h3c msr series routers

of 90/90
H3C MSR Series Routers Layer 2 - LAN Switching Configuration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320

Post on 02-Oct-2021

3 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

H3C MSR Series Routers Layer 2 - LAN Switching Configuration Guide(V7)
Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320
Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H3Care, , IRF, NetPilot, Netflow, SecEngine, SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C MSR documentation set includes 14 configuration guides, which describe the software features for the H3C MSR Series Routers and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
The Layer 2 - LAN Switching Configuration Guide(V7) describes fundamentals and configuration of Ethernet link aggregation, port isolation, MSTP, VLAN, GVRP, LLDP, and so on.
This preface includes:
• Obtaining documentation
• Technical support
• Documentation feedback
These configuration guides apply to the following models of the H3C MSR series routers:
Model
• MSR 36-10 • MSR 36-20 • MSR 36-40 • MSR 36-60 • MSR3600-28 • MSR3600-51
MSR 5600 • MSR 56-60 • MSR 56-80
Audience This documentation is intended for:
• Network planners
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... } Braces enclose a set of required syntax choices separated by vertical bars, from which you select one.
[ x | y | ... ] Square brackets enclose a set of optional syntax choices separated by vertical bars, from which you select one or none.
{ x | y | ... } * Asterisk marked braces enclose a set of required syntax choices separated by vertical bars, from which you select at least one.
[ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you select one choice, multiple choices, or none.
&<1-n> The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
Symbols
Convention Description
WARNING An alert that calls attention to important information that if not understood or followed can result in personal injury.
CAUTION An alert that calls attention to important information that if not understood or followed can result in data loss, data corruption, or damage to hardware or software.
IMPORTANT An alert that calls attention to essential information.
NOTE An alert that contains additional or supplementary information.
TIP An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
About the H3C MSR documentation set The H3C MSR documentation set includes:
Category Documents Purposes
Hardware specifications and installation
Installation guide Provides a complete guide to hardware installation and hardware specifications.
MSR Series Routers Interface Module Manual Provide the hardware specifications of cards.
Software configuration
Describe software features and configuration procedures.
MSR Series Routers Command references(v7)
Provide a quick reference to all available commands.
Operations and maintenance Release notes
Provide information about the product release, including the version history, hardware and software compatibility matrix, version upgrade information, technical support information, and software upgrading.
Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents]—Provides hardware installation, software upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions]—Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download]—Provides the documentation released with the software version.
Technical support [email protected]
Documentation feedback You can e-mail your comments about product documentation to [email protected]
Configuring the MAC address table ·························································································································· 1  Overview ············································································································································································ 1 
How a MAC address entry is created ··················································································································· 1  Types of MAC address entries ································································································································ 1 
Configuring the MAC address table ······························································································································· 2  Configuring MAC address entries ·························································································································· 2  Adding or modifying a blackhole MAC address entry ························································································ 3  Disabling MAC address learning on an interface ································································································ 3  Configuring the aging timer for dynamic MAC address entries ········································································· 4 
Displaying and maintaining the MAC address table ···································································································· 4  MAC address table configuration example ··················································································································· 5 
Network requirements ·············································································································································· 5  Configuration procedure ········································································································································· 5  Verifying the configuration ······································································································································ 5 
Configuring port isolation ············································································································································ 6  Assigning ports to the isolation group ···························································································································· 6  Displaying and maintaining port isolation ····················································································································· 6  Port isolation configuration example······························································································································· 7 
Network requirements ·············································································································································· 7  Configuration procedure ········································································································································· 7  Verifying the configuration ······································································································································ 7 
Configuring spanning tree protocols ·························································································································· 8  STP ······················································································································································································ 8 
STP protocol packets ················································································································································ 8  Basic concepts in STP ··············································································································································· 9  Calculation process of the STP algorithm ··········································································································· 10 
RSTP ················································································································································································· 15  MSTP ················································································································································································ 15 
MSTP features ························································································································································ 15  MSTP basic concepts ············································································································································ 15  How MSTP works ·················································································································································· 19  MSTP implementation on devices ························································································································ 20 
Protocols and standards ················································································································································ 20  Spanning tree configuration task lists ·························································································································· 20 
STP configuration task list ····································································································································· 21  RSTP configuration task list ··································································································································· 21  MSTP configuration task list ································································································································· 22 
Setting the spanning tree mode ···································································································································· 23  Configuring an MST region ·········································································································································· 24  Configuring the root bridge or a secondary root bridge ·························································································· 25 
Configuring the current device as the root bridge of a specific spanning tree ·············································· 25  Configuring the current device as a secondary root bridge of a specific spanning tree ······························ 25 
Configuring the device priority ····································································································································· 26  Configuring the maximum hops of an MST region ···································································································· 26  Configuring the network diameter of a switched network ························································································· 26  Configuring spanning tree timers ································································································································· 27 
Configuration restrictions and guidelines ··········································································································· 27  Configuration procedure ······································································································································ 28 
ii
Configuring the timeout factor ······································································································································ 28  Configuring the maximum port rate ····························································································································· 29  Configuring edge ports ················································································································································· 29 
Configuration restrictions and guidelines ··········································································································· 29  Configuration procedure ······································································································································ 29 
Configuring path costs of ports ···································································································································· 30  Specifying a standard for the device to use when it calculates the default path cost ··································· 30  Configuring path costs of ports ···························································································································· 31  Configuration example ········································································································································· 31 
Configuring the port priority ········································································································································· 31  Configuring the port link type ······································································································································· 32 
Configuration restrictions and guidelines ··········································································································· 32  Configuration procedure ······································································································································ 32 
Configuring the mode a port uses to recognize and send MSTP packets ······························································· 32  Enabling outputting port state transition information ·································································································· 33  Enabling the spanning tree feature ······························································································································ 33  Performing mCheck ························································································································································ 34 
Performing mCheck globally ································································································································ 34  Performing mCheck in interface view ················································································································· 34 
Configuring Digest Snooping ······································································································································· 35  Configuration restrictions and guidelines ··········································································································· 35  Configuration procedure ······································································································································ 35  Digest Snooping configuration example ············································································································· 36 
Configuring No Agreement Check ······························································································································ 37  Configuration prerequisites ·································································································································· 38  Configuration procedure ······································································································································ 38  No Agreement Check configuration example···································································································· 38 
Configuring protection functions ·································································································································· 39  Enabling BPDU guard ··········································································································································· 39  Enabling root guard ·············································································································································· 39  Enabling loop guard ············································································································································· 40  Configuring port role restriction ··························································································································· 41  Configuring TC-BPDU transmission restriction ···································································································· 41  Enabling TC-BPDU guard···············································&mi