H3C S3600V2 SERIES User manual

H3C S3600V2 Switch Series
Layer 2
—
LAN Switching Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 2108
Document version: 6W100-20131130

Copyright © 2013, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H3Care, , IRF, NetPilot, Netflow,
SecEngine, SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of
Hangzhou H3C Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.

Preface
The H3C S3600V2 documentation set includes 10 configuration guides, which describe the software
features for the H3C S3600V2 Switch Series Release 2108, and guide you through the software
configuration procedures. These configuration guides also provide configuration examples to help you
apply software features to different network scenarios.
The Layer 2—LAN Switching Configuration Guide describes LAN switching fundamentals and
configuration. It describes how to implement flow control and load sharing, isolate uses in the same
VLAN, eliminate Layer 2 loops, divide VLANs, transmit customer network packets through the public
network, and modify VLAN tags for packets.
This preface includes:
•Audience
•Added and modified features
•Conventions
•About the H3C S3600V2 documentation set
•Obtaining documentation
•Technical support
•Documentation feedback
Audience
This documentation is intended for:
•Network planners
•Field technical support and servicing engineers
•Network administrators working with the S3600V2 series
Added and modified features
Compared to Release 2101, Release 2108 adds and modifies the following features:
Confi
g
uration
g
uide Added and modified features
Ethernet interface N/A
Loopback and null interface N/A
Bulk interface configuration Bulk interface configuration is a newly added feature
MAC address table New features:
•Disabling MAC entry aging timer refresh based on destination MAC

Confi
g
uration
g
uide Added and modified features
address
•Enabling MAC address migration log notifying
MAC Information N/A
Ethernet link aggregation New feature: Configuring the maximum number of Selected ports
allowed in an aggregation group
Port Isolation N/A
Spanning tree N/A
BPDU tunneling N/A
VLAN N/A
Super VLAN N/A
Isolate-user-VLAN N/A
Voice VLAN
New features:
•Enabling LLDP to automatically discover IP phones
•Configuring LLDP to advertise a specific voice VLAN
•Dynamically advertising server-assigned VLANs through LLDP
Modified feature: The number of OUI addresses that can be configured
for the voice VLAN feature was changed from 16 to 128.
GVRP N/A
QinQ N/A
VLAN mapping N/A
LLDP
Modified feature: For the LLDP-compatible CDP features, the Addresses,
Capabilities, Software Version, Platform, Duplex, MTU, and System
Name fields were added to the CDP packets sent by the switch.
Service loopback group N/A
MVRP MVRP is a newly added feature.
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Descri
p
tion
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.

{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n> The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Descri
p
tion
Boldface Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Convention Descri
p
tion
< > Button names are inside angle brackets. For example, click <OK>.
[ ] Window names, menu items, data table and field names are inside square brackets. For
example, pop up the [New User] window.
/ Multi-level menus are separated by forward slashes. For example, [File/Create/Folder].
Symbols
Convention Descri
p
tion
WARNING An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT An alert that calls attention to essential information.
NOTE An alert that contains additional or supplementary information.
TIP An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.

About the H3C S3600V2 documentation set
The H3C S3600V2 documentation set includes:
Cate
g
or
y
Documents
Pur
p
oses
Product description and
specifications
Marketing brochure Describe product specifications and benefits.
Technology white papers
Provide an in-depth description of software features
and technologies.
Hardware specifications
and installation
Compliance and safety
manuals
CE DOCs
Provide regulatory information and the safety
instructions that must be followed during installation.
Installation quick starts Guides you through initial installation and setup
procedures to help you quickly set up your device.
Installation guides Provides a complete guide to switch installation and
specifications.
RPS Ordering Information
for H3C Low-End Ethernet
Switches
Helps you order RPSs for switches that can work with
an RPS.
User manuals for RPSs Describe the specifications, installation, and
replacement of RPSs.
H3C Low End Series
Ethernet Switches
Pluggable Modules
Manual
Describes the specifications of pluggable transceiver
modules.
Pluggable SFP[SFP+][XFP]
Transceiver Modules
Installation Guide
Describe the installation, and replacement of
SFP/SFP+/XFP transceiver modules.
Software configuration
Configuration guides Describe software features and configuration
procedures.
Command references Provide a quick reference to all available
commands.
Operations and
maintenance Release notes
Provide information about the product release,
including the version history, hardware and software
compatibility matrix, version upgrade information,
technical support information, and software
upgrading.
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web
at http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] – Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.

[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] – Provides the documentation released with the
software version.
Technical support
servi[email protected]
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.

i
Contents
Configuring Ethernet interfaces··································································································································· 1
Ethernet interface naming conventions ···························································································································1
Performing general configurations ··································································································································1
Configuring a combo interface·······························································································································1
Configuring basic settings of an Ethernet interface ······························································································2
Shutting down an Ethernet interface ······················································································································3
Configuring flow control on an Ethernet interface································································································3
Configuring link state change suppression on an Ethernet interface··································································4
Configuring loopback testing on an Ethernet interface························································································5
Configuring the link mode of an Ethernet interface······························································································6
Configuring jumbo frame support ··························································································································6
Enabling the auto power-down function on an Ethernet interface ······································································7
Configuring a Layer 2 Ethernet interface ·······················································································································7
Layer 2 Ethernet interface configuration task list ··································································································7
Configuring a port group ········································································································································8
Setting speed options for auto negotiation on an Ethernet interface··································································9
Configuring storm suppression ···························································································································· 10
Setting the statistics polling interval····················································································································· 10
Enabling loopback detection on an Ethernet interface ····················································································· 11
Setting the MDI mode of an Ethernet interface ·································································································· 13
Enabling bridging on an Ethernet interface ······································································································· 14
Testing the cable connection of an Ethernet interface······················································································· 14
Configuring storm control on an Ethernet interface··························································································· 15
Setting the MTU for a Layer 3 Ethernet interface········································································································ 16
Displaying and maintaining an Ethernet interface ····································································································· 16
Configuring loopback and null interfaces················································································································18
Configuring a loopback interface ································································································································ 18
Introduction to the loopback interface················································································································· 18
Configuration procedure ······································································································································ 18
Configuring a null interface ·········································································································································· 19
Introduction to the null interface··························································································································· 19
Configuration procedure ······································································································································ 19
Displaying and maintaining loopback and null interfaces························································································ 19
Bulk configuring interfaces ········································································································································21
Configuration guidelines ··············································································································································· 21
Configuration procedure··············································································································································· 21
Configuring the MAC address table ························································································································22
Overview········································································································································································· 22
How a MAC address table entry is created······································································································· 22
Types of MAC address table entries ··················································································································· 23
MAC address table-based frame forwarding ···································································································· 23
Configuring static, dynamic, and blackhole MAC address table entries ································································ 23
Configuring a static or dynamic MAC address table entry in system view···················································· 24
Configuring a static or dynamic MAC address table entry in interface view ················································ 24
Configuring a blackhole MAC address entry ···································································································· 24
Disabling MAC address learning on a VLAN ············································································································ 24
Configuring the aging timer for dynamic MAC address entries··············································································· 25

ii
Disabling MAC entry aging timer refresh based on destination MAC address ····················································· 25
Application example············································································································································· 26
Configuring the MAC learning limit on ports·············································································································· 26
Enabling MAC address roaming·································································································································· 27
Enabling MAC address migration log notifying········································································································· 28
Displaying and maintaining MAC address tables ····································································································· 29
MAC address table configuration example ················································································································ 29
Network requirements··········································································································································· 29
Configuration procedure ······································································································································ 30
Configuring MAC Information ··································································································································31
Overview········································································································································································· 31
Introduction to MAC Information ························································································································· 31
How MAC Information works ······························································································································ 31
Enabling MAC Information globally ···························································································································· 31
Enabling MAC Information on an interface ················································································································ 31
Configuring MAC Information mode ··························································································································· 32
Configuring the interval for sending Syslog or trap messages ················································································· 32
Configuring the MAC Information queue length ········································································································ 32
MAC Information configuration example···················································································································· 33
Network requirements··········································································································································· 33
Configuration procedure ······································································································································ 33
Configuring Ethernet link aggregation ·····················································································································34
Overview········································································································································································· 34
Basic concepts ······················································································································································· 34
Aggregating links in static mode························································································································· 37
Aggregating links in dynamic mode ··················································································································· 38
Load-sharing criteria for link aggregation groups ····························································································· 39
Configuration restrictions and guidelines···················································································································· 40
Ethernet link aggregation configuration task list········································································································· 40
Configuring an aggregation group ····························································································································· 40
Configuration guidelines ······································································································································ 41
Configuring a static aggregation group············································································································· 41
Configuring a dynamic aggregation group······································································································· 42
Configuring an aggregate interface ···························································································································· 44
Configuring the description of an aggregate interface····················································································· 44
Configuring the MTU of a Layer 3 aggregate interface ··················································································· 45
Enabling link state traps for an aggregate interface ························································································· 45
Limiting the number of Selected ports for an aggregation group ···································································· 46
Shutting down an aggregate interface ··············································································································· 47
Restoring the default settings for an aggregate interface ················································································· 47
Configuring load sharing for link aggregation groups······························································································ 48
Configuring load-sharing criteria for link aggregation groups ········································································ 48
Enabling local-first load sharing for link aggregation······················································································· 49
Enabling link-aggregation traffic redirection··············································································································· 50
Displaying and maintaining Ethernet link aggregation ····························································································· 51
Ethernet link aggregation configuration examples····································································································· 52
Layer 2 static aggregation configuration example···························································································· 52
Layer 2 dynamic aggregation configuration example······················································································ 54
Layer 3 static aggregation configuration example···························································································· 56
Layer 3 dynamic aggregation configuration example······················································································ 57
Configuring port isolation··········································································································································59
Assigning a port to the isolation group ······················································································································· 59
Displaying and maintaining the isolation group ········································································································ 59

iii
Port isolation configuration example···························································································································· 60
Configuring spanning tree protocols ························································································································61
STP ··················································································································································································· 61
STP protocol packets ············································································································································· 61
Basic concepts in STP············································································································································ 62
Calculation process of the STP algorithm ··········································································································· 63
RSTP················································································································································································· 68
PVST················································································································································································· 68
MSTP················································································································································································ 68
STP, RSTP, and PVST limitations ·························································································································· 68
MSTP features ························································································································································ 68
MSTP basic concepts ············································································································································ 69
How MSTP works ·················································································································································· 73
Implementation of MSTP on devices···················································································································· 73
Protocols and standards ················································································································································ 73
Spanning tree configuration task list···························································································································· 74
Configuration restrictions and guidelines ··········································································································· 74
STP configuration task list····································································································································· 74
RSTP configuration task list··································································································································· 75
PVST configuration task list··································································································································· 76
MSTP configuration task list ································································································································· 77
Setting the spanning tree mode···································································································································· 78
Configuring an MST region ·········································································································································· 79
Configuration restrictions and guidelines ··········································································································· 79
Configuration procedure ······································································································································ 79
Configuring the root bridge or a secondary root bridge ·························································································· 80
Configuration restrictions and guidelines ··········································································································· 80
Configuring the current device as the root bridge of a specific spanning tree·············································· 80
Configuring the current device as a secondary root bridge of a specific spanning tree······························ 81
Configuring the device priority····································································································································· 81
Configuring the maximum hops of an MST region ···································································································· 81
Configuring the network diameter of a switched network························································································· 82
Configuring spanning tree timers································································································································· 82
Configuration restrictions and guidelines ··········································································································· 83
Configuration procedure ······································································································································ 83
Configuring the timeout factor ······································································································································ 84
Configuring the maximum port rate····························································································································· 84
Configuring edge ports ················································································································································· 85
Configuration restrictions and guidelines ··········································································································· 85
Configuration procedure ······································································································································ 85
Configuring path costs of ports ···································································································································· 85
Specifying a standard for the device to use when it calculates the default path cost ··································· 86
Configuring path costs of ports···························································································································· 87
Configuration example ········································································································································· 88
Configuring the port priority ········································································································································· 88
Configuring the port link type······································································································································· 89
Configuration restrictions and guidelines ··········································································································· 89
Configuration procedure ······································································································································ 89
Configuring the mode a port uses to recognize/send MSTP packets······································································ 89
Enabling outputting port state transition information·································································································· 90
Enabling the spanning tree feature ······························································································································ 91
Configuration restrictions and guidelines ··········································································································· 91
Enabling the spanning tree feature (in STP/RSTP/MSTP mode) ······································································ 91
Enabling the spanning tree feature (in PVST mode) ·························································································· 91

iv
Performing mCheck························································································································································ 92
Performing mCheck globally································································································································ 92
Performing mCheck in interface view ················································································································· 92
Configuring Digest Snooping ······································································································································· 93
Configuration restrictions and guidelines ··········································································································· 93
Configuration procedure ······································································································································ 93
Digest Snooping configuration example············································································································· 94
Configuring No Agreement Check ······························································································································ 95
Configuration prerequisites ·································································································································· 96
Configuration procedure ······································································································································ 96
No Agreement Check configuration example···································································································· 97
Configuring TC snooping·············································································································································· 97
Configuration restrictions and guidelines ··········································································································· 98
Configuration procedure ······································································································································ 98
Configuring protection functions ·································································································································· 98
Configuration prerequisites ·································································································································· 98
Enabling BPDU guard ··········································································································································· 98
Enabling root guard·············································································································································· 99
Enabling loop guard ···········································································································································100
Enabling TC-BPDU guard····································································································································101
Enabling BPDU drop ···········································································································································101
Displaying and maintaining the spanning tree·········································································································102
Spanning tree configuration examples······················································································································102
MSTP configuration example ·····························································································································102
PVST configuration example ······························································································································106
Configuring BPDU tunneling··································································································································· 110
Overview·······································································································································································110
Background··························································································································································110
BPDU tunneling implementation·························································································································111
Enabling BPDU tunneling ············································································································································112
Configuration prerequisites ································································································································112
Configuration restrictions and guidelines ·········································································································113
Configuration procedure ····································································································································113
Configuring destination multicast MAC address for BPDUs····················································································113
BPDU tunneling configuration examples····················································································································114
BPDU tunneling for STP configuration example ·······························································································114
BPDU tunneling for PVST configuration example·····························································································115
Configuring VLANs················································································································································· 117
Overview·······································································································································································117
VLAN fundamentals·············································································································································117
VLAN types ··························································································································································118
Protocols and standards ·····································································································································119
Configuring basic VLAN settings································································································································119
Configuration restrictions and guidelines ·········································································································119
Configuration procedure ····································································································································119
Configuring basic settings of a VLAN interface ·······································································································120
Configuration procedure ····································································································································120
VLAN interface configuration example·············································································································121
Configuring port-based VLANs···································································································································122
Introduction to port-based VLAN ·······················································································································122
Assigning an access port to a VLAN ················································································································123
Assigning a trunk port to a VLAN······················································································································124
Assigning a hybrid port to a VLAN···················································································································125

v
Port-based VLAN configuration example··········································································································126
Configuring MAC-based VLANs ································································································································128
Introduction to MAC-based VLAN ·····················································································································128
Configuration restrictions and guidelines ·········································································································130
Configuration procedure ····································································································································131
MAC-based VLAN configuration example ·······································································································133
Configuring protocol-based VLANs ···························································································································135
Introduction to protocol-based VLAN ················································································································135
Configuration restrictions and guidelines ·········································································································135
Configuration procedure ····································································································································136
Protocol-based VLAN configuration example···································································································137
Configuring IP subnet-based VLANs ··························································································································139
Configuration procedure ····································································································································139
IP subnet-based VLAN configuration example ·································································································140
Displaying and maintaining VLAN ····························································································································142
Configuring a super VLAN····································································································································· 144
Overview·······································································································································································144
Configuration procedure·············································································································································144
Displaying and maintaining super VLAN··················································································································146
Super VLAN configuration example ··························································································································146
Configuring an isolate-user-VLAN·························································································································· 149
Overview·······································································································································································149
Configuration restrictions and guidelines··················································································································150
Configuration procedure·············································································································································150
Displaying and maintaining isolate-user-VLAN·········································································································151
Isolate-user-VLAN configuration example ··················································································································152
Network requirements·········································································································································152
Configuration procedure ····································································································································152
Verifying the configuration·································································································································153
Configuring a voice VLAN ····································································································································· 155
Overview·······································································································································································155
Methods of identifying IP phones ·······························································································································155
OUI addresses ·····················································································································································155
Automatically identifying IP phones through LLDP ···························································································156
Configuring a device to advertise voice VLAN information to IP phones······························································156
How a device advertises voice VLAN information ··························································································156
How a device obtains voice VLAN information·······························································································156
IP phone access methods ············································································································································157
Connecting the host and the IP phone in series·······························································································157
Connecting the IP phone to the device separately ··························································································157
Configuring a voice VLAN on a port·························································································································157
Voice VLAN assignment modes·························································································································157
Security mode and normal mode of voice VLANs···························································································159
Configuration prerequisites ································································································································160
Configuring QoS priority settings for voice traffic on an interface································································160
Configuring a port to operate in automatic voice VLAN assignment mode·················································161
Configuring a port to operate in manual voice VLAN assignment mode ·····················································162
Enabling LLDP to automatically discover IP phones··································································································163
Configuration prerequisites ································································································································163
Configuration procedure ····································································································································164
Configuring LLDP to advertise a specific voice VLAN······························································································164
Configuration guidelines ····································································································································164
Configuration procedure ····································································································································165

vi
Dynamically advertising server-assigned VLANs through LLDP···············································································165
Overview······························································································································································165
Example for using 802.1X to authenticate IP phones ·····················································································165
Displaying and maintaining voice VLAN ··················································································································166
Voice VLAN configuration examples ·························································································································166
Automatic voice VLAN mode configuration example ·····················································································166
Manual voice VLAN assignment mode configuration example ·····································································168
Configuring GVRP··················································································································································· 171
Overview·······································································································································································171
GARP ····································································································································································171
GVRP·····································································································································································174
Protocols and standards ·····································································································································174
GVRP configuration task list········································································································································174
Configuring GVRP functions········································································································································175
Configuration restrictions and guidelines ·········································································································175
Configuration procedure ····································································································································175
Configuring the GARP timers······································································································································176
Displaying and maintaining GVRP·····························································································································177
GVRP configuration examples ····································································································································177
GVRP normal registration mode configuration example·················································································177
GVRP fixed registration mode configuration example ····················································································179
GVRP forbidden registration mode configuration example············································································180
Configuring QinQ··················································································································································· 182
Overview·······································································································································································182
Background and benefits····································································································································182
How QinQ works················································································································································182
QinQ frame structure ··········································································································································183
Implementations of QinQ ···································································································································184
Protocols and standards ·····································································································································184
QinQ configuration task list········································································································································184
Configuring basic QinQ ·············································································································································185
Enabling basic QinQ··········································································································································185
Configuring VLAN transparent transmission ····································································································185
Configuring selective QinQ ········································································································································186
Configuring an outer VLAN tagging policy ·····································································································186
Configuring an inner-outer VLAN 802.1p priority mapping··········································································187
Configuring inner VLAN ID substitution ············································································································188
Configuring the TPID value in VLAN tags··················································································································189
Configuring the CVLAN TPID ·····························································································································190
Configuring the SVLAN TPID······························································································································190
QinQ configuration examples ····································································································································190
Basic QinQ configuration example···················································································································190
VLAN transparent transmission configuration example ··················································································193
Simple selective QinQ configuration example·································································································194
Comprehensive selective QinQ configuration example··················································································197
Configuring VLAN mapping ·································································································································· 202
Overview·······································································································································································202
Application scenario of one-to-one and many-to-one VLAN mapping ··························································202
Application scenario of two-to-two VLAN mapping ························································································203
Concepts and terms ············································································································································204
VLAN mapping implementations ·······················································································································205
VLAN mapping configuration tasks ···························································································································206
Configuring one-to-one VLAN mapping ····················································································································207

vii
Configuration prerequisites ································································································································207
Configuring an uplink policy······························································································································207
Configuring a downlink policy ··························································································································207
Configuring the customer-side port····················································································································208
Configuring the network-side port ·····················································································································209
Configuring many-to-one VLAN mapping ·················································································································209
Configuration prerequisites ································································································································210
Enabling DHCP snooping···································································································································210
Enabling ARP detection in SVLANs ···················································································································210
Configuring an uplink policy······························································································································210
Configuring the customer-side port····················································································································211
Configuring the network-side port ·····················································································································212
Configuring two-to-two VLAN mapping·····················································································································212
Configuring an uplink policy for the customer-side port ·················································································213
Configuring an uplink policy for the network-side port···················································································213
Configuring a downlink policy for the customer-side port ··············································································214
Configuring the customer-side port····················································································································215
Configuring the network-side port ·····················································································································215
VLAN mapping configuration examples ···················································································································216
One-to-one and many-to-one VLAN mapping configuration example···························································216
Two-to-two VLAN mapping configuration example·························································································222
Configuring LLDP····················································································································································· 225
Overview·······································································································································································225
Background··························································································································································225
Basic concepts ·····················································································································································225
How LLDP works ··················································································································································229
Protocols and standards ·····································································································································230
LLDP configuration task list ··········································································································································230
Performing basic LLDP configuration··························································································································230
Enabling LLDP ······················································································································································230
Setting the LLDP operating mode ·······················································································································231
Setting the LLDP re-initialization delay ··············································································································231
Enabling LLDP polling··········································································································································232
Configuring the advertisable TLVs ·····················································································································232
Configuring the management address and its encoding format····································································233
Setting other LLDP parameters····························································································································233
Setting an encapsulation format for LLDPDUs ··································································································234
Configuring CDP compatibility···································································································································235
Configuration prerequisites ································································································································236
Configuration procedure ····································································································································236
Configuring LLDP trapping ··········································································································································237
Displaying and maintaining LLDP·······························································································································237
LLDP configuration examples ······································································································································238
Basic LLDP configuration example·····················································································································238
CDP-compatible LLDP configuration example···································································································240
Configuring a service loopback group·················································································································· 243
Overview·······································································································································································243
Service types of service loopback groups ········································································································243
Requirements on service loopback ports ··········································································································243
States of service loopback ports ························································································································243
Configuration restrictions and guidelines··················································································································244
Configuration procedure·············································································································································244
Displaying and maintaining service loopback groups·····························································································245

viii
Service loopback group configuration example·······································································································245
Network requirements·········································································································································245
Configuration procedure ····································································································································245
Configuring MVRP ·················································································································································· 247
Overview·······································································································································································247
Introduction to MRP ·············································································································································247
MVRP registration modes ···································································································································249
Protocols and standards ·····································································································································250
MVRP configuration task list········································································································································250
Configuration prerequisites·········································································································································250
Enabling MVRP·····························································································································································250
Configuration restrictions and guidelines ·········································································································250
Configuration procedure ····································································································································251
Configuring the MVRP registration mode··················································································································251
Configuring MRP timers···············································································································································252
Enabling GVRP compatibility······································································································································253
Configuration restrictions and guidelines ·········································································································253
Configuration procedure ····································································································································253
Displaying and maintaining MVRP ····························································································································253
Configuration example for MVRP in normal registration mode··············································································254
Network requirements·········································································································································254
Configuration procedure ····································································································································255
Index ········································································································································································ 264

1
Configuring Ethernet interfaces
Ethernet interface naming conventions
The Ethernet interfaces on the S3600V2 switches are named in the format of interface-type A/B/C,
where the following definitions apply:
•A—Represents the ID of the switch in an IRF fabric. If the switch is not assigned to any IRF fabric, A
uses 1.
•B—Represents a slot number on the switch. It takes 0.
•C—Represents the number of an interface on a slot.
Performing general configurations
This section describes the attributes and configurations common to Layer 2 and Layer 3 Ethernet
interfaces.
•For more information about the attributes and configuration of Layer 2 Ethernet interfaces, see
"Configuring a Layer 2 Ethernet interface."
•For more information about the attributes and configuration of Layer 3 Ethernet interfaces, see
"Setting the MTU for a Layer 3 Ethernet interface."
Configuring a combo interface
A combo interface is a logical interface that comprises one optical (fiber) port and one electrical (copper)
port. The two ports share one forwarding interface, so they cannot work simultaneously. When you
enable either port, the other port is automatically disabled.
The fiber combo port and the copper combo port share one interface view, in which you can activate the
fiber or copper combo port and configure other port attributes such as the interface rate and duplex
mode.
Configuration prerequisites
Before you configure combo interfaces, complete the following tasks:
•An S3600V2 switch provides two combo interfaces. The fiber port and copper port of a combo
interface have the same port number. For more information about the combo interface numbers, see
the installation guide of a specific model.
•Use the display interface command to determine which port (fiber or copper) of the combo
interface is active. If the current port is the copper port, the output will include "Media type is
twisted pair, Port hardware type is 1000_BASE_T". If the current port is the fiber port, the output will
not include the information mentioned above. You can also use the display this command in the
view of the combo interface to view the combo interface configuration. If the combo enable fiber
command exists, the fiber port is active; if the command does not exist, the copper fiber is active.
Changing the active port of a combo interface

2
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enter the Ethernet interface
view.
interface interface-type
interface-number N/A
3. Activate the copper combo
port or fiber combo port. combo enable {copper |fiber }
Optional.
By default, the copper combo port
is active.
Configuring basic settings of an Ethernet interface
You can set an Ethernet interface to operate in one of the following duplex modes:
•Full-duplex mode (full)—Interfaces that operate in this mode can send and receive packets
simultaneously.
•Half-duplex mode (half)—Interfaces that operate in this mode cannot send and receive packets
simultaneously.
•Auto-negotiation mode (auto)—Interfaces that operate in this mode negotiate a duplex mode with
their peers.
You can set the speed of an Ethernet interface or enable it to automatically negotiate a speed with its
peer. For a 100-Mbps or 1000-Mbps Layer 2 Ethernet interface, you can also set speed options for auto
negotiation. The two ends can select a speed only from the available options. For more information, see
"Setting speed options for auto negotiation on an Ethernet interface."
To configure an Ethernet interface:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enter Ethernet
interface view.
interface interface-type
interface-number N/A
3. Set the interface
description. description text
Optional.
By default, the description of an interface is in the format
of interface-name Interface. For example,
Ethernet1/0/1 Interface.
4. Set the duplex
mode of the
interface.
duplex { auto | full |
half }
Optional.
Fiber ports and combo interfaces do not support the half
keyword.
By default, the duplex mode is auto for Ethernet
interfaces.
5. Set the port speed. speed { 10 | 100 |1000
|auto }
Optional.
By default, an Ethernet interface automatically
negotiates a speed with the peer.
The 10 and 1000 keywords are not applicable to
100-Mbps fiber ports.
The 10 and 100 keywords are not applicable to GE
fiber ports and copper combo port.

3
Ste
p
Command
Remarks
6. Restore the default
settings for the
interface.
default Optional.
NOTE:
Make sure that the fiber port speed matches the speed requirement of the inserted transceiver module. For
example, after you insert a 1000-Mbps transceiver module into a fiber port, confi
g
ure the port speed with
the speed 1000 or speed auto command.
Shutting down an Ethernet interface
CAUTION:
Use this feature with caution. After you manually shut down an Ethernet interface, the Ethernet interface
cannot forward packets even if it is physically connected.
You might need to shut down and then bring up an Ethernet interface to activate some configuration
changes, for example, the speed or duplex mode changes.
To shut down an Ethernet interface or a group of Ethernet interfaces:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enter Ethernet
interface view or
port group view.
•Enter Ethernet interface view:
interface interface-type
interface-number
•Enter port group view:
port-group manual port-group-name
Use any command.
To shut down an Ethernet interface,
enter Ethernet interface.
To shut down all Ethernet interfaces in
a port group, enter port group view.
3. Shut down the
Ethernet interface
or interfaces.
shutdown By default, Ethernet interfaces are up.
Configuring flow control on an Ethernet interface
To avoid packet drops on a link, you can enable flow control at both ends of the link. When traffic
congestion occurs at the receiving end, the receiving end sends a flow control (Pause) frame to ask the
sending end to suspend sending packets.
Flow control is implemented by receiving and sending Pause frames on ports. Flow control can operate
in one of the following modes on an interface:
•TxRx mode (configured by using the flow-control command)—The interface can both send and
receive flow control frames.
•Rx mode (configured by using the flow-control receive enable command)—The interface can
receive, but not send flow control frames.
As shown in Figure 1, when both Port A and Port B forward packets at the rate of 1000 Mbps, Port C is
congested. To avoid packet loss, enable flow control on Port A and Port B.

4
Figure 1 Flow control on ports
Configure flow control in TxRx mode on Port B and flow control in Rx mode on Port A:
•When congestion occurs on Port C, Switch B buffers frames. When the amount of buffered frames
exceeds a certain value, Switch B sends a common Pause frame out of Port B to ask Port A to
suspend sending packets. This Pause frame also tells Port A for how long it is expected to pause.
•Upon receiving the common Pause frame from Port B, Port A suspends sending packets to Port B for
a period.
•If congestion persists, Port B keeps sending common Pause frames to Port A until the congestion
condition is removed.
To handle unidirectional traffic congestion on a link, configure the flow-control receive enable command
at one end, and the flow-control command at the other. To enable both ends of the link to handle traffic
congestion, configure the flow-control command at both ends.
To enable flow control on an Ethernet interface:
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number N/A
3. Enable flow control.
•Enable TxRx flow control:
flow-control
•Enable Rx flow control:
flow-control receive enable
Use either command.
By default, Rx flow control is disabled
on an Ethernet interface.
Configuring link state change suppression on an Ethernet
interface
An Ethernet interface has two physical link states: up and down. Each time the physical link of an
interface goes up or comes down, the physical layer reports the change to the upper layers, and the
upper layers handle the change, resulting in increased overhead.
To prevent physical link flapping from affecting system performance, configure link change suppression
to delay the reporting of physical link state changes. When the delay expires, the interface reports any
detected change.
Link change suppression does not suppress administrative up or down events. When you shut down or
bring up an interface by using the shutdown or undo shutdown command, the interface reports the event
to the upper layers immediately.
Link-down event suppression enables an interface to suppress link-down events and start a delay timer
each time the physical link goes down. During this delay, the interface does not report the link-down
event, and the display interface brief or display interface command displays the interface state as UP. If

5
the physical link is still down when the timer expires, the interface reports the link-down event to the upper
layers.
Link-up event suppression enables an interface to suppress link-up events and start a delay timer each
time the physical link goes up. During this delay, the interface does not report the link-up event, and the
display interface brief or display interface command displays the interface state as DOWN. If the
physical link is still up when the timer expires, the interface reports the link-up event to the upper layers.
Configuring link-down event suppression
To enable an Ethernet interface to suppress link-down events:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number N/A
3. Set a link-down event
suppression interval. link-delay delay-time Link-down event suppression is disabled by
default.
Configuring link-up event suppression
To configure link-up event suppression on an Ethernet interface:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number N/A
3. Set a link-up event
suppression interval. link-delay delay-time mode up
Link-up event suppression is disabled by
default.
NOTE:
The link-delay mode up command and the link-delay
command supersedes each other, and whichever is
configured last takes effect.
Configuring loopback testing on an Ethernet interface
If an Ethernet interface does not work correctly, you can enable loopback testing on it to identify the
problem. Loopback testing has the following types:
•Internal loopback testing—Tests all on-chip functions related to Ethernet interfaces.
•External loopback testing—Tests hardware of Ethernet interfaces. To perform external loopback
testing on an Ethernet interface, connect a loopback plug to the Ethernet interface. The switch sends
test packets out of the interface, which are expected to loop over the plug and back to the interface.
If the interface fails to receive any test packet, the hardware of the interface is faulty.
An Ethernet interface in a loopback test does not forward data traffic.
Configuration restrictions and guidelines
•On an interface administratively shut down, you can perform neither internal nor external loopback
testing.
Other manuals for S3600V2 SERIES
1
Table of contents
Other H3C Network Router manuals

H3C
H3C CR19000-20 User manual

H3C
H3C MSR3600-28-X1 User manual

H3C
H3C SR6600-X User manual

H3C
H3C S3100 Series User manual

H3C
H3C SecPath M9000-S NSQM2MPUD0 User manual

H3C
H3C CR16000-FA Series Instruction Manual

H3C
H3C S1016 User manual

H3C
H3C MSR-20-21 ROUTER User manual

H3C
H3C HIM-8FE User manual

H3C
H3C S5510 Series User manual
Popular Network Router manuals by other brands

Lorex
Lorex LH040 ECO SERIES quick start guide

Nortel
Nortel Passport 8600 Series Terminology

SMC Networks
SMC Networks TigerSwitch SMC6709FL2 Management guide

ZyXEL Communications
ZyXEL Communications PRESTIGE 650H - brochure

Cabletron Systems
Cabletron Systems SmartSwitch Router User's reference manual

Billion
Billion BiPAC 7800GZ(L) user manual