HP MSR2000/3000/4000 Router Series Layer 2 - LAN Switching Configuration Guide

i
Contents
Configuring the MAC address table ·························································································································· 1
Overview ············································································································································································ 1
How a MAC address entry is created ··················································································································· 1
Types of MAC address entries ································································································································ 1
Configuring the MAC address table ······························································································································· 2
Configuring MAC address entries ·························································································································· 2
Adding or modifying a blackhole MAC address entry ························································································ 3
Disabling MAC address learning on an interface ································································································ 3
Configuring the aging timer for dynamic MAC address entries ········································································· 4
Displaying and maintaining the MAC address table ···································································································· 4
MAC address table configuration example ··················································································································· 5
Network requirements ·············································································································································· 5
Configuration procedure ········································································································································· 5
Verifying the configuration ······································································································································ 5
Configuring port isolation ············································································································································ 6
Assigning ports to the isolation group ···························································································································· 6
Displaying and maintaining port isolation ····················································································································· 6
Port isolation configuration example······························································································································· 7
Network requirements ·············································································································································· 7
Configuration procedure ········································································································································· 7
Verifying the configuration ······································································································································ 7
Configuring spanning tree protocols ·························································································································· 8
STP ······················································································································································································ 8
STP protocol packets ················································································································································ 8
Basic concepts in STP ··············································································································································· 9
Calculation process of the STP algorithm ··········································································································· 10
RSTP ················································································································································································· 15
MSTP ················································································································································································ 15
MSTP features ························································································································································ 15
MSTP basic concepts ············································································································································ 15
How MSTP works ·················································································································································· 19
MSTP implementation on devices ························································································································ 20
Protocols and standards ················································································································································ 20
Spanning tree configuration task lists ·························································································································· 20
STP configuration task list ····································································································································· 21
RSTP configuration task list ··································································································································· 21
MSTP configuration task list ································································································································· 22
Setting the spanning tree mode ···································································································································· 23
Configuring an MST region ·········································································································································· 24
Configuring the root bridge or a secondary root bridge ·························································································· 25
Configuring the current device as the root bridge of a specific spanning tree ·············································· 25
Configuring the current device as a secondary root bridge of a specific spanning tree ······························ 25
Configuring the device priority ····································································································································· 26
Configuring the maximum hops of an MST region ···································································································· 26
Configuring the network diameter of a switched network ························································································· 26
Configuring spanning tree timers ································································································································· 27
Configuration restrictions and guidelines ··········································································································· 27
Configuration procedure ······································································································································ 28