HP MSR2000/3000/4000 Router Series Layer 2 - LAN Switching Configuration Guide
ii
Configuring the timeout factor ······································································································································ 28
Configuring the maximum port rate ····························································································································· 29
Configuring edge ports ················································································································································· 29
Configuration restrictions and guidelines ··········································································································· 29
Configuration procedure ······································································································································ 29
Configuring path costs of ports ···································································································································· 30
Specifying a standard for the device to use when it calculates the default path cost ··································· 30
Configuring path costs of ports ···························································································································· 31
Configuration example ········································································································································· 31
Configuring the port priority ········································································································································· 31
Configuring the port link type ······································································································································· 32
Configuration restrictions and guidelines ··········································································································· 32
Configuration procedure ······································································································································ 32
Configuring the mode a port uses to recognize and send MSTP packets ······························································· 32
Enabling outputting port state transition information ·································································································· 33
Enabling the spanning tree feature ······························································································································ 33
Performing mCheck ························································································································································ 34
Performing mCheck globally ································································································································ 34
Performing mCheck in interface view ················································································································· 34
Configuring Digest Snooping ······································································································································· 35
Configuration restrictions and guidelines ··········································································································· 35
Configuration procedure ······································································································································ 35
Digest Snooping configuration example ············································································································· 36
Configuring No Agreement Check ······························································································································ 37
Configuration prerequisites ·································································································································· 38
Configuration procedure ······································································································································ 38
No Agreement Check configuration example···································································································· 38
Configuring protection functions ·································································································································· 39
Enabling BPDU guard ··········································································································································· 39
Enabling root guard ·············································································································································· 39
Enabling loop guard ············································································································································· 40
Configuring port role restriction ··························································································································· 41
Configuring TC-BPDU transmission restriction ···································································································· 41
Enabling TC-BPDU guard······································································································································ 42
Displaying and maintaining the spanning tree ··········································································································· 42
Spanning tree configuration example ·························································································································· 43
Network requirements ··········································································································································· 43
Configuration procedure ······································································································································ 44
Verifying the configuration ··································································································································· 45
Configuring loop detection ········································································································································ 48
Overview ········································································································································································· 48
Loop detection mechanism ··································································································································· 48
Loop detection interval ·········································································································································· 49
Loop protection actions ········································································································································· 49
Port status auto recovery ······································································································································· 49
Loop detection configuration task list ··························································································································· 50
Enabling loop detection ················································································································································ 50
Enabling loop detection globally ························································································································· 50
Enabling loop detection on a port ······················································································································· 50
Configuring the loop protection action ························································································································ 50
Configuring the global loop protection action ··································································································· 51
Configuring the loop protection action on a Layer 2 Ethernet interface ························································· 51
Setting the loop detection interval ································································································································ 51
Displaying and maintaining loop detection ················································································································ 51