
iii
Implementation of MSTP on devices ·······································································································60
Protocols and standards ··································································································································60
Spanning tree configuration task list ················································································································61
Configuration restrictions and guidelines ·································································································61
STP configuration task list························································································································61
RSTP configuration task list ·····················································································································62
PVST configuration task list ·····················································································································63
MSTP configuration task list·····················································································································64
Setting the spanning tree mode ·······················································································································65
Configuring an MST region ······························································································································65
Configuration restrictions and guidelines ·································································································66
Configuration procedure···························································································································66
Configuring the root bridge or a secondary root bridge ···················································································66
Configuration restrictions and guidelines ·································································································67
Configuring the current device as the root bridge of a specific spanning tree ·········································67
Configuring the current device as a secondary root bridge of a specific spanning tree···························67
Configuring the device priority ·························································································································68
Configuring the maximum hops of an MST region···························································································68
Configuring the network diameter of a switched network ················································································69
Configuring spanning tree timers ·····················································································································69
Configuration restrictions and guidelines ·································································································70
Configuration procedure···························································································································70
Configuring the timeout factor··························································································································70
Configuring the maximum port rate··················································································································71
Configuring edge ports·····································································································································71
Configuration restrictions and guidelines ·································································································72
Configuration procedure···························································································································72
Configuring path costs of ports ························································································································72
Specifying a standard for the device to use when it calculates the default path cost ······························72
Configuring path costs of ports ················································································································74
Configuration example ·····························································································································74
Configuring the port priority······························································································································75
Configuring the port link type ···························································································································75
Configuration restrictions and guidelines ·································································································75
Configuration procedure···························································································································76
Configuring the mode a port uses to recognize/send MSTP packets ······························································76
Enabling outputting port state transition information························································································77
Enabling the spanning tree feature ··················································································································77
Configuration restrictions and guidelines ·································································································77
Enabling the spanning tree feature (in STP/RSTP/MSTP mode) ····························································78
Enabling the spanning tree feature (in PVST mode)················································································78
Performing mCheck ·········································································································································79
Performing mCheck globally ····················································································································79
Performing mCheck in interface view·······································································································79
Configuring Digest Snooping ···························································································································79
Configuration restrictions and guidelines ·································································································80
Configuration procedure···························································································································80
Digest Snooping configuration example···································································································80
Configuring No Agreement Check ···················································································································81
Configuration prerequisites ······················································································································82
Configuration procedure···························································································································82
No Agreement Check configuration example···························································································83
Configuring TC snooping ·································································································································83
Configuration restrictions and guidelines ·································································································84
Configuration procedure···························································································································84
Configuring protection functions ······················································································································84
Configuration prerequisites ······················································································································85
Enabling BPDU guard ······························································································································85
Enabling root guard··································································································································86
Enabling loop guard ·································································································································87
Enabling TC-BPDU guard ························································································································87
Enabling BPDU drop ································································································································88