Manual
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Section I
- Basic Operations
- Chapter 1
- Starting a Web Browser Management Session
- Chapter 2
- Basic Switch Parameters
- Configuring the Switch’s Name, Location, and Contact
- Changing the Manager and Operator Passwords
- Setting the System Date and Time
- Rebooting a Switch
- Pinging a Remote System
- Returning the AT-S63 Management Software to the Factory Default Values
- Displaying the IP Address of the Local Interface
- Displaying System Information
- Chapter 3
- Enhanced Stacking
- Chapter 4
- SNMPv1 and SNMPv2c
- Chapter 5
- Port Parameters
- Chapter 6
- MAC Address Table
- Chapter 7
- Static Port Trunks
- Chapter 8
- Port Mirroring
- Section II
- Advanced Operations
- Chapter 9
- File System
- Chapter 10
- File Downloads and Uploads
- Chapter 11
- Event Logs and Syslog Servers
- Chapter 12
- Classifiers
- Chapter 13
- Access Control Lists
- Chapter 14
- Class of Service
- Chapter 15
- Quality of Service
- Chapter 16
- Denial of Service Defense
- Chapter 17
- IGMP Snooping
- Section III
- SNMPv3
- Chapter 18
- SNMPv3
- Configuring the SNMPv3 Protocol
- Enabling or Disabling SNMP Management
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Tables
- Section IV
- Spanning Tree Protocols
- Chapter 19
- Spanning Tree and Rapid Spanning Tree Protocols
- Chapter 20
- Multiple Spanning Tree Protocol
- Section V
- Virtual LANs
- Chapter 21
- Port-based and Tagged VLANs
- Chapter 22
- GARP VLAN Registration Protocol
- Section VI
- Port Security
- Chapter 23
- MAC Address-based Port Security
- Chapter 24
- 802.1x Port-based Network Access Control
- Section VII
- Management Security
- Chapter 25
- Encryption Keys, PKI, and SSL
- Chapter 26
- Secure Shell (SSH)
- Chapter 27
- TACACS+ and RADIUS Protocols
- Chapter 28
- Management Access Control List
- Index
AT-S63 Management Software Web Browser Interface User’s Guide
Section IV: Spanning Tree Protocols 317
Bridge Max Hops
MSTP regions use this parameter to discard BPDUs. The Max Hop
counter in a BPDU is decremented every time the BPDU crosses an
MSTP region boundary. After the counter reaches zero, the BPDU is
deleted.
Revision Level
The revision level of an MSTP region. This is an arbitrary number that
you assign to a region. The revision level must be the same on all
bridges in a region. Different regions can have the same revision level
without conflict. The range is 0 (zero) to 255.
5. Click Apply.
6. To permanently save your changes, select the Save Config option in
the Configuration menu.
Proceed to the next procedure to configure the CIST priority.
Configuring the
CIST Priority
To configure the CIST priority, perform the following procedure:
1. From the home page, select Configuration.
2. From the Configuration menu, select the Layer 2 option.
3. Select the Spanning Tree tab.
The Spanning Tree tab is shown in Figure 113 on page 292.
4. Click Configure.
The expanded MSTP Spanning Tree tab is shown in Figure 125 on
page 315.
5. In the Configure CIST Parameters section, set the CIST Priority, the
priority number for the bridge.
This number is used to determine the root bridge of the bridged
network. This number is analogous to the RSTP bridge priority value.
The bridge in the network with the lowest priority number is selected as
the root bridge. If two or more bridges have the same bridge or CIST
priority values, the bridge with the numerically lowest MAC address
becomes the root bridge.
6. Click Apply.
7. To permanently save your changes, select the Save Config option in
the Configuration menu.