R0106-HP MSR Router Series Layer 2 - LAN Switching Configuration Guide(V7)

iii
Configuring path costs of ports ···································································································································· 58
Specifying a standard for the device to use when it calculates the default path cost ··································· 58
Configuring path costs of ports ···························································································································· 60
Configuration example ········································································································································· 61
Configuring the port priority ········································································································································· 61
Configuring the port link type ······································································································································· 62
Configuration restrictions and guidelines ··········································································································· 62
Configuration procedure ······································································································································ 62
Configuring the mode a port uses to recognize and send MSTP packets ······························································· 62
Enabling outputting port state transition information ·································································································· 63
Enabling the spanning tree feature ······························································································································ 63
Enabling the spanning tree feature in STP/RSTP/MSTP mode ········································································· 64
Enabling the spanning tree feature in PVST mode····························································································· 64
Performing mCheck ························································································································································ 64
Configuration restrictions and guidelines ··········································································································· 64
Configuration procedure ······································································································································ 65
Configuring Digest Snooping ······································································································································· 65
Configuration restrictions and guidelines ··········································································································· 65
Configuration procedure ······································································································································ 66
Digest Snooping configuration example ············································································································· 66
Configuring No Agreement Check ······························································································································ 67
Configuration prerequisites ·································································································································· 68
Configuration procedure ······································································································································ 69
No Agreement Check configuration example···································································································· 69
Configuring protection functions ·································································································································· 69
Enabling BPDU guard ··········································································································································· 70
Enabling root guard ·············································································································································· 70
Enabling loop guard ············································································································································· 71
Configuring port role restriction ··························································································································· 71
Configuring TC-BPDU transmission restriction ···································································································· 72
Enabling TC-BPDU guard······································································································································ 72
Displaying and maintaining the spanning tree ··········································································································· 73
Spanning tree configuration example ·························································································································· 74
MSTP configuration example ······························································································································· 74
PVST configuration example ································································································································ 77
Configuring loop detection ········································································································································ 81
Overview ········································································································································································· 81
Loop detection mechanism ··································································································································· 81
Loop detection interval ·········································································································································· 82
Loop protection actions ········································································································································· 82
Port status auto recovery ······································································································································· 82
Loop detection configuration task list ··························································································································· 83
Enabling loop detection ················································································································································ 83
Enabling loop detection globally ························································································································· 83
Enabling loop detection on a port ······················································································································· 83
Configuring the loop protection action ························································································································ 84
Configuring the global loop protection action ··································································································· 84
Configuring the loop protection action on a Layer 2 Ethernet interface ························································· 84
Setting the loop detection interval ································································································································ 84
Displaying and maintaining loop detection ················································································································ 84
Loop detection configuration example ························································································································· 85
Network requirements ··········································································································································· 85
Configuration procedure ······································································································································ 85
Verifying the configuration ··································································································································· 86