one of the following modes: TxRx mode. A port in this mode sends and receives LLDPDUs. • Tx mode. A port in this mode only sends LLDPDUs. • • Rx mode.
  • Page 149: Performing Basic Lldp Configuration

    Task Remarks Setting the LLDP re-initialization delay Optional Enabling LLDP polling Optional Configuring the advertisable TLVs Optional Configuring the management address and its Optional encoding format Setting other LLDP parameters Optional Setting an encapsulation format for LLDPDUs Optional Configuring CDP compatibility Optional Configuring LLDP trapping Optional...
  • Page 150: Setting The Lldp Re-Initialization Delay

    Follow these steps to set the LLDP operating mode: To do… Use the command… Remarks Enter system view system-view — interface-type Enter Ethernet Enter Layer 2 Ethernet interface Required interface-number interface view interface view or port group Use either command. port-group-name Enter port group view port-group manual...
  • Page 151: Configuring The Management Address And Its Encoding Format

    To do… Use the command… Remarks Enter Enter Layer 2 interface-type interface-number Ethernet Ethernet interface interface Required interface view view or Use either command. Enter port group port group port-group-name port-group manual view view lldp tlv-enable { basic-tlv { all | port-description | system-capability | system-description | Optional system-name } | dot1-tlv { all | port-vlan-id |...
  • Page 152: Setting Other Lldp Parameters

    To do… Use the command… Remarks Optional Configure the encoding format of the lldp management address as character management-address-for By default, the management address is string mat string encapsulated in the numeric format. Setting other LLDP parameters The Time to Live TLV carried in an LLDPDU determines how long the device information carried in the LLDPDU can be saved on a recipient device.
  • Page 153: Configuring Cdp Compatibility

    By default, LLDPDUs are encapsulated in Ethernet II frames. If the neighbor devices encapsulate LLDPDUs in SNAP frames, configure the encapsulation format for LLDPDUs as SNAP to guarantee normal communication with the neighbors. Follow these steps to set the encapsulation format for LLDPDUs to SNAP: To do…...
  • Page 154: Configuring Lldp Trapping

    Disable: CDP packets cannot be transmitted or received. • To make CDP-compatible LLDP take effect on specific ports, first enable CDP-compatible LLDP globally, and then configure CDP-compatible LLDP to operate in TxRx mode. Follow these steps to enable LLDP to be compatible with CDP: To do…...
  • Page 155: Displaying And Maintaining Lldp

    Displaying and maintaining LLDP To do… Use the command… Remarks Display the global LLDP display lldp local-information [ global | interface-type interface-number information or the information interface ] [ | Available in any view contained in the LLDP TLVs to be { begin | exclude | include } regular-expression sent through a port...
  • Page 156 Configuration procedure Configure Switch A # Enable LLDP globally. <SwitchA> system-view [SwitchA] lldp enable # Enable LLDP on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 (you can skip this step because LLDP is enabled on ports by default), and set the LLDP operating mode to Rx. [SwitchA] interface gigabitethernet 1/0/1 [SwitchA-GigabitEthernet1/0/1] lldp enable [SwitchA-GigabitEthernet1/0/1] lldp admin-status rx...
  • Page 157 Number of MED neighbors Number of CDP neighbors Number of sent optional TLV Number of received unknown TLV : 0 Port 2 [GigabitEthernet1/0/2]: Port status of LLDP : Enable Admin status : Rx_Only Trap flag : No Polling interval : 0s Number of neighbors: Number of MED neighbors Number of CDP neighbors...
  • Page 158: Cdp-Compatible Lldp Configuration Example

    Trap flag : No Polling interval : 0s Number of neighbors Number of MED neighbors Number of CDP neighbors Number of sent optional TLV Number of received unknown TLV As the sample output shows, GigabitEthernet 1/0/2 of Switch A does not connect to any neighboring devices.
  • Page 159 [SwitchA] lldp compliance cdp # Enable LLDP (you can skip this step because LLDP is enabled on ports by default), configure LLDP to operate in TxRx mode, and configure CDP-compatible LLDP to operate in TxRx mode on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. [SwitchA] interface gigabitethernet 1/0/1 [SwitchA-GigabitEthernet1/0/1] lldp enable [SwitchA-GigabitEthernet1/0/1] lldp admin-status txrx...

This manual is also suitable for:

Wx3024eWx3010e