R3721-F3210-F3171-HP High-End Firewalls Network Management Configuration Guide-6PW101

Table Of Contents
100
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet interface view or Layer
2 aggregate interface view.
interface interface-type
interface-number
N/A
3. Enable No Agreement Check.
stp no-agreement-check
Disabled by default.
No Agreement Check configuration example
1. Network requirements
As shown in Figure 56, Devic
e A connects to a third-party device that has a different spanning tree
implementation. Both devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 56 Network diagram
2. Configuration procedure
# Enable No Agreement Check on Ethernet 1/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ethernet 1/1
[DeviceA-Ethernet1/1] stp no-agreement-check
Configuring protection functions
A spanning tree device supports the following protection functions:
BPDU guard
Root guard
Loop guard
TC-BPDU guard
Configuration prerequisites
The spanning tree feature has been correctly configured on the device.
Enabling BPDU guard
For access layer devices, the access ports can directly connect to the user terminals (such as PCs) or file
servers. The access ports are configured as edge ports to allow rapid transition. When these ports
receive configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new
spanning tree calculation process. This causes a change of network topology. Under normal conditions,
these ports should not receive configuration BPDUs. However, if someone forges configuration BPDUs
maliciously to attack the devices, the network will become instable.