HP 6125G HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Co - Page 93

Configuration restrictions and guidelines, Configuration procedure, Configuring protection functions

Page 93 highlights

In the network, the IRF fabric transparently transmits the received BPDUs and does not participate in spanning tree calculations. When a topology change occurs to the IRF fabric or user networks, the IRF fabric may need a long time to learn the correct MAC address table entries and ARP entries, resulting in long network disruption. To avoid the network disruption, you can enable TC snooping on the IRF fabric. With TC snooping enabled, a device actively updates the MAC address table entries and ARP entries upon receiving TC-BPDUs, so that the device can normally forward the user traffic. For more information about MAC address table entries, see "Configuring the MAC address table." For more information about ARP, see Layer 3-IP Services Configuration Guide. Configuration restrictions and guidelines • TC snooping and STP are mutually exclusive. You must globally disable the spanning tree feature before enable TC snooping. • TC snooping does not take effect on the ports on which BPDU tunneling is enabled for spanning tree protocols. For more information about BPDU tunneling, see "Configuring BPDU tunneling." Configuration procedure To configure TC snooping: Step 1. Enter system view. 2. Globally disable the spanning tree feature. 3. Enable TC snooping. Command system-view undo stp enable stp tc-snooping Description N/A By default, the spanning tree feature is disabled globally. Disabled by default. Configuring protection functions A spanning tree device supports the following protection functions: • BPDU guard • Root guard • Loop guard • TC-BPDU guard Configuration prerequisites Correctly configure the spanning tree feature on the device. Enabling BPDU guard For access layer devices, the access ports can directly connect to the user terminals (such as PCs) or file servers. The access ports are configured as edge ports to allow rapid transition. When these ports receive configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new spanning tree calculation process. This causes a change of network topology. Under normal conditions, these ports should not receive configuration BPDUs. However, if someone forges configuration BPDUs maliciously to attack the devices, the network will become unstable. 84

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231

84
In the network, the IRF fabric transparently transmits the received BPDUs and does not participate in
spanning tree calculations. When a topology change occurs to the IRF fabric or user networks, the IRF
fabric may need a long time to learn the correct MAC address table entries and ARP entries, resulting in
long network disruption. To avoid the network disruption, you can enable TC snooping on the IRF fabric.
With TC snooping enabled, a device actively updates the MAC address table entries and ARP entries
upon receiving TC-BPDUs, so that the device can normally forward the user traffic.
For more information about MAC address table entries, see "
Configuring the MAC address table
."
For more information about ARP, see
Layer 3—IP Services Configuration Guide
.
Configuration restrictions and guidelines
TC snooping and STP are mutually exclusive. You must globally disable the spanning tree feature
before enable TC snooping.
TC snooping does not take effect on the ports on which BPDU tunneling is enabled for spanning tree
protocols. For more information about BPDU tunneling, see "
Configuring BPDU tunneling
."
Configuration procedure
To configure TC snooping:
Step
Command
Description
1.
Enter system view.
system-view
N/A
2.
Globally disable the
spanning tree feature.
undo stp enable
By default, the spanning tree
feature is disabled globally.
3.
Enable TC snooping.
stp tc-snooping
Disabled by default.
Configuring protection functions
A spanning tree device supports the following protection functions:
BPDU guard
Root guard
Loop guard
TC-BPDU guard
Configuration prerequisites
Correctly configure the spanning tree feature on the device.
Enabling BPDU guard
For access layer devices, the access ports can directly connect to the user terminals (such as PCs) or file
servers. The access ports are configured as edge ports to allow rapid transition. When these ports
receive configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new
spanning tree calculation process. This causes a change of network topology. Under normal conditions,
these ports should not receive configuration BPDUs. However, if someone forges configuration BPDUs
maliciously to attack the devices, the network will become unstable.