
iv
Configuration procedure ····································································································································102
Setting the timeout factor·············································································································································102
Configuring the BPDU transmission rate····················································································································103
Configuring edge ports ···············································································································································103
Configuration restrictions and guidelines ·········································································································103
Configuration procedure ····································································································································104
Configuring path costs of ports ··································································································································104
Specifying a standard for the device to use when it calculates the default path cost ·································104
Configuring path costs of ports··························································································································107
Configuration example ·······································································································································107
Configuring the port priority ·······································································································································107
Configuring the port link type·····································································································································108
Configuration restrictions and guidelines ·········································································································108
Configuration procedure ····································································································································108
Configuring the mode a port uses to recognize and send MSTP packets ·····························································109
Enabling outputting port state transition information································································································109
Enabling the spanning tree feature ····························································································································110
Enabling the spanning tree feature in STP/RSTP/MSTP mode·······································································110
Enabling the spanning tree feature in PVST mode···························································································110
Performing mCheck······················································································································································111
Configuration restrictions and guidelines ·········································································································111
Configuration procedure ····································································································································111
Configuring Digest Snooping ·····································································································································112
Configuration restrictions and guidelines ·········································································································112
Configuration procedure ····································································································································113
Digest Snooping configuration example···········································································································113
Configuring No Agreement Check ····························································································································114
Configuration prerequisites ································································································································115
Configuration procedure ····································································································································115
No Agreement Check configuration example··································································································116
Configuring TC Snooping ···········································································································································116
Configuration restrictions and guidelines ·········································································································117
Configuration procedure ····································································································································117
Configuring protection functions ································································································································118
Enabling BPDU guard ·········································································································································118
Enabling root guard············································································································································118
Enabling loop guard ···········································································································································119
Configuring port role restriction·························································································································120
Configuring TC-BPDU transmission restriction··································································································120
Enabling TC-BPDU guard····································································································································121
Enabling BPDU drop ···········································································································································121
Displaying and maintaining the spanning tree·········································································································122
Spanning tree configuration example························································································································122
Network requirements·········································································································································122
Configuration procedure ····································································································································123
Verifying the configuration·································································································································125
PVST configuration example ·······································································································································126
Network requirements·········································································································································126
Configuration procedure ····································································································································127
Verifying the configuration·································································································································128
Configuring loop detection····································································································································· 130
Overview·······································································································································································130
Loop detection mechanism ·································································································································130
Loop detection interval········································································································································131