HP 6125G HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Co - Page 6

HP 6125G Manual

Page 6 highlights

No Agreement Check configuration example 83 Configuring TC snooping 83 Configuration restrictions and guidelines 84 Configuration procedure 84 Configuring protection functions 84 Configuration prerequisites 84 Enabling BPDU guard 84 Enabling root guard 85 Enabling loop guard 86 Enabling TC-BPDU guard 86 Displaying and maintaining the spanning tree 87 MSTP configuration example 87 Configuring BPDU tunneling 92 Overview 92 Background 92 BPDU tunneling implementation 93 Enabling BPDU tunneling 94 Configuration prerequisites 94 Configuration restrictions and guidelines 95 Configuration procedure 95 Configuring destination multicast MAC address for BPDUs 95 BPDU tunneling configuration examples 96 BPDU tunneling for STP configuration example 96 BPDU tunneling for PVST configuration example 97 Configuring VLANs 99 Overview 99 VLAN fundamentals 99 VLAN types 100 Protocols and standards 101 Configuring basic VLAN settings 101 Configuration restrictions and guidelines 101 Configuration procedure 101 Configuring basic settings of a VLAN interface 102 Configuration procedure 102 VLAN interface configuration example 102 Configuring port-based VLANs 104 Introduction to port-based VLAN 104 Assigning an access port to a VLAN 105 Assigning a trunk port to a VLAN 106 Assigning a hybrid port to a VLAN 107 Port-based VLAN configuration example 108 Configuring MAC-based VLANs 110 Introduction to MAC-based VLAN 110 Configuration restrictions and guidelines 112 Configuration procedure 112 MAC-based VLAN configuration example 115 Configuring protocol-based VLANs 117 Introduction to protocol-based VLAN 117 Configuration restrictions and guidelines 117 Configuration procedure 117 Protocol-based VLAN configuration example 118 Configuring IP subnet-based VLANs 121 Configuration procedure 121 iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231

iv
No Agreement Check configuration example···································································································· 83
Configuring TC snooping ·············································································································································· 83
Configuration restrictions and guidelines ··········································································································· 84
Configuration procedure ······································································································································ 84
Configuring protection functions ·································································································································· 84
Configuration prerequisites ·································································································································· 84
Enabling BPDU guard ··········································································································································· 84
Enabling root guard ·············································································································································· 85
Enabling loop guard ············································································································································· 86
Enabling TC-BPDU guard······································································································································ 86
Displaying and maintaining the spanning tree ··········································································································· 87
MSTP configuration example ········································································································································ 87
Configuring BPDU tunneling······································································································································ 92
Overview········································································································································································· 92
Background ···························································································································································· 92
BPDU tunneling implementation ··························································································································· 93
Enabling BPDU tunneling ·············································································································································· 94
Configuration prerequisites ·································································································································· 94
Configuration restrictions and guidelines ··········································································································· 95
Configuration procedure ······································································································································ 95
Configuring destination multicast MAC address for BPDUs ······················································································ 95
BPDU tunneling configuration examples······················································································································ 96
BPDU tunneling for STP configuration example ································································································· 96
BPDU tunneling for PVST configuration example ······························································································· 97
Configuring VLANs ···················································································································································· 99
Overview········································································································································································· 99
VLAN fundamentals··············································································································································· 99
VLAN types ·························································································································································· 100
Protocols and standards ····································································································································· 101
Configuring basic VLAN settings································································································································ 101
Configuration restrictions and guidelines ········································································································· 101
Configuration procedure ···································································································································· 101
Configuring basic settings of a VLAN interface ······································································································· 102
Configuration procedure ···································································································································· 102
VLAN interface configuration example ············································································································· 102
Configuring port-based VLANs··································································································································· 104
Introduction to port-based VLAN ······················································································································· 104
Assigning an access port to a VLAN ················································································································ 105
Assigning a trunk port to a VLAN······················································································································ 106
Assigning a hybrid port to a VLAN ··················································································································· 107
Port-based VLAN configuration example ·········································································································· 108
Configuring MAC-based VLANs ································································································································ 110
Introduction to MAC-based VLAN ····················································································································· 110
Configuration restrictions and guidelines ········································································································· 112
Configuration procedure ···································································································································· 112
MAC-based VLAN configuration example ······································································································· 115
Configuring protocol-based VLANs ··························································································································· 117
Introduction to protocol-based VLAN ················································································································ 117
Configuration restrictions and guidelines ········································································································· 117
Configuration procedure ···································································································································· 117
Protocol-based VLAN configuration example··································································································· 118
Configuring IP subnet-based VLANs ·························································································································· 121
Configuration procedure ···································································································································· 121