HP VPN Firewall Appliances Network Management Configuration Guide

ii
Modifying a port ··················································································································································· 37
VLAN configuration example ······························································································································· 38
Configuring VLANs at the CLI ······································································································································· 42
Configuring basic VLAN settings ························································································································· 42
Configuring basic settings of a VLAN interface ································································································· 43
Configuring port-based VLANs ···························································································································· 45
Displaying and maintaining VLAN ······················································································································ 47
Port-based VLAN configuration example ············································································································ 48
Configuring the MAC address table ························································································································ 50
Overview ········································································································································································· 50
How a MAC address entry is created ················································································································ 50
Types of MAC address entries ····························································································································· 51
MAC address table-based frame forwarding ···································································································· 51
Configuring the MAC address table in the Web interface ······················································································· 51
Adding a MAC address entry ······························································································································ 51
Setting the aging time for MAC address entries ································································································ 53
MAC address table configuration example ······································································································· 53
Configuring the MAC address table at the CLI ··········································································································· 55
Configuring static, dynamic, and destination blackhole MAC address entries ············································· 55
Configuring the aging timer for dynamic MAC address entries ······································································ 56
Configuring the MAC learning limit on an interface ························································································· 56
Displaying and maintaining MAC address tables ····························································································· 57
MAC address table configuration example ······································································································· 57
Configuring spanning tree protocols ························································································································ 59
STP ··················································································································································································· 59
STP protocol packets ············································································································································· 59
Basic concepts in STP ············································································································································ 60
STP algorithm ························································································································································· 61
The configuration BPDU forwarding mechanism of STP ··················································································· 65
STP timers ······························································································································································· 65
RSTP ················································································································································································· 66
MSTP ················································································································································································ 66
STP and RSTP limitations ······································································································································· 66
MSTP features ························································································································································ 66
MSTP basic concepts ············································································································································ 67
How MSTP works ·················································································································································· 70
Implementation of MSTP on devices ···················································································································· 71
Protocols and standards ················································································································································ 71
Configuring MSTP in the Web interface ····················································································································· 71
Recommend MSTP configuration procedure ······································································································ 71
Configuring an MST region ································································································································· 72
Configuring MSTP globally ·································································································································· 73
Configuring MSTP on a port ································································································································ 75
MSTP configuration example ······························································································································· 78
Configuring MSTP at the CLI ········································································································································· 83
Configuration guidelines ······································································································································ 83
Spanning tree configuration task lists ················································································································· 83
Setting the spanning tree mode ··························································································································· 86
Configuring an MST region ································································································································· 87
Configuring the root bridge or a secondary root bridge ·················································································· 87
Configuring the device priority ···························································································································· 88
Configuring the maximum hops of an MST region ··························································································· 89
Configuring the network diameter of a switched network ················································································ 89