Professional Documents
Culture Documents
18-MSTP Configuration - 206300 - 1285 - 0
18-MSTP Configuration - 206300 - 1285 - 0
18-MSTP Configuration - 206300 - 1285 - 0
Table of Contents
Table of Contents
Chapter 1 MSTP Configuration .................................................................................................... 1-1 1.1 MSTP Overview ................................................................................................................. 1-1 1.1.1 Introduction to STP ................................................................................................. 1-1 1.1.2 Introduction to MSTP ............................................................................................ 1-15 1.1.3 Protocols and Standards....................................................................................... 1-22 1.2 Configuration Task List .................................................................................................... 1-22 1.3 Configuring the Root Bridge ............................................................................................ 1-23 1.3.1 Configuring an MST Region.................................................................................. 1-23 1.3.2 Specifying the Root Bridge or a Secondary Root Bridge ...................................... 1-25 1.3.3 Configuring the Work Mode of MSTP Device ....................................................... 1-26 1.3.4 Configuring the Priority of the Current Device ...................................................... 1-27 1.3.5 Configuring the Maximum Hops of an MST Region.............................................. 1-28 1.3.6 Configuring the Network Diameter of a Switched Network ................................... 1-29 1.3.7 Configuring Timers of MSTP................................................................................. 1-30 1.3.8 Configuring the Timeout Factor............................................................................. 1-31 1.3.9 Configuring the Maximum Transmission Rate of Ports......................................... 1-32 1.3.10 Configuring Ports as Edge Ports......................................................................... 1-33 1.3.11 Configuring Whether Ports Connect to Point-to-Point Links............................... 1-34 1.3.12 Configuring the Mode a Port Uses to Recognize/Send MSTP Packets ............. 1-35 1.3.13 Enabling the Output of Port State Transition Information ................................... 1-36 1.3.14 Enabling the MSTP Feature................................................................................ 1-37 1.4 Configuring Leaf Nodes ................................................................................................... 1-38 1.4.1 Configuring an MST Region.................................................................................. 1-38 1.4.2 Configuring the Work Mode of MSTP ................................................................... 1-38 1.4.3 Configuring the Timeout Factor............................................................................. 1-38 1.4.4 Configuring the Maximum Transmission Rate of Ports......................................... 1-38 1.4.5 Configuring Ports as Edge Ports........................................................................... 1-38 1.4.6 Configuring Path Costs of Ports............................................................................ 1-38 1.4.7 Configuring Port Priority ........................................................................................ 1-41 1.4.8 Configuring Whether Ports Connect to Point-to-Point Links................................. 1-42 1.4.9 Configuring the Mode a Port Uses to Recognize/Send MSTP Packets ............... 1-42 1.4.10 Enabling Output of Port State Transition Information ......................................... 1-42 1.4.11 Enabling the MSTP Feature................................................................................ 1-42 1.5 Performing mCheck ......................................................................................................... 1-42 1.5.1 Configuration Prerequisites................................................................................... 1-43 1.5.2 Configuration Procedure ....................................................................................... 1-43 1.5.3 Configuration Example.......................................................................................... 1-43 1.6 Configuring Digest Snooping ........................................................................................... 1-44
Table of Contents
1.6.1 Configuration Prerequisites................................................................................... 1-44 1.6.2 Configuration Procedure ....................................................................................... 1-44 1.6.3 Configuration Example.......................................................................................... 1-45 1.7 Configuring No Agreement Check ................................................................................... 1-46 1.7.1 Prerequisites ......................................................................................................... 1-47 1.7.2 Configuration Procedure ....................................................................................... 1-47 1.7.3 Configuration Example.......................................................................................... 1-48 1.8 Configuring Protection Functions..................................................................................... 1-49 1.8.1 Configuration prerequisites ................................................................................... 1-49 1.8.2 Enabling BPDU Guard .......................................................................................... 1-49 1.8.3 Enabling Root Guard............................................................................................. 1-50 1.8.4 Enabling Loop Guard ............................................................................................ 1-51 1.8.5 Enabling TC-BPDU Attack Guard ......................................................................... 1-51 1.9 Displaying and Maintaining MSTP................................................................................... 1-52 1.10 MSTP Configuration Example ....................................................................................... 1-53
ii