
iv
Configuration restrictions and guidelines ·······························································································102
Configuration procedure·························································································································102
Configuring Digest Snooping ·························································································································103
Configuration restrictions and guidelines ·······························································································103
Configuration procedure·························································································································104
Digest Snooping configuration example·································································································104
Configuring No Agreement Check ·················································································································105
Configuration prerequisites ····················································································································106
Configuration procedure·························································································································106
No Agreement Check configuration example·························································································107
Configuring TC Snooping·······························································································································107
Configuration restrictions and guidelines ·······························································································108
Configuration procedure·························································································································108
Configuring protection functions ····················································································································108
Enabling BPDU guard ····························································································································108
Enabling root guard································································································································109
Enabling loop guard ·······························································································································110
Configuring port role restriction ··············································································································110
Configuring TC-BPDU transmission restriction ······················································································111
Enabling TC-BPDU guard ······················································································································111
Enabling BPDU drop ······························································································································112
Displaying and maintaining the spanning tree ·······························································································112
Spanning tree configuration example ············································································································113
MSTP configuration example ·················································································································113
PVST configuration example··················································································································116
Configuring loop detection ·········································································· 120
Overview ························································································································································120
Loop detection mechanism ····················································································································120
Loop detection interval ···························································································································121
Loop protection actions ··························································································································121
Port status auto recovery ·······················································································································121
Loop detection configuration task list·············································································································122
Enabling loop detection··································································································································122
Enabling loop detection globally·············································································································122
Enabling loop detection on a port···········································································································122
Configuring the loop protection action ···········································································································123
Configuring the global loop protection action ·························································································123
Configuring the loop protection action on a Layer 2 Ethernet interface ·················································123
Configuring the loop protection action on a Layer 2 aggregate interface···············································123
Setting the loop detection interval··················································································································123
Displaying and maintaining loop detection·····································································································124
Loop detection configuration example ···········································································································124
Network requirements ····························································································································124
Configuration procedure·························································································································124
Verifying the configuration······················································································································125
Configuring VLANs ····················································································· 127
Overview ························································································································································127
VLAN frame encapsulation ····················································································································127
Protocols and standards ························································································································128
Configuring basic VLAN settings ···················································································································128
Configuring basic settings of a VLAN interface······························································································129
Configuring port-based VLANs ······················································································································130
Introduction ············································································································································130
Assigning an access port to a VLAN······································································································131
Assigning a trunk port to a VLAN ···········································································································132
Assigning a hybrid port to a VLAN ·········································································································132
Configuring MAC-based VLANs ····················································································································133
Introduction ············································································································································133
Configuration restrictions and guidelines ·······························································································136
Configuring static MAC-based VLAN assignment··················································································136