
iii
Configuration restrictions and guidelines ··········································································································· 63
Configuration procedure ······································································································································ 63
Configuring path costs of ports ···································································································································· 63
Specifying a standard for the device to use when it calculates the default path cost ··································· 63
Configuring path costs of ports···························································································································· 65
Configuration example ········································································································································· 65
Configuring the port priority ········································································································································· 65
Configuring the port link type······································································································································· 66
Configuration restrictions and guidelines ··········································································································· 66
Configuration procedure ······································································································································ 66
Configuring the mode a port uses to recognize and send MSTP packets ······························································· 67
Enabling outputting port state transition information·································································································· 67
Enabling the spanning tree feature ······························································································································ 68
Performing mCheck························································································································································ 68
Performing mCheck globally································································································································ 69
Performing mCheck in interface view ················································································································· 69
Configuring digest snooping ········································································································································ 69
Configuration prerequisites ·································································································································· 69
Configuration restrictions and guidelines ··········································································································· 70
Configuration procedure ······································································································································ 70
Digest snooping configuration example ············································································································· 70
Configuring No Agreement Check ······························································································································ 71
Configuration prerequisites ·································································································································· 72
Configuration procedure ······································································································································ 72
No Agreement Check configuration example···································································································· 73
Configuring protection functions ·································································································································· 73
Enabling BPDU guard ··········································································································································· 74
Enabling root guard·············································································································································· 74
Enabling loop guard ············································································································································· 75
Enabling TC-BPDU guard······································································································································ 75
Displaying and maintaining the spanning tree··········································································································· 76
MSTP configuration example········································································································································ 77
Network requirements··········································································································································· 77
Configuration procedure ······································································································································ 77
Configuring BPDU tunneling······································································································································81
Overview········································································································································································· 81
Background···························································································································································· 81
BPDU tunneling implementation··························································································································· 82
Configuration prerequisites··········································································································································· 83
Enabling BPDU tunneling ·············································································································································· 84
Configuration guidelines ······································································································································ 84
Enabling BPDU tunneling for a protocol in Layer 2 Ethernet interface view or port group view·················· 84
Enabling BPDU tunneling for a protocol in Layer 2 aggregate interface view··············································· 84
Configuring destination multicast MAC address for BPDUs······················································································ 85
BPDU tunneling for STP configuration example·········································································································· 85
Network requirements··········································································································································· 85
Configuration procedure ······································································································································ 86
BPDU tunneling for PVST configuration example········································································································ 86
Network requirements··········································································································································· 86
Configuration procedure ······································································································································ 87
Configuring VLANs····················································································································································88
Overview········································································································································································· 88
VLAN frame encapsulation ·································································································································· 89