
iv
Configuring the port priority ·······································································································································102
Configuring the port link type·····································································································································103
Configuration restrictions and guidelines ·········································································································103
Configuration procedure ····································································································································103
Configuring the mode a port uses to recognize and send MSTP packets ·····························································104
Enabling outputting port state transition information································································································104
Enabling the spanning tree feature ····························································································································105
Enabling the spanning tree feature in STP/RSTP/MSTP mode·······································································105
Enabling the spanning tree feature in PVST mode···························································································105
Performing mCheck······················································································································································106
Configuration restrictions and guidelines ·········································································································106
Configuration procedure ····································································································································106
Configuring Digest Snooping ·····································································································································107
Configuration restrictions and guidelines ·········································································································107
Configuration procedure ····································································································································108
Digest Snooping configuration example···········································································································108
Configuring No Agreement Check ····························································································································109
Configuration prerequisites ································································································································110
Configuration procedure ····································································································································110
No Agreement Check configuration example··································································································111
Configuring TC Snooping ···········································································································································111
Configuration restrictions and guidelines ·········································································································112
Configuration procedure ····································································································································112
Configuring protection functions ································································································································113
Enabling BPDU guard ·········································································································································113
Enabling root guard············································································································································113
Enabling loop guard ···········································································································································114
Configuring port role restriction·························································································································115
Configuring TC-BPDU transmission restriction··································································································115
Enabling TC-BPDU guard····································································································································116
Enabling BPDU drop ···········································································································································116
Displaying and maintaining the spanning tree·········································································································117
Spanning tree configuration example························································································································117
Network requirements·········································································································································117
Configuration procedure ····································································································································118
Verifying the configuration·································································································································120
PVST configuration example ·······································································································································121
Network requirements·········································································································································121
Configuration procedure ····································································································································122
Verifying the configuration·································································································································123
Configuring loop detection····································································································································· 125
Overview·······································································································································································125
Loop detection mechanism ·································································································································125
Loop detection interval········································································································································126
Loop protection actions·······································································································································126
Port status auto recovery·····································································································································127
Loop detection configuration task list·························································································································127
Enabling loop detection ··············································································································································127
Enabling loop detection globally·······················································································································127
Enabling loop detection on a port·····················································································································127
Configuring the loop protection action······················································································································128
Configuring the global loop protection action·································································································128
Configuring the loop protection action on a Layer 2 Ethernet interface ·······················································128
Configuring the loop protection action on a Layer 2 aggregate interface···················································128