
Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
2.7.16 Configuring STP/RSTP/MSTP mode switching...............................................................................108
2.7.17 Configuring link type........................................................................................................................109
2.7.18 Configuring root interface protection................................................................................................109
2.7.19 Configuring interface loopguard....................................................................................................... 110
2.7.20 Configuring TC packet suppression.................................................................................................. 110
2.7.21 Checking configurations ................................................................................................................... 111
2.7.22 Maintenance...................................................................................................................................... 111
2.7.23 Example for configuring MSTP........................................................................................................ 111
2.8 MRSTP......................................................................................................................................................... 116
2.8.1 Introduction......................................................................................................................................... 116
2.8.2 Preparing for configurations ............................................................................................................... 116
2.8.3 Default configurations of MRSTP ...................................................................................................... 117
2.8.4 Enabling MRSTP................................................................................................................................ 117
2.8.5 Configuring MRSTP parameters......................................................................................................... 117
2.8.6 Checking configurations ..................................................................................................................... 118
2.9 Loop detection.............................................................................................................................................. 118
2.9.1 Introduction......................................................................................................................................... 118
2.9.2 Preparing for configurations ...............................................................................................................120
2.9.3 Default configurations of loop detection.............................................................................................120
2.9.4 Configuring loop detection .................................................................................................................121
2.9.5 Checking configurations .....................................................................................................................122
2.9.6 Maintenance........................................................................................................................................122
2.9.7 Example for configuring inner loop detection ....................................................................................122
2.10 Interface protection ....................................................................................................................................124
2.10.1 Introduction.......................................................................................................................................124
2.10.2 Preparing for configurations .............................................................................................................124
2.10.3 Default configurations of interface protection ..................................................................................124
2.10.4 Configuring interface protection.......................................................................................................125
2.10.5 Configuring interface isolation .........................................................................................................125
2.10.6 Checking configurations ...................................................................................................................125
2.10.7 Example for configuring interface protection ...................................................................................126
2.11 Port mirroring.............................................................................................................................................127
2.11.1 Introduction.......................................................................................................................................127
2.11.2 Preparing for configurations..............................................................................................................128
2.11.3 Default configurations of port mirroring...........................................................................................128
2.11.4 Configuring port mirroring on local port ..........................................................................................128
2.11.5 Checking configurations ...................................................................................................................129
2.11.6 Example for configuring port mirroring............................................................................................129
2.12 L2CP ..........................................................................................................................................................131
2.12.1 Introduction.......................................................................................................................................131
2.12.2 Preparing for configurations .............................................................................................................131
2.12.3 Defaul configurations of L2CP .........................................................................................................131