Flexfabric 5940 Series
Flexfabric 5940 Series
i
Enabling MAC address synchronization ························································································ 30
Configuring MAC address move notifications and suppression ·························································· 31
Enabling ARP fast update for MAC address moves ········································································· 32
Disabling static source check······································································································ 33
Enabling conversational remote MAC learning ··············································································· 34
Enabling SNMP notifications for the MAC address table ··································································· 34
Displaying and maintaining the MAC address table ········································································· 35
MAC address table configuration example ····················································································· 35
Network requirements ········································································································ 35
Configuration procedure ····································································································· 36
Verifying the configuration ··································································································· 36
Configuring MAC Information ···························································· 37
Enabling MAC Information ········································································································· 37
Configuring the MAC Information mode ························································································ 37
Setting the MAC change notification interval ·················································································· 38
Setting the MAC Information queue length ···················································································· 38
MAC Information configuration example ························································································ 38
Network requirements ········································································································ 38
Configuration restrictions and guidelines ················································································ 38
Configuration procedure ····································································································· 39
Configuring Ethernet link aggregation ················································· 41
Basic concepts ························································································································ 41
Aggregation group, member port, and aggregate interface ························································· 41
Aggregation states of member ports in an aggregation group ······················································ 41
Operational key················································································································· 42
Configuration types ············································································································ 42
Link aggregation modes ······································································································ 43
Aggregating links in static mode ·································································································· 43
Choosing a reference port ··································································································· 43
Setting the aggregation state of each member port ··································································· 43
Aggregating links in dynamic mode ······························································································ 44
LACP ······························································································································ 45
How dynamic link aggregation works ····················································································· 46
Edge aggregate interface··········································································································· 48
Load sharing modes for link aggregation groups ············································································· 48
Ethernet link aggregation configuration task list ·············································································· 48
Configuring an aggregation group································································································ 49
Configuration restrictions and guidelines ················································································ 49
Configuring a Layer 2 aggregation group ················································································ 49
Configuring a Layer 3 aggregation group ················································································ 51
Configuring an aggregate interface ······························································································ 52
Configuring the description of an aggregate interface ································································ 52
Setting the MAC address for an aggregate interface ································································· 53
Specifying ignored VLANs for a Layer 2 aggregate interface ······················································· 53
Setting the MTU for a Layer 3 aggregate interface ···································································· 54
Setting the minimum and maximum numbers of Selected ports for an aggregation group ················· 54
Setting the expected bandwidth for an aggregate interface ························································· 55
Configuring an edge aggregate interface ················································································ 55
Enabling BFD for an aggregation group·················································································· 56
Shutting down an aggregate interface ···················································································· 57
Restoring the default settings for an aggregate interface ···························································· 57
Configuring load sharing for link aggregation groups ······································································· 58
Setting load sharing modes for link aggregation groups ····························································· 58
Enabling local-first load sharing for link aggregation ·································································· 59
Configuring link aggregation load sharing algorithm settings ······················································· 59
Setting the global load sharing mode for MAC-in-MAC traffic ······················································ 60
Enabling link-aggregation traffic redirection ··················································································· 60
Configuration restrictions and guidelines ················································································ 61
Configuration procedure ····································································································· 61
Forwarding the traffic of specified VLANs out of a fixed member port on an aggregate link ······················ 61
ii
Excluding a subnet from load sharing on aggregate links ·································································· 62
Displaying and maintaining Ethernet link aggregation ······································································ 63
Ethernet link aggregation configuration examples ··········································································· 64
Layer 2 static aggregation configuration example ····································································· 64
Layer 2 dynamic aggregation configuration example ································································· 66
Layer 2 aggregation load sharing configuration example ···························································· 68
Layer 2 edge aggregate interface configuration example ··························································· 70
Layer 3 static aggregation configuration example ····································································· 71
Layer 3 dynamic aggregation configuration example ································································· 73
Layer 3 aggregation load sharing configuration example ···························································· 74
Layer 3 edge aggregate interface configuration example ··························································· 76
Configuring port isolation ································································· 78
Assigning a port to an isolation group ··························································································· 78
Displaying and maintaining port isolation ······················································································· 78
Port isolation configuration example ····························································································· 79
Network requirements ········································································································ 79
Configuration procedure ····································································································· 79
Verifying the configuration ··································································································· 79
Configuring spanning tree protocols ··················································· 81
STP ······································································································································ 81
STP protocol frames ·········································································································· 81
Basic concepts in STP ········································································································ 83
Calculation process of the STP algorithm ··············································································· 84
RSTP ···································································································································· 90
RSTP protocol frames ········································································································ 90
Basic concepts in RSTP ····································································································· 91
How RSTP works ·············································································································· 91
RSTP BPDU processing ····································································································· 92
PVST ···································································································································· 92
PVST protocol frames ········································································································ 92
Basic concepts in PVST ······································································································ 93
How PVST works ·············································································································· 93
MSTP ···································································································································· 93
MSTP features·················································································································· 93
MSTP protocol frames ········································································································ 94
MSTP basic concepts ········································································································· 95
How MSTP works ·············································································································· 98
MSTP implementation on devices ························································································· 99
Rapid transition mechanism ································································································· 99
Protocols and standards ·········································································································· 102
Spanning tree configuration task lists ························································································· 102
STP configuration task list ································································································· 103
RSTP configuration task list ······························································································· 103
PVST configuration task list ······························································································· 104
MSTP configuration task list ······························································································ 105
Setting the spanning tree mode································································································· 106
Configuring an MST region ······································································································ 106
Configuring the root bridge or a secondary root bridge ··································································· 107
Configuring the device as the root bridge of a specific spanning tree ·········································· 107
Configuring the device as a secondary root bridge of a specific spanning tree ······························ 108
Configuring the device priority··································································································· 108
Configuring the maximum hops of an MST region ········································································· 108
Configuring the network diameter of a switched network································································· 109
Setting spanning tree timers ····································································································· 109
Configuration restrictions and guidelines ·············································································· 110
Configuration procedure ··································································································· 110
Setting the timeout factor ········································································································· 111
Configuring the BPDU transmission rate ····················································································· 111
Configuring edge ports ············································································································ 112
Configuration restrictions and guidelines ·············································································· 112
iii
Configuration procedure ··································································································· 112
Configuring path costs of ports·································································································· 112
Specifying a standard for the device to use when it calculates the default path cost ······················· 113
Configuring path costs of ports ··························································································· 115
Configuration example ······································································································ 115
Configuring the port priority ······································································································ 116
Configuring the port link type ···································································································· 116
Configuration restrictions and guidelines ·············································································· 116
Configuration procedure ··································································································· 117
Configuring the mode a port uses to recognize and send MSTP frames ············································· 117
Enabling outputting port state transition information ······································································· 118
Enabling the spanning tree feature ···························································································· 118
Enabling the spanning tree feature in STP/RSTP/MSTP mode ·················································· 118
Enabling the spanning tree feature in PVST mode ·································································· 119
Performing mCheck ················································································································ 119
Configuration restrictions and guidelines ·············································································· 119
Performing mCheck globally ······························································································ 119
Performing mCheck in interface view ··················································································· 120
Disabling inconsistent PVID protection ······················································································· 120
Configuring Digest Snooping ···································································································· 120
Configuration restrictions and guidelines ·············································································· 121
Configuration procedure ··································································································· 121
Digest Snooping configuration example ··············································································· 121
Configuring No Agreement Check ····························································································· 122
Configuration prerequisites ································································································ 123
Configuration procedure ··································································································· 124
No Agreement Check configuration example ········································································· 124
Configuring TC Snooping········································································································· 124
Configuration restrictions and guidelines ·············································································· 125
Configuration procedure ··································································································· 125
Configuring protection features ································································································· 126
Configuring BPDU guard ··································································································· 126
Enabling root guard ········································································································· 127
Enabling loop guard ········································································································· 127
Configuring port role restriction ··························································································· 128
Configuring TC-BPDU transmission restriction ······································································· 128
Enabling TC-BPDU guard ································································································· 129
Enabling BPDU drop ········································································································ 129
Enabling PVST BPDU guard ······························································································ 130
About dispute guard ········································································································· 130
Enabling the device to log events of detecting or receiving TC BPDUs ·············································· 131
Enabling BPDU transparent transmission on a port ······································································· 131
Enabling SNMP notifications for new-root election and topology change events ·································· 132
Displaying and maintaining the spanning tree ·············································································· 132
Spanning tree configuration example ························································································· 133
MSTP configuration example ····························································································· 133
PVST configuration example ······························································································ 137
Configuring loop detection ······························································ 141
Overview ······························································································································ 141
Loop detection mechanism ································································································ 141
Loop detection interval ····································································································· 142
Loop protection actions ····································································································· 142
Port status auto recovery ·································································································· 142
Loop detection configuration task list ·························································································· 143
Enabling loop detection ··········································································································· 143
Enabling loop detection globally ························································································· 143
Enabling loop detection on a port ························································································ 143
Setting the loop protection action······························································································· 144
Setting the global loop protection action ··············································································· 144
Setting the loop protection action on a Layer 2 Ethernet interface ·············································· 144
Setting the loop protection action on a Layer 2 aggregate interface ············································ 144
iv
Setting the loop detection interval ······························································································ 144
Displaying and maintaining loop detection ··················································································· 145
Loop detection configuration example ························································································ 145
Network requirements ······································································································ 145
Configuration procedure ··································································································· 145
Verifying the configuration ································································································· 146
Configuring VLANs ······································································· 148
Overview ······························································································································ 148
VLAN frame encapsulation ································································································ 148
Protocols and standards ··································································································· 149
Configuring a VLAN ················································································································ 149
Configuring VLAN interfaces ···································································································· 150
Configuring port-based VLANs·································································································· 151
Introduction ···················································································································· 151
Assigning an access port to a VLAN ···················································································· 152
Assigning a trunk port to a VLAN ························································································ 153
Assigning a hybrid port to a VLAN ······················································································· 153
Configuring MAC-based VLANs ································································································ 154
Introduction ···················································································································· 154
General configuration restrictions and guidelines···································································· 157
Configuring static MAC-based VLAN assignment ··································································· 157
Configuring dynamic MAC-based VLAN assignment ······························································· 157
Configuring server-assigned MAC-based VLAN ····································································· 159
Configuring IP subnet-based VLANs ·························································································· 159
Configuring protocol-based VLANs ···························································································· 160
Configuring a VLAN group ······································································································· 161
Displaying and maintaining VLANs ···························································································· 161
VLAN configuration examples ··································································································· 162
Port-based VLAN configuration example ·············································································· 162
MAC-based VLAN configuration example ············································································· 164
IP subnet-based VLAN configuration example ······································································· 166
Protocol-based VLAN configuration example ········································································· 167
Configuring super VLANs ······························································· 171
Super VLAN configuration task list ····························································································· 171
Creating a sub-VLAN ·············································································································· 171
Configuring a super VLAN ······································································································· 171
Configuring a super VLAN interface ··························································································· 172
Displaying and maintaining super VLANs ···················································································· 172
Super VLAN configuration example ··························································································· 173
Network requirements ······································································································ 173
Configuration procedure ··································································································· 173
Verifying the configuration ································································································· 174
Configuring the private VLAN ·························································· 176
Configuration task list·············································································································· 176
Configuration restrictions and guidelines ····················································································· 177
Configuration procedure ·········································································································· 177
Displaying and maintaining the private VLAN ··············································································· 179
Private VLAN configuration examples ························································································· 179
Promiscuous port configuration example ·············································································· 179
Trunk promiscuous port configuration example ······································································ 182
Trunk promiscuous and trunk secondary port configuration example ·········································· 185
Secondary VLAN Layer 3 communication configuration example ··············································· 189
Configuring voice VLANs ······························································· 192
Overview ······························································································································ 192
Methods of identifying IP phones ······························································································· 192
Identifying IP phones through OUI addresses ········································································ 192
Automatically identifying IP phones through LLDP ·································································· 193
Advertising the voice VLAN information to IP phones ····································································· 193
v
IP phone access methods ········································································································ 193
Connecting the host and the IP phone in series ····································································· 193
Connecting the IP phone to the device ················································································· 194
Voice VLAN assignment modes ································································································ 194
Automatic mode ·············································································································· 194
Manual mode ················································································································· 195
Cooperation of voice VLAN assignment modes and IP phones ················································· 195
Security mode and normal mode of voice VLANs ·········································································· 196
Voice VLAN configuration task list ····························································································· 196
Configuring the QoS priority settings for voice traffic ······································································ 197
Configuring a port to operate in automatic voice VLAN assignment mode ·········································· 198
Configuration restrictions and guidelines ·············································································· 198
Configuration procedure ··································································································· 198
Configuring a port to operate in manual voice VLAN assignment mode ············································· 199
Configuration restrictions and guidelines ·············································································· 199
Configuration procedure ··································································································· 199
Enabling LLDP for automatic IP phone discovery ·········································································· 200
Configuration restrictions and guidelines ·············································································· 200
Configuration procedure ··································································································· 200
Configuring LLDP to advertise a voice VLAN ··············································································· 200
Configuring CDP to advertise a voice VLAN ················································································ 201
Displaying and maintaining voice VLANs ···················································································· 202
Voice VLAN configuration examples ·························································································· 202
Automatic voice VLAN assignment mode configuration example ··············································· 202
Manual voice VLAN assignment mode configuration example ··················································· 204
Configuring MVRP ········································································ 206
MRP ··································································································································· 206
MRP implementation ········································································································ 206
MRP messages ·············································································································· 206
MRP timers ···················································································································· 208
MVRP registration modes ········································································································ 209
Protocols and standards ·········································································································· 209
MVRP configuration task list ····································································································· 209
Configuration restrictions and guidelines ····················································································· 209
Configuration prerequisites ······································································································ 210
Enabling MVRP ····················································································································· 210
Setting an MVRP registration mode ··························································································· 210
Setting MRP timers ················································································································ 211
Enabling GVRP compatibility ···································································································· 212
Displaying and maintaining MVRP ····························································································· 212
MVRP configuration example ··································································································· 212
Network requirements ······································································································ 212
Configuration procedure ··································································································· 213
Verifying the configuration ································································································· 216
Configuring QinQ ········································································· 223
Overview ······························································································································ 223
How QinQ works ············································································································· 223
QinQ implementations ······································································································ 224
Protocols and standards ··································································································· 225
Restrictions and guidelines ······································································································ 225
Enabling QinQ ······················································································································· 225
Configuring transparent transmission for VLANs ··········································································· 225
Configuring the TPID for VLAN tags ··························································································· 226
Configuring the TPID for CVLAN tags ·················································································· 227
Configuring the TPID for SVLAN tags ·················································································· 227
Setting the 802.1p priority in SVLAN tags ···················································································· 227
Displaying and maintaining QinQ······························································································· 228
QinQ configuration examples···································································································· 229
Basic QinQ configuration example ······················································································ 229
VLAN transparent transmission configuration example ···························································· 231
vi
Configuring VLAN mapping ···························································· 233
Overview ······························································································································ 233
VLAN mapping application scenarios ··················································································· 233
VLAN mapping implementations ························································································· 235
VLAN mapping configuration task list ························································································· 238
Configuring one-to-one VLAN mapping ······················································································· 238
Configuring many-to-one VLAN mapping ···················································································· 239
Configuring many-to-one VLAN mapping in a network with dynamic IP address assignment ··········· 239
Configuring many-to-one VLAN mapping in a network with static IP address assignment ················ 242
Configuring one-to-two VLAN mapping ······················································································· 244
Configuring two-to-two VLAN mapping ······················································································· 245
Displaying and maintaining VLAN mapping ················································································· 245
VLAN mapping configuration examples ······················································································ 245
One-to-one and many-to-one VLAN mapping configuration example ·········································· 245
One-to-two and two-to-two VLAN mapping configuration example ············································· 251
Configuring LLDP ········································································· 254
Overview ······························································································································ 254
Basic concepts ··············································································································· 254
Working mechanism ········································································································ 259
Protocols and standards ··································································································· 260
LLDP configuration task list ······································································································ 260
Performing basic LLDP configurations ························································································ 261
Enabling LLDP················································································································ 261
Setting the LLDP bridge mode ··························································································· 261
Setting the LLDP operating mode ······················································································· 261
Setting the LLDP reinitialization delay ·················································································· 262
Enabling LLDP polling ······································································································ 262
Configuring the advertisable TLVs ······················································································ 263
Configuring the management address and its encoding format ·················································· 266
Setting other LLDP parameters ·························································································· 267
Setting an encapsulation format for LLDP frames ··································································· 268
Disabling LLDP PVID inconsistency check ············································································ 269
Configuring CDP compatibility ·································································································· 269
Configuration prerequisites ································································································ 270
Configuration procedure ··································································································· 270
Configuring LLDP trapping and LLDP-MED trapping······································································ 270
Displaying and maintaining LLDP ······························································································ 271
LLDP configuration examples ··································································································· 272
Basic LLDP configuration example ······················································································ 272
CDP-compatible LLDP configuration example ······································································· 276
Configuring L2PT ········································································· 278
Overview ······························································································································ 278
Background···················································································································· 278
L2PT operating mechanism ······························································································· 279
L2PT configuration task list ······································································································ 280
Enabling L2PT ······················································································································ 280
Restrictions and guidelines ································································································ 280
Enabling L2PT for a protocol ······························································································ 280
Setting the destination multicast MAC address for tunneled packets ················································· 281
Displaying and maintaining L2PT ······························································································ 281
L2PT configuration examples ··································································································· 282
Configuring L2PT for STP ································································································· 282
Configuring L2PT for LACP ······························································································· 283
Configuring cut-through forwarding ·················································· 287
Configuring service loopback groups ················································ 288
Configuration procedure ·········································································································· 288
Displaying and maintaining service loopback groups ····································································· 289
vii
Service loopback group configuration example ············································································· 289
Network requirements ······································································································ 289
Configuration procedure ··································································································· 289
Document conventions and icons ···················································· 290
Conventions ························································································································· 290
Network topology icons ··········································································································· 291
Support and other resources ·························································· 292
Accessing Hewlett Packard Enterprise Support ············································································ 292
Accessing updates ················································································································· 292
Websites ······················································································································· 293
Customer self repair········································································································· 293
Remote support ·············································································································· 293
Documentation feedback ·································································································· 293
Index ························································································· 295
viii
Configuring Ethernet interfaces
The Switch Series supports Ethernet interfaces, management Ethernet interfaces, Console
interfaces, and USB interfaces. For the interface types and the number of interfaces supported by a
switch model, see the installation guide.
This chapter describes how to configure management Ethernet interfaces and Ethernet interfaces.
1
Splitting a 40-GE interface and combining 10-GE breakout
interfaces
Configuration restrictions and guidelines
When you split a 40-GE interface and combine 10-GE breakout interfaces, follow these restrictions
and guidelines:
• 40-GE interfaces FortyGigE 1/0/1 through FortyGigE 1/0/4 and FortyGigE 1/0/29 through
FortyGigE 1/0/32 on an HPE FlexFabric 5940 32QSFP+ Switch (JH396A) switch do not support
one-to-four splitting.
• 100-GE interfaces on an HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch (JH390A) or HPE
FlexFabric 5940 48XGT 6QSFP28 Switch (JH391A) switch do not support one-to-four splitting.
• When an LSWM124XGT2Q (JH182A), LSWM124XG2Q (JH181A), or LSWM124XG2QL
(JH180A) interface module is installed in an HPE FlexFabric 5940 4-slot Switch (JH398A)
switch , 40-GE interfaces on these modules do not support one-to-four splitting.
• When an LSWM18QC (JH183A) interface module is installed in an HPE FlexFabric 5940 4-slot
Switch (JH398A) switch, the last two 40-GE interfaces on the module do not support one-to-four
splitting.
Splitting a 40-GE interface into four 10-GE breakout interfaces
You can use a 40-GE interface as a single interface. To improve port density, reduce costs, and
improve network flexibility, you can also split a 40-GE interface into four 10-GE breakout interfaces.
For example, you can split 40-GE interface FortyGigE 1/0/1 into four 10-GE breakout interfaces
Ten-GigabitEthernet 1/0/1:1 through Ten-GigabitEthernet 1/0/1:4.
After you configure this feature on a 40-GE interface, the system deletes the 40-GE interface and
creates the four 10-GE breakout interfaces.
After the using tengige command is successfully configured, you do not need to reboot the switch.
You can view the four 10-GE breakout interfaces by using the display interface brief command.
A 40-GE interface split into four 10-GE breakout interfaces must use a dedicated 1-to-4 cable. For
more information about the cable, see the installation guides.
To split a 40-GE interface into four 10-GE breakout interfaces:
2
After the using fortygige command is successfully configured, you do not need to reboot the switch.
You can view the 40-GE interface by using the display interface brief command.
After you combine the four 10-GE breakout interfaces, replace the dedicated 1-to-4 cable with a
dedicated 1-to-1 cable or a 40-GE transceiver module. For more information about the cable or
transceiver module, see the installation guides.
To combine four 10-GE breakout interfaces into a 40-GE interface:
3
Step Command Remarks
7. Restore the default
settings for the Ethernet default N/A
interface.
By default, Ethernet interfaces are in up
state.
8. Bring up the Ethernet
interface. undo shutdown The loopback, shutdown ,and port
up-mode commands are mutually
exclusive.
The interfaces on this Switch Series can operate either as Layer 2 or Layer 3 Ethernet interfaces.
You can set the link mode to bridge or route.
To configure the link mode of an Ethernet interface:
4
Configuring jumbo frame support
An Ethernet interface might receive frames larger than the standard Ethernet frame size during
high-throughput data exchanges, such as file transfers. These frames are called jumbo frames.
The Ethernet interface processes jumbo frames in the following ways:
• When the Ethernet interface is configured to deny jumbo frames, the Ethernet interface
discards jumbo frames.
• When the Ethernet interface is configured with jumbo frame support, the Ethernet interface
performs the following operations:
{ Processes jumbo frames within the specified length.
{ Discards jumbo frames that exceed the specified length.
To configure jumbo frame support in interface view:
The physical link state of an Ethernet interface is either up or down. Each time the physical link of an
interface comes up or goes down, the interface immediately reports the change to the CPU. The
CPU then performs the following operations:
• Notifies the upper-layer protocol modules (such as routing and forwarding modules) of the
change for guiding packet forwarding.
• Automatically generates traps and logs to inform users to take the correct actions.
To prevent frequent physical link flapping from affecting system performance, configure physical
state change suppression. You can configure this feature to suppress only link-down events, only
link-up events, or both. If an event of the specified type still exists when the suppression interval
expires, the system reports the event.
When you configure this feature, follow these guidelines:
• To suppress only link-down events, configure the link-delay [ msec ] delay-time command.
• To suppress only link-up events, configure the link-delay [ msec ] delay-time mode up
command.
• To suppress both link-down and link-up events, configure the link-delay [ msec ] delay-time
mode updown command.
To configure physical state change suppression on an Ethernet interface:
5
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Ethernet interface interface-type
interface view. N/A
interface-number
By default, the link-down or link-up event is
3. Configure physical link-delay [ msec ] immediately reported to the CPU.
state change delay-time [ mode { up | If you configure this command multiple times on
suppression. updown }] an Ethernet interface, the most recent
configuration takes effect.
6
Configuring generic flow control on an Ethernet interface
To avoid dropping packets on a link, you can enable generic flow control at both ends of the link.
When traffic congestion occurs at the receiving end, the receiving end sends a flow control (Pause)
frame to ask the sending end to suspend sending packets. Generic flow control includes the
following types:
• TxRx-mode generic flow control—Enabled by using the flow-control command. With
TxRx-mode generic flow control enabled, an interface can both send and receive flow control
frames:
{ When congestion occurs, the interface sends a flow control frame to its peer.
{ When the interface receives a flow control frame from its peer, it suspends sending packets
to its peer.
• Rx-mode generic flow control—Enabled by using the flow-control receive enable
command. With Rx-mode generic flow control enabled, an interface can receive flow control
frames, but it cannot send flow control frames:
{ When congestion occurs, the interface cannot send flow control frames to its peer.
{ When the interface receives a flow control frame from its peer, it suspends sending packets
to its peer.
To handle unidirectional traffic congestion on a link, configure the flow-control receive enable
command at one end and the flow-control command at the other end. To enable both ends of a link
to handle traffic congestion, configure the flow-control command at both ends.
To enable generic flow control on an Ethernet interface:
7
• The Enabled and Disabled fields in other cells are possible negotiation results.
Make sure all interfaces that a data flow passes through have the same PFC configuration.
Table 1 PFC configurations and negotiation results
Local (right)
enable auto Default
Peer (below)
enable Enabled Enabled. Disabled
• Enabled if negotiation
auto Enabled succeeds. Disabled
• Disabled if negotiation fails.
4. Enable PFC for 802.1p priority-flow-control no-drop By default, PFC is disabled for all
priorities. dot1p dot1p-list 802.1p priorities.
8
Enabling auto power-down on an Ethernet interface
When an Ethernet interface with auto power-down enabled has been down for a certain period of
time, both of the following events occur:
• The device automatically stops supplying power to the Ethernet interface.
• The Ethernet interface enters the power save mode.
The time period depends on the chip specifications and is not configurable.
When the Ethernet interface comes up, both of the following events occur:
• The device automatically restores power supply to the Ethernet interface.
• The Ethernet interface restores to its normal state.
To enable auto power-down on an Ethernet interface:
To display the interface statistics collected in the last statistics polling interval, use the display
interface command.
9
Configuring storm suppression
The storm suppression feature ensures that the size of a particular type of traffic (broadcast,
multicast, or unknown unicast traffic) does not exceed the threshold on an interface. When the
broadcast, multicast, or unknown unicast traffic on the interface exceeds this threshold, the system
discards packets until the traffic drops below this threshold.
Both storm suppression and storm control can suppress storms on an interface. Storm suppression
uses the chip to suppress traffic. Storm suppression has less impact on the device performance than
storm control, which uses software to suppress traffic.
Configuration restrictions and guidelines
When you configure storm suppression, follow these restrictions and guidelines:
• An interframe gap exists between each two continuous frames. The system excludes the time
of interframe gaps in monitoring the traffic size on the interface. The configured suppression
thresholds must be less than the total traffic that passes through the interface.
• For the traffic suppression result to be determined, do not configure storm control together with
storm suppression for the same type of traffic. For more information about storm control, see
"Configuring storm control on an Ethernet interface."
• Storm suppression configured on a Layer 3 Ethernet interface applies to the interface and its
subinterfaces if it is on a boarder gateway of the following networks:
{ VXLAN IP gateway network.
{ EVPN gateway network.
For more information about VXLAN IP gateway and EVPN gateway networks, see VXLAN
Configuration Guide and EVPN Configuration Guide.
• When you configure the suppression threshold in kbps, the actual suppression threshold might
be different from the configured one as follows:
{ If the configured value is smaller than 64, the value of 64 takes effect.
{ If the configured value is greater than 64 but not an integer multiple of 64, the integer
multiple of 64 that is greater than and closest to the configured value takes effect.
For the suppression threshold that takes effect, see the prompt on the device.
Configuration procedure
To set storm suppression thresholds on an Ethernet interface:
10
Configuring a Layer 2 Ethernet interface
Configuring storm control on an Ethernet interface
About storm control
Storm control compares broadcast, multicast, and unknown unicast traffic regularly with their
respective traffic thresholds on an Ethernet interface. For each type of traffic, storm control provides
a lower threshold and an upper threshold.
Depending on your configuration, when a particular type of traffic exceeds its upper threshold, the
interface performs either of the following operations:
• Blocks this type of traffic and forwards other types of traffic—Even though the interface
does not forward the blocked traffic, it still counts the traffic. When the blocked traffic drops
below the lower threshold, the interface begins to forward the traffic.
• Goes down automatically—The interface goes down automatically and stops forwarding any
traffic. When the blocked traffic drops below the lower threshold, the interface does not
automatically come up. To bring up the interface, use the undo shutdown command or disable
the storm control feature.
You can configure an Ethernet interface to output threshold event traps and log messages when
monitored traffic meets one of the following conditions:
• Exceeds the upper threshold.
• Drops below the lower threshold.
Both storm suppression and storm control can suppress storms on an interface. Storm suppression
uses the chip to suppress traffic. Storm suppression has less impact on the device performance than
storm control, which uses software to suppress traffic.
Storm control uses a complete polling cycle to collect traffic data, and analyzes the data in the next
cycle. An interface takes one to two polling intervals to take a storm control action.
Configuration restrictions and guidelines
For the traffic suppression result to be determined, do not configure storm control together with storm
suppression for the same type of traffic. For more information about storm suppression, see
"Configuring storm suppression."
Configuration procedure
To configure storm control on an Ethernet interface:
11
Step Command Remarks
5. Set the control action to take
when monitored traffic storm-constrain control { block By default, storm control is
exceeds the upper | shutdown } disabled.
threshold.
6. (Optional.) Enable the By default, the Ethernet interface
Ethernet interface to output outputs log messages when
log messages when it storm-constrain enable log monitored traffic exceeds the
detects storm control upper threshold or drops below
threshold events. the lower threshold.
By default, the Ethernet interface
7. (Optional.) Enable the sends traps when monitored
Ethernet interface to send traffic exceeds the upper
storm control threshold storm-constrain enable trap
threshold or drops below the
event traps. lower threshold from the upper
threshold.
As shown in Figure 1, a fiber port uses separate fibers for transmitting and receiving packets. The
physical state of the fiber port is up only when both transmit and receive fibers are physically
connected. If one of the fibers is disconnected, the fiber port does not work.
To enable a fiber port to forward traffic over a single link, you can use the port up-mode command.
This command forcibly brings up a fiber port, even when no fiber links or transceiver modules are
present for the fiber port. When one fiber link is present and up, the fiber port can forward packets
over the link unidirectionally.
12
Figure 1 Forcibly bring up a fiber port
When Ethernet interfaces
Correct fiber When Ethernet interfaces
cannot be or are not forcibly
connection are forcibly brought up
brought up
13
Setting the MDIX mode of an Ethernet interface
IMPORTANT:
Fiber ports do not support the MDIX mode setting.
A physical Ethernet interface has eight pins, each of which plays a dedicated role. For example, pins
1 and 2 transmit signals, and pins 3 and 6 receive signals. You can use both crossover and
straight-through Ethernet cables to connect copper Ethernet interfaces. To accommodate these
types of cables, a copper Ethernet interface can operate in one of the following Medium Dependent
Interface-Crossover (MDIX) modes:
• MDIX mode—Pins 1 and 2 are receive pins and pins 3 and 6 are transmit pins.
• MDI mode—Pins 1 and 2 are transmit pins and pins 3 and 6 are receive pins.
• AutoMDIX mode—The interface negotiates pin roles with its peer.
NOTE:
This feature does not take effect on pins 4, 5, 7, and 8 of physical Ethernet interfaces.
• Pins 4, 5, 7, and 8 of interfaces operating at 10 Mbps or 100 Mbps do not receive or transmit
signals.
• Pins 4, 5, 7, and 8 of interfaces operating at 1000 Mbps or higher rates receive and transmit
signals.
To enable a copper Ethernet interface to communicate with its peer, set the MDIX mode of the
interface by following these guidelines:
• Typically, set the MDIX mode of the interface to AutoMDIX. Set the MDIX mode of the interface
to MDI or MDIX only when the device cannot determine the cable type.
• When a straight-through cable is used, configure the interface to operate in an MDIX mode
different than its peer.
• When a crossover cable is used, perform one of the following tasks:
{ Configure the interface to operate in the same MDIX mode as its peer.
{ Configure either end to operate in AutoMDIX mode.
To set the MDIX mode of an Ethernet interface:
14
NOTE:
Fiber ports do not support this feature.
This feature tests the cable connection of an Ethernet interface and displays cable test result within 5
seconds. The test result includes the cable's status and some physical parameters. If any fault is
detected, the test result shows the length from the local port to the faulty point.
To test the cable connection of an Ethernet interface:
Step Command
1. Enter system view. system-view
2. Enter Ethernet interface view. interface interface-type interface-number
3. Perform a test for the cable connected to the
Ethernet interface. virtual-cable-test
3. Set the interface port connection-distance { 300 | By default, the interface connection
connection distance. 10000 | 20000 | 40000 } distance is 10000 meters.
15
Configuring a Layer 3 Ethernet interface or
subinterface
Setting the MTU for an Ethernet interface or subinterface
The maximum transmission unit (MTU) of an Ethernet interface affects the fragmentation and
reassembly of IP packets on the interface. Typically, you do not need to modify the MTU of an
interface.
To set the MTU for an Ethernet interface or subinterface:
16
Task Command
display counters { inbound | outbound } interface
Display interface traffic statistics. [ interface-type [ interface-number |
interface-number.subnumber ] ]
Display traffic rate statistics of interfaces display counters rate { inbound | outbound } interface
in up state over the last statistics polling [ interface-type [ interface-number |
interval. interface-number.subnumber ] ]
Display the operational and status display interface [ interface-type [ interface-number |
information of the specified interfaces. interface-number.subnumber ] ] [ brief [ description | down ] ]
display packet-drop { interface [ interface-type
Display information about dropped
[ interface-number | interface-number.subnumber ] ] |
packets on the specified interfaces.
summary }
Display the PFC information for an display priority-flow-control interface [ interface-type
interface. [ interface-number ] ]
Display information about storm control display storm-constrain [ broadcast | multicast | unicast ]
on the specified interfaces. [ interface interface-type interface-number ]
Display the Ethernet module statistics. display ethernet statistics slot slot-number
reset counters interface [ interface-type [ interface-number |
Clear interface or subinterface statistics.
interface-number.subnumber ] ]
Clear the statistics of dropped packets reset packet-drop interface [ interface-type [ interface-number
on the specified interfaces. | interface-number.subnumber ] ]
Clear the Ethernet module statistics. reset ethernet statistics [ slot slot-number ]
17
Configuring loopback, null, and
inloopback interfaces
This chapter describes how to configure a loopback interface, a null interface, and an inloopback
interface.
18
applying an ACL. For example, if you specify a null interface as the next hop of a static route to a
network segment, any packets routed to the network segment are dropped.
To configure a null interface:
Task Command
Display information about the specified or all display interface loopback [ interface-number ] [ brief
loopback interfaces. [ description | down ] ]
display interface null [ 0 ] [ brief [ description |
Display information about the null interface.
down ] ]
Display information about the inloopback display interface inloopback [ 0 ] [ brief [ description
interface. | down ] ]
Clear the statistics on the specified or all loopback reset counters interface loopback
interfaces. [ interface-number ]
Clear the statistics on the null interface. reset counters interface null [ 0 ]
19
Bulk configuring interfaces
You can enter interface range view to bulk configure multiple interfaces with the same feature instead
of configuring them one by one. For example, you can execute the shutdown command in interface
range view to shut down a range of interfaces.
Configuration procedure
Step Command Remarks
1. Enter system view. system-view N/A
20
Step Command Remarks
• interface range
{ interface-type
interface-number [ to
interface-type By using the interface range name
2. Enter interface range interface-number ] } &<1-24> command, you assign a name to an
view. interface range and can specify this
• interface range name name
name rather than the interface range
[ interface { interface-type
to enter the interface range view.
interface-number [ to
interface-type
interface-number ] } &<1-24> ]
3. (Optional.) Display
commands available for Enter a question mark (?) at the
the first interface in the N/A
interface range prompt.
interface range.
4. Use available
commands to configure Available commands depend on
N/A
the interfaces. the interface.
Task Command
Display information about the interface ranges
created by using the interface range name display interface range [ name name ]
command.
21
Configuring the MAC address table
Overview
An Ethernet device uses a MAC address table to forward frames. A MAC address entry includes a
destination MAC address, an outgoing interface, and a VLAN ID. When the device receives a frame,
it uses the destination MAC address of the frame to look for a match in the MAC address table.
• The device forwards the frame out of the outgoing interface in the matching entry if a match is
found.
• The device floods the frame in the VLAN of the frame if no match is found.
22
• Static entries—A static entry is manually added to forward frames with a specific destination
MAC address out of the associated interface, and it never ages out. A static entry has higher
priority than a dynamically learned one.
• Dynamic entries—A dynamic entry can be manually configured or dynamically learned to
forward frames with a specific destination MAC address out of the associated interface. A
dynamic entry might age out. A manually configured dynamic entry has the same priority as a
dynamically learned one.
• Blackhole entries—A blackhole entry is manually configured and never ages out. A blackhole
entry is configured for filtering out frames with a specific source or destination MAC address.
For example, to block all frames destined for or sourced from a user, you can configure the
MAC address of the user as a blackhole MAC address entry. A blackhole entry has higher
priority than a dynamically learned one.
• Multiport unicast entries—A multiport unicast entry is manually added to send frames with a
specific unicast destination MAC address out of multiple ports, and it never ages out. A multiport
unicast entry has higher priority than a dynamically learned one.
A static, blackhole, or multiport unicast MAC address entry can overwrite a dynamic MAC address
entry, but not vice versa. A static entry, a blackhole entry, and a multiport unicast entry cannot
overwrite one another.
Multiport unicast MAC address entries have no impact on the MAC address learning. When
receiving a frame whose source MAC address matches a multiport unicast entry, the device can still
learn the MAC address of the frame and generate a dynamic entry. However, the generated dynamic
entry has lower priority. The device prefers to use the multiport unicast entry to forward frames
destined for the MAC address in the entry.
Tasks at a glance
(Optional.) Configuring MAC address entries
• Adding or modifying a static or dynamic MAC address entry globally
• Adding or modifying a static or dynamic MAC address entry on an interface
• Adding or modifying a blackhole MAC address entry
• Adding or modifying a multiport unicast MAC address entry
(Optional.) Disabling MAC address learning
(Optional.) Setting the aging timer for dynamic MAC address entries
(Optional.) Setting the MAC learning limit
(Optional.) Configuring the unknown frame forwarding rule after the MAC learning limit is reached
(Optional.) Assigning MAC learning priority to interfaces
(Optional.) Enabling MAC address synchronization
(Optional.) Configuring MAC address move notifications and suppression
(Optional.) Enabling ARP fast update for MAC address moves
(Optional.) Disabling static source check
23
Tasks at a glance
(Optional.) Enabling conversational remote MAC learning
(Optional.) Enabling SNMP notifications for the MAC address table
Type Description
Forwards the frame according to the destination MAC address regardless of
Static MAC address entry
whether the frame's ingress interface is the same as that in the entry.
• Learns the MAC address (MACA) of the frame and generates a dynamic
MAC address entry, but the generated dynamic MAC address entry does
Multiport unicast MAC not take effect.
address entry
• Forwards frames destined for MACA based on the multiport unicast MAC
address entry.
Blackhole MAC address
Drops the frame.
entry
• Learns the MAC address of the frames received on a different interface
Dynamic MAC address from that in the entry and overwrites the original entry.
entry • Forwards the frame received on the same interface as that in the entry
and updates the aging timer for the entry.
24
Adding or modifying a static or dynamic MAC address entry
on an interface
Step Command Remarks
1. Enter system view. system-view N/A
• Enter Layer 2 Ethernet
interface view:
interface interface-type
interface-number
2. Enter interface view. • Enter Layer 2 aggregate N/A
interface view:
interface
bridge-aggregation
interface-number
By default, no MAC address entry
is configured on the interface.
3. Add or modify a static or mac-address { dynamic | static }
dynamic MAC address entry. mac-address vlan vlan-id Make sure you have created the
VLAN and assigned the interface
to the VLAN.
25
Figure 2 NLB cluster
You can configure a multiport unicast MAC address entry globally or on an interface.
Configuring a multiport unicast MAC address entry globally
26
After MAC address learning is disabled, the device immediately deletes existing dynamic MAC
address entries.
27
Setting the aging timer for dynamic MAC address
entries
For security and efficient use of table space, the MAC address table uses an aging timer for each
dynamic MAC address entry. If a dynamic MAC address entry is not updated before the aging timer
expires, the device deletes the entry. This aging mechanism ensures that the MAC address table can
promptly update to accommodate latest network topology changes.
A stable network requires a longer aging interval, and an unstable network requires a shorter aging
interval.
An aging interval that is too long might cause the MAC address table to retain outdated entries. As a
result, the MAC address table resources might be exhausted, and the MAC address table might fail
to update its entries to accommodate the latest network changes.
An interval that is too short might result in removal of valid entries, which would cause unnecessary
floods and possibly affect the device performance.
To reduce floods on a stable network, set a long aging timer or disable the timer to prevent dynamic
entries from unnecessarily aging out. Reducing floods improves the network performance. Reducing
flooding also improves the security because it reduces the chances for a data frame to reach
unintended destinations.
To set the aging timer for dynamic MAC address entries:
28
Configuring the unknown frame forwarding rule
after the MAC learning limit is reached
You can enable or disable forwarding of unknown frames after the MAC learning limit is reached.
To configure the device to forward unknown frames received on the interface after the MAC learning
limit on the interface is reached:
29
Enabling MAC address synchronization
To avoid unnecessary floods and improve forwarding speed, make sure all member devices have the
same MAC address table. After you enable MAC address synchronization, each member device
advertises learned MAC address entries to other member devices.
As shown in Figure 3:
• Device A and Device B form an IRF fabric enabled with MAC address synchronization.
• Device A and Device B connect to AP C and AP D, respectively.
When Client A associates with AP C, Device A learns a MAC address entry for Client A and
advertises it to Device B.
Figure 3 MAC address tables of devices when Client A accesses AP C
When Client A roams to AP D, Device B learns a MAC address entry for Client A. Device B
advertises it to Device A to ensure service continuity for Client A, as shown in Figure 4.
30
Figure 4 MAC address tables of devices when Client A roams to AP D
31
To configure MAC address move notifications and MAC address move suppression:
32
Figure 5 ARP fast update application scenario
Switch
XGE1/0/1 XGE1/0/2
AP 1 AP 2
Laptop
33
Step Command Remarks
• Enter Layer 2 Ethernet interface
view:
interface interface-type
interface-number
• Enter Layer 2 aggregate
interface view:
interface bridge-aggregation
interface-number
• Enter Layer 3 Ethernet interface
view:
2. Enter interface view. interface interface-type N/A
interface-number
• Enter Layer 3 aggregate
interface/subinterface view:
interface route-aggregation
{ interface-number |
interface-number.subnumber }
• Enter IRF physical interface
view:
interface interface-type
interface-number
3. Disable the static source undo mac-address static By default, the static source
check feature. source-check enable check feature is enabled.
34
For more information about SNMP and information center configuration, see the network
management and monitoring configuration guide for the device.
To enable SNMP notifications for the MAC address table:
Task Command
display mac-address [ mac-address [ vlan vlan-id ] | [ [ dynamic |
Display MAC address table
static ] [ interface interface-type interface-number ] | blackhole |
information.
multiport ] [ vlan vlan-id ] [ count ] ]
Display the aging timer for dynamic
display mac-address aging-time
MAC address entries.
Display the system or interface MAC display mac-address mac-learning [ interface interface-type
address learning state. interface-number ]
Display MAC address statistics. display mac-address statistics
Display the MAC address move
display mac-address mac-move [ slot slot-number ]
records.
35
Figure 6 Network diagram
Configuration procedure
# Add a static MAC address entry for MAC address 000f-e235-dc71 on Ten-GigabitEthernet 1/0/1
that belongs to VLAN 1.
<Device> system-view
[Device] mac-address static 000f-e235-dc71 interface ten-gigabitethernet 1/0/1 vlan 1
# Add a blackhole MAC address entry for MAC address 000f-e235-abcd that belongs to VLAN 1.
[Device] mac-address blackhole 000f-e235-abcd vlan 1
# Set the aging timer to 500 seconds for dynamic MAC address entries.
[Device] mac-address timer aging 500
36
Configuring MAC Information
The MAC Information feature can generate syslog messages or SNMP notifications when MAC
address entries are learned or deleted. You can use these messages to monitor user's leaving or
joining the network and analyze network traffic.
The MAC Information feature buffers the MAC change syslog messages or SNMP notifications in a
queue. The device overwrites the oldest MAC address change written into the queue with the most
recent MAC address change when the following conditions exist:
• The MAC change notification interval does not expire.
• The queue has been exhausted.
To send a syslog message or SNMP notification immediately after it is created, set the queue length
to zero.
37
Setting the MAC change notification interval
To prevent syslog messages or SNMP notifications from being sent too frequently, you can set the
MAC change notification interval to a larger value.
To set the MAC change notification interval:
38
correctly to the log host. The logging facility name and the severity level are configured by using
the info-center loghost and info-center source commands, respectively.
Configuration procedure
1. Configure Device to send syslog messages to Host B:
# Enable the information center.
<Device> system-view
[Device] info-center enable
# Specify the log host 192.168.1.2/24 and specify local4 as the logging facility.
[Device] info-center loghost 192.168.1.2 facility local4
# Disable log output to the log host.
[Device] info-center source default loghost deny
To avoid output of unnecessary information, disable all modules from outputting logs to the
specified destination (loghost, in this example) before you configure an output rule.
# Configure an output rule to output to the log host MAC address logs that have a severity level
no lower than informational.
[Device] info-center source mac loghost level informational
2. Configure the log host, Host B:
Configure Solaris as follows. Configure other UNIX operating systems in the same way Solaris
is configured.
a. Log in to the log host as a root user.
b. Create a subdirectory named Device in directory /var/log/.
# mkdir /var/log/Device
c. Create file info.log in the Device directory to save logs from Device.
# touch /var/log/Device/info.log
d. Edit the file syslog.conf in directory /etc/ and add the following contents:
# Device configuration messages
local4.info /var/log/Device/info.log
In this configuration, local4 is the name of the logging facility that the log host uses to
receive logs, and info is the informational level. The UNIX system records the log
information that has a severity level no lower than informational to the file
/var/log/Device/info.log.
e. Display the process ID of syslogd, end the syslogd process, and then restart syslogd
using the –r option to make the new configuration take effect.
# ps -ae | grep syslogd
147
# kill -HUP 147
# syslogd -r &
The device can output MAC address logs to the log host, which stores the logs to the specified
file.
3. Enable MAC Information on Device:
# Enable MAC Information globally.
[Device] mac-address information enable
# Configure the MAC Information mode as syslog.
[Device] mac-address information mode syslog
# Enable MAC Information on Ten-GigabitEthernet 1/0/1 to enable the port to record MAC
address change information when the interface performs either of the following operations:
39
{ Learns a new MAC address.
{ Deletes an existing MAC address.
[Device] interface ten-gigabitethernet 1/0/1
[Device-Ten-GigabitEthernet1/0/1] mac-address information enable added
[Device-Ten-GigabitEthernet1/0/1] mac-address information enable deleted
[Device-Ten-GigabitEthernet1/0/1] quit
# Set the MAC Information queue length to 100.
[Device] mac-address information queue-length 100
# Set the MAC change notification interval to 20 seconds.
[Device] mac-address information interval 20
40
Configuring Ethernet link aggregation
Ethernet link aggregation bundles multiple physical Ethernet links into one logical link, called an
aggregate link.
Link aggregation has the following benefits:
• Increased bandwidth beyond the limits of any single link. In an aggregate link, traffic is
distributed across the member ports.
• Improved link reliability. The member ports dynamically back up one another. When a member
port fails, its traffic is automatically switched to other member ports.
As shown in Figure 8, Device A and Device B are connected by three physical Ethernet links. These
physical Ethernet links are combined into an aggregate link called link aggregation 1. The bandwidth
of this aggregate link can reach up to the total bandwidth of the three physical Ethernet links. At the
same time, the three Ethernet links back up one another. When a physical Ethernet link fails, the
traffic previously transmitted on the failed link is switched to the other two links.
Figure 8 Ethernet link aggregation diagram
Basic concepts
Aggregation group, member port, and aggregate interface
An aggregation group is a group of Ethernet interfaces bundled together. These Ethernet interfaces
are called member ports of the aggregation group. Each aggregation group has a corresponding
logical interface (called an aggregate interface).
When an aggregate interface is created, the device automatically creates an aggregation group of
the same type and number as the aggregate interface.
An aggregate interface can be one of the following types:
• Layer 2—A Layer 2 aggregate interface is created manually. The member ports of the
corresponding Layer 2 aggregation group can only be Layer 2 Ethernet interfaces.
• Layer 3—A Layer 3 aggregate interface is created manually. The member ports of the
corresponding Layer 3 aggregation group can only be Layer 3 Ethernet interfaces.
On a Layer 3 aggregate interface, you can create subinterfaces.
The port rate of an aggregate interface equals the total rate of its Selected member ports. Its duplex
mode is the same as that of the Selected member ports. For more information about Selected
member ports, see "Aggregation states of member ports in an aggregation group."
41
{ Its aggregate interface is configured as an edge aggregate interface.
{ The port has not received Link Aggregation Control Protocol Data Units (LACPDUs) from its
peer port.
Operational key
When aggregating ports, the system automatically assigns each port an operational key based on
port information, such as port rate and duplex mode. Any change to this information triggers a
recalculation of the operational key.
In an aggregation group, all Selected ports have the same operational key.
Configuration types
Port configurations include attribute configurations and protocol configurations. Attribute
configurations of a link aggregation member port affect its aggregation state.
• Attribute configurations—To become a Selected port, a member port must have the same
attribute configurations as the aggregate interface. Table 2 describes the attribute
configurations.
Attribute configurations made on an aggregate interface are automatically synchronized to all
member ports. These configurations are retained on the member ports even after the aggregate
interface is deleted.
Any attribute configuration change on a member port might affect the aggregation states and
running services of the member ports. The system displays a warning message every time you
try to change an attribute configuration setting on a member port.
Table 2 Attribute configurations
Feature Considerations
Indicates whether the port has joined an isolation group and which isolation
Port isolation
group the port belongs to.
QinQ status (enabled/disabled), TPID for VLAN tags, and VLAN
QinQ transparent transmission. For information about QinQ, see "Configuring
QinQ."
VLAN mapping configured on the port. For more information about VLAN
VLAN mapping
mapping, see "Configuring VLAN mapping."
VLAN attribute configurations include the following:
• Permitted VLAN IDs.
• PVID.
• Link type (trunk, hybrid, or access).
• PVLAN port type (promiscuous, trunk promiscuous, host, or trunk
VLAN secondary).
• IP subnet-based VLAN configuration.
• Protocol-based VLAN configuration.
• VLAN tagging mode.
For information about VLANs, see "Configuring VLANs."
42
NOTE:
• The protocol configurations for an aggregate interface take effect only on the current
aggregate interface.
• The protocol configurations for a member port take effect only when the port leaves its
aggregation group.
43
Figure 9 Setting the aggregation state of a member port in a static aggregation group
After the limit on Selected ports is reached, the aggregation state of a new member port varies by
following conditions:
• The port is placed in Unselected state if the port and the Selected ports have the same port
priority. This mechanism prevents traffic interruption on the existing Selected ports. A device
reboot can cause the device to recalculate the aggregation states of member ports.
• The port is placed in Selected state when the following conditions are met:
{ The port and the Selected ports have different port priorities, and the port has a higher port
priority than a minimum of one Selected port.
{ The port has the same attribute configurations as the aggregate interface.
Any operational key or attribute configuration change might affect the aggregation states of link
aggregation member ports.
44
LACP
LACP uses LACPDUs to exchange aggregation information between LACP-enabled devices. Each
member port in a dynamic aggregation group can exchange information with its peer. When a
member port receives an LACPDU, it compares the received information with information received
on the other member ports. In this way, the two systems reach an agreement on which ports are
placed in Selected state.
LACP functions
LACP offers basic LACP functions and extended LACP functions, as described in Table 3.
Table 3 Basic and extended LACP functions
Category Description
Implemented through the basic LACPDU fields, including the system LACP
Basic LACP functions
priority, system MAC address, port priority, port number, and operational key.
Implemented by extending the LACPDU with new TLV fields. Extended LACP can
implement LACP MAD for the IRF feature.
Extended LACP The switch series can participate in LACP MAD as either an IRF member device or
functions an intermediate device.
For more information about IRF and the LACP MAD mechanism, see IRF
Configuration Guide.
Type Description
Used by two peer devices (or systems) to determine which one is superior in link
aggregation.
System LACP In dynamic link aggregation, the system that has higher system LACP priority sets
priority the Selected state of member ports on its side. The system that has lower priority
sets the aggregation state of local member ports the same as their respective peer
ports.
Determines the likelihood of a member port to be a Selected port on a system. A port
Port priority
with a higher port priority is more likely to become Selected.
45
• Long timeout interval—90 seconds. If you use the long timeout interval, the peer sends one
LACPDU every 30 seconds.
46
Figure 10 Setting the state of a member port in a dynamic aggregation group
The system with the greater system ID can detect the aggregation state changes on the peer system.
The system with the greater system ID sets the aggregation state of local member ports the same as
their peer ports.
When you aggregate interfaces in dynamic mode, follow these guidelines:
• A dynamic link aggregation group chooses only full-duplex ports as the Selected ports.
• For stable aggregation and service continuity, do not change the operational key or attribute
configurations on any member port.
• After the Selected port limit is reached, a newly joining port becomes a Selected port if it is more
eligible than a current Selected port.
47
Edge aggregate interface
Dynamic link aggregation fails on a server-facing aggregate interface if dynamic link aggregation is
configured only on the device. The device forwards traffic by using only one of the physical ports that
are connected to the server.
To improve link reliability, configure the aggregate interface as an edge aggregate interface. This
feature enables all member ports of the aggregation group to forward traffic. When a member port
fails, its traffic is automatically switched to other member ports.
After dynamic link aggregation is configured on the server, the device can receive LACPDUs from
the server. Then, link aggregation between the device and the server operates correctly.
An edge aggregate interface takes effect only when it is configured on an aggregate interface
corresponding to a dynamic aggregation group.
48
Tasks at a glance
(Optional.) Configuring load sharing for link aggregation groups:
• Setting load sharing modes for link aggregation groups
• Enabling local-first load sharing for link aggregation
• Configuring link aggregation load sharing algorithm settings
• Setting the global load sharing mode for MAC-in-MAC traffic
(Optional.) Enabling link-aggregation traffic redirection
(Optional.) Forwarding the traffic of specified VLANs out of a fixed member port on an aggregate link
(Optional.) Excluding a subnet from load sharing on aggregate links
• Do not assign a reflector port for port mirroring to an aggregation group. For more information
about reflector ports, see Network Management and Monitoring Configuration Guide.
• Deleting an aggregate interface also deletes its aggregation group and causes all member
ports to leave the aggregation group.
• You must configure the same aggregation mode on the two ends of an aggregate link.
• For a successful static aggregation, make sure the ports at both ends of each link are in the
same aggregation state.
• For a successful dynamic aggregation, make sure the peer ports of the ports aggregated at one
end are also aggregated. The two ends can automatically negotiate the aggregation state of
each member port.
49
Step Command Remarks
When you create a Layer 2
2. Create a Layer 2 aggregate aggregate interface, the system
interface and enter Layer 2 interface bridge-aggregation
automatically creates a Layer 2
aggregate interface view. interface-number
static aggregation group
numbered the same.
3. Exit to system view. quit N/A
a Enter Layer 2 Ethernet
interface view:
interface interface-type
4. Assign an interface to the interface-number Repeat these two substeps to
specified Layer 2 assign more Layer 2 Ethernet
b Assign the interface to the
aggregation group. interfaces to the aggregation
specified Layer 2
group.
aggregation group:
port link-aggregation
group group-id
5. (Optional.) Set the port link-aggregation port-priority The default port priority of an
priority for the interface. priority interface is 32768.
50
Step Command Remarks
By default, the long LACP timeout
interval (90 seconds) is used by
the interface.
9. Set the short LACP timeout To avoid traffic interruption during
interval (3 seconds) for the lacp period short an ISSU, do not set the short
interface. LACP timeout interval before
performing the ISSU. For more
information about ISSU, see
Fundamentals Configuration
Guide.
51
Step Command Remarks
4. Configure the aggregation
group to operate in dynamic By default, an aggregation group
link-aggregation mode dynamic
mode. operates in static mode.
52
Step Command Remarks
• Enter Layer 2 aggregate
interface view:
interface bridge-aggregation
2. Enter aggregate interface-number
interface or subinterface • Enter Layer 3 aggregate N/A
view. interface or subinterface view:
interface route-aggregation
{ interface-number |
interface-number.subnumber }
3. Configure the
description of the By default, the description of an
aggregate interface or description text interface is interface-name
subinterface. Interface.
53
Setting the MTU for a Layer 3 aggregate interface
The MTU of an interface affects IP packets fragmentation and reassembly on the interface.
To set the MTU for a Layer 3 aggregate interface:
The bandwidth of an aggregate link increases as the number of Selected member ports increases.
To avoid congestion, you can set the minimum number of Selected ports required for bringing up an
aggregate interface.
This minimum threshold setting affects the aggregation states of aggregation member ports and the
state of the aggregate interface.
• When the number of member ports eligible to be Selected ports is smaller than the minimum
threshold, the following events occur:
{ The eligible member ports are placed in Unselected state.
{ The link layer state of the aggregate interface becomes down.
• When the number of member ports eligible to be Selected ports reaches or exceeds the
minimum threshold, the following events occur:
{ The eligible member ports are placed in Selected state.
{ The link layer state of the aggregate interface becomes up.
The maximum number of Selected ports allowed in an aggregation group is limited by either manual
configuration or hardware limitation, whichever value is smaller.
You can implement backup between two ports by performing the following tasks:
• Assigning two ports to an aggregation group.
• Setting the maximum number of Selected ports to 1 for the aggregation group.
Then, only one Selected port is allowed in the aggregation group, and the Unselected port acts as a
backup port.
To set the minimum and maximum numbers of Selected ports for an aggregation group:
54
Step Command Remarks
• Enter Layer 2 aggregate
interface view:
interface
bridge-aggregation
2. Enter aggregate interface interface-number
view. N/A
• Enter Layer 3 aggregate
interface view:
interface
route-aggregation
interface-number
3. Set the minimum number of By default, the minimum number
Selected ports for the link-aggregation selected-port
of Selected ports is not specified
aggregation group. minimum min-number
for an aggregation group.
4. Set the maximum number of By default, the maximum number
Selected ports for the link-aggregation selected-port
of Selected ports for an
aggregation group. maximum max-number
aggregation group is 32.
55
Step Command Remarks
• Enter Layer 2 aggregate
interface view:
interface
bridge-aggregation
2. Enter aggregate interface interface-number
view. N/A
• Enter Layer 3 aggregate
interface view:
interface
route-aggregation
interface-number
3. Configure the aggregate By default, an aggregate interface
interface as an edge lacp edge-port does not operate as an edge
aggregate interface. aggregate interface.
56
Configuration procedure
To enable BFD for an aggregation group:
Step Command
1. Enter system view. system-view
• Enter Layer 2 aggregate interface view:
interface bridge-aggregation interface-number
2. Enter aggregate interface view. • Enter Layer 3 aggregate interface or subinterface view:
interface route-aggregation { interface-number |
interface-number.subnumber }
3. Shut down the aggregate interface or
subinterface. shutdown
Step Command
1. Enter system view. system-view
57
Step Command
• Enter Layer 2 aggregate interface view:
interface bridge-aggregation interface-number
2. Enter aggregate interface view. • Enter Layer 3 aggregate interface or subinterface view:
interface route-aggregation { interface-number |
interface-number.subnumber }
3. Restore the default settings for the
aggregate interface. default
58
Step Command Remarks
link-aggregation load-sharing
3. Set the load sharing mode mode { { destination-ip | By default, the group-specific
for the aggregation group. destination-mac | destination-port | load sharing mode is the same
source-ip | source-mac } * | as the global load sharing mode.
flexible }
No
Any Selected ports on the
ingress device?
Yes
59
This feature takes effect only when the per-flow load sharing mode is used and the per-flow load
sharing mode does not use the following traffic classification criteria:
• Source IP address.
• Destination IP address.
• Source MAC address.
• Destination MAC address.
• Source and destination IP addresses.
• Source and destination MAC addresses.
To configure a link aggregation load sharing algorithm:
60
group-specific link-aggregation traffic redirection is not configured, the group uses the global
link-aggregation traffic redirection settings.
Configuration procedure
To enable link-aggregation traffic redirection globally:
61
This task excludes the traffic in the specified VLANs from the load sharing mechanism on the
aggregate link.
An aggregation group can have only one management port. If you specify multiple ports in an
aggregation group as management ports, the system chooses the port with the lowest port number
as the management port.
To forward the traffic in specific VLANs out of a fixed port on an aggregate link:
Typically, an aggregate interface distributes traffic across its Selected member ports. The uplink and
downlink traffic of a host might be distributed to different member ports, as shown in Figure 12. To
make sure the bidirectional traffic of a subnet traverses the same member port, you can exclude that
subnet from load sharing by specifying it as a link aggregation management subnet.
When an aggregate interface receives an ARP packet from the management subnet, the device
looks up the sender IP address in the ARP table for a matching entry.
• If no matching entry exists, the device creates an ARP entry on the aggregation member port
from which the packet came in. This mechanism ensures that the returned downlink traffic will
be forwarded out of the member port that received the uplink traffic.
• If an ARP entry already exists on a different port than the aggregate interface or its member
ports, the device does not update that ARP entry. Instead, the device broadcasts an ARP
request out of all ports to relearn the ARP entry.
When an aggregate interface sends an ARP packet to the management subnet, the device sends
the packet out of all Selected member ports of the aggregate interface.
As shown in Figure 12, an aggregate link is established between the server and the IRF fabric. The
server sends all uplink traffic of a subnet through Port C1 to Port A1 on the IRF fabric. If that subnet
is not specified as a management subnet, the IRF fabric distributes its downlink traffic across Port A1
and Port B2. To send the downlink traffic of that subnet to the server only through Port A1, you can
specify the subnet as a link aggregation management subnet.
62
Figure 12 Link aggregation scenario before management subnets are used
Task Command
display interface [ { bridge-aggregation |
Display information for an aggregate interface
route-aggregation } [ interface-number ] ] [ brief
or multiple aggregate interfaces.
[ description | down ] ]
Display the local system ID. display lacp system-id
display link-aggregation load-sharing mode [ interface
Display the global or group-specific
[ { bridge-aggregation | route-aggregation }
link-aggregation load sharing modes.
interface-number ] ]
63
Task Command
display link-aggregation load-sharing path interface
{ bridge-aggregation | route-aggregation }
interface-number ingress-port interface-type
interface-number [ route ] { { destination-ip ip-address |
Display forwarding information for the specified
destination-ipv6 ipv6-address } | { source-ip ip-address |
traffic flow.
source-ipv6 ipv6-address } | destination-mac
mac-address | destination-port port-id | ethernet-type
type-number | ip-protocol protocol-id | source-mac
mac-address | source-port port-id | vlan vlan-id } *
Display detailed link aggregation information
display link-aggregation member-port [ interface-list ]
for link aggregation member ports.
Display summary information about all
display link-aggregation summary
aggregation groups.
display link-aggregation verbose
Display detailed information about the
[ { bridge-aggregation | route-aggregation }
specified aggregation groups.
[ interface-number ] ]
Clear LACP statistics for the specified link
reset lacp statistics [ interface interface-list ]
aggregation member ports.
Clear statistics for the specified aggregate reset counters interface [ { bridge-aggregation |
interfaces. route-aggregation } [ interface-number ] ]
64
Configuration procedure
1. Configure Device A:
# Create VLAN 10, and assign port Ten-GigabitEthernet 1/0/4 to VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] port ten-gigabitethernet 1/0/4
[DeviceA-vlan10] quit
# Create VLAN 20, and assign port Ten-GigabitEthernet 1/0/5 to VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] port ten-gigabitethernet 1/0/5
[DeviceA-vlan20] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 1.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] quit
# Assign ports Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/3 to link aggregation
group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to
VLANs 10 and 20.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20
[DeviceA-Bridge-Aggregation1] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port, M -- Management port, R -- Reference port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
65
--------------------------------------------------------------------------------
XGE1/0/1 S 32768 1
XGE1/0/2 S 32768 1
XGE1/0/3 S 32768 1
The output shows that link aggregation group 1 is a Layer 2 static aggregation group that contains
three Selected ports.
Configuration procedure
1. Configure Device A:
# Create VLAN 10, and assign the port Ten-GigabitEthernet 1/0/4 to VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] port ten-gigabitethernet 1/0/4
[DeviceA-vlan10] quit
# Create VLAN 20, and assign the port Ten-GigabitEthernet 1/0/5 to VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] port ten-gigabitethernet 1/0/5
[DeviceA-vlan20] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 1, and set the link aggregation mode
to dynamic.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] link-aggregation mode dynamic
[DeviceA-Bridge-Aggregation1] quit
66
# Assign ports Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/3 to link aggregation
group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to
VLANs 10 and 20.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20
[DeviceA-Bridge-Aggregation1] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port, M -- Management port, R -- Reference port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
The output shows that link aggregation group 1 is a Layer 2 dynamic aggregation group that contains
three Selected ports.
67
Layer 2 aggregation load sharing configuration example
Network requirements
On the network shown in Figure 15, perform the following tasks:
• Configure Layer 2 static aggregation groups 1 and 2 on Device A and Device B, respectively.
• Enable VLAN 10 at one end of the aggregate link to communicate with VLAN 10 at the other
end.
• Enable VLAN 20 at one end of the aggregate link to communicate with VLAN 20 at the other
end.
• Configure link aggregation groups 1 and 2 to load share traffic across aggregation group
member ports.
{ Configure link aggregation group 1 to load share packets based on source MAC addresses.
{ Configure link aggregation group 2 to load share packets based on destination MAC
addresses.
Figure 15 Network diagram
Configuration procedure
1. Configure Device A:
# Create VLAN 10, and assign the port Ten-GigabitEthernet 1/0/5 to VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] port ten-gigabitethernet 1/0/5
[DeviceA-vlan10] quit
# Create VLAN 20, and assign the port Ten-GigabitEthernet 1/0/6 to VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] port ten-gigabitethernet 1/0/6
[DeviceA-vlan20] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 1.
[DeviceA] interface bridge-aggregation 1
# Configure Layer 2 aggregation group 1 to load share packets based on source MAC
addresses.
[DeviceA-Bridge-Aggregation1] link-aggregation load-sharing mode source-mac
[DeviceA-Bridge-Aggregation1] quit
# Assign ports Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to link aggregation
group 1.
68
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to
VLAN 10.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 10
[DeviceA-Bridge-Aggregation1] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 2.
[DeviceA] interface bridge-aggregation 2
# Configure Layer 2 aggregation group 2 to load share packets based on destination MAC
addresses.
[DeviceA-Bridge-Aggregation2] link-aggregation load-sharing mode destination-mac
[DeviceA-Bridge-Aggregation2] quit
# Assign ports Ten-GigabitEthernet 1/0/3 and Ten-GigabitEthernet 1/0/4 to link aggregation
group 2.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 2
[DeviceA-Ten-GigabitEthernet1/0/3] quit
[DeviceA] interface ten-gigabitethernet 1/0/4
[DeviceA-Ten-GigabitEthernet1/0/4] port link-aggregation group 2
[DeviceA-Ten-GigabitEthernet1/0/4] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 2 as a trunk port and assign it to
VLAN 20.
[DeviceA] interface bridge-aggregation 2
[DeviceA-Bridge-Aggregation2] port link-type trunk
[DeviceA-Bridge-Aggregation2] port trunk permit vlan 20
[DeviceA-Bridge-Aggregation2] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port, M -- Management port, R -- Reference port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
69
--------------------------------------------------------------------------------
XGE1/0/1 S 32768 1
XGE1/0/2 S 32768 1
Configuration procedure
# Create Layer 2 aggregate interface Bridge-Aggregation 1, and set the link aggregation mode to
dynamic.
<Device> system-view
[Device] interface bridge-aggregation 1
[Device-Bridge-Aggregation1] link-aggregation mode dynamic
70
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as an edge aggregate interface.
[Device-Bridge-Aggregation1] lacp edge-port
[Device-Bridge-Aggregation1] quit
# Assign ports Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to link aggregation group 1.
[Device] interface ten-gigabitethernet 1/0/1
[Device-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[Device-Ten-GigabitEthernet1/0/1] quit
[Device] interface ten-gigabitethernet 1/0/2
[Device-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[Device-Ten-GigabitEthernet1/0/2] quit
The output shows that Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 are in Individual
state when they do not receive LACPDUs from the server. Both Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 can forward traffic. When one port fails, its traffic is automatically switched
to the other port.
71
Figure 17 Network diagram
Configuration procedure
1. Configure Device A:
# Create Layer 3 aggregate interface Route-Aggregation 1, and configure an IP address and
subnet mask for the aggregate interface.
<DeviceA> system-view
[DeviceA] interface route-aggregation 1
[DeviceA-Route-Aggregation1] ip address 192.168.1.1 24
[DeviceA-Route-Aggregation1] quit
# Assign Layer 3 Ethernet interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet
1/0/3 to aggregation group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port, M -- Management port, R -- Reference port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
The output shows that link aggregation group 1 is a Layer 3 static aggregation group that contains
three Selected ports.
72
Layer 3 dynamic aggregation configuration example
Network requirements
On the network shown in Figure 18, perform the following tasks:
• Configure a Layer 3 dynamic aggregation group on both Device A and Device B.
• Configure IP addresses and subnet masks for the corresponding Layer 3 aggregate interfaces.
Figure 18 Network diagram
Configuration procedure
1. Configure Device A:
# Create Layer 3 aggregate interface Route-Aggregation 1.
<DeviceA> system-view
[DeviceA] interface route-aggregation 1
# Set the link aggregation mode to dynamic.
[DeviceA-Route-Aggregation1] link-aggregation mode dynamic
# Configure an IP address and subnet mask for Route-Aggregation 1.
[DeviceA-Route-Aggregation1] ip address 192.168.1.1 24
[DeviceA-Route-Aggregation1] quit
# Assign Layer 3 Ethernet interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet
1/0/3 to aggregation group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port, M -- Management port, R -- Reference port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
73
Loadsharing Type: NonS
Management VLANs: None
System ID: 0x8000, 000f-e267-6c6a
Local:
Port Status Priority Index Oper-Key Flag
XGE1/0/1 S 32768 11 1 {ACDEF}
XGE1/0/2 S 32768 12 1 {ACDEF}
XGE1/0/3 S 32768 13 1 {ACDEF}
Remote:
Actor Priority Index Oper-Key SystemID Flag
XGE1/0/1 32768 81 1 0x8000, 000f-e267-57ad {ACDEF}
XGE1/0/2 32768 81 1 0x8000, 000f-e267-57ad {ACDEF}
XGE1/0/3 32768 81 1 0x8000, 000f-e267-57ad {ACDEF}
The output shows that link aggregation group 1 is a Layer 3 dynamic aggregation group that contains
three Selected ports.
Configuration procedure
1. Configure Device A:
# Create Layer 3 aggregate interface Route-Aggregation 1.
<DeviceA> system-view
[DeviceA] interface route-aggregation 1
# Configure Layer 3 aggregation group 1 to load share packets based on source IP addresses.
[DeviceA-Route-Aggregation1] link-aggregation load-sharing mode source-ip
# Configure an IP address and subnet mask for Layer 3 aggregate interface Route-Aggregation
1.
[DeviceA-Route-Aggregation1] ip address 192.168.1.1 24
[DeviceA-Route-Aggregation1] quit
# Assign Layer 3 Ethernet interfaces Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2
to aggregation group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
74
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Create Layer 3 aggregate interface Route-Aggregation 2.
[DeviceA] interface route-aggregation 2
# Configure Layer 3 aggregation group 2 to load share packets based on destination IP
addresses.
[DeviceA-Route-Aggregation2] link-aggregation load-sharing mode destination-ip
# Configure an IP address and subnet mask for Layer 3 aggregate interface Route-Aggregation
2.
[DeviceA-Route-Aggregation2] ip address 192.168.2.1 24
[DeviceA-Route-Aggregation2] quit
# Assign Layer 3 Ethernet interfaces Ten-GigabitEthernet 1/0/3 and Ten-GigabitEthernet 1/0/4
to aggregation group 2.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 2
[DeviceA-Ten-GigabitEthernet1/0/3] quit
[DeviceA] interface ten-gigabitethernet 1/0/4
[DeviceA-Ten-GigabitEthernet1/0/4] port link-aggregation group 2
[DeviceA-Ten-GigabitEthernet1/0/4] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected, I -- Individual
Port: A -- Auto port, M -- Management port, R -- Reference port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
75
XGE1/0/4 S 32768 2
Configuration procedure
# Create Layer 3 aggregate interface Route-Aggregation 1, and set the link aggregation mode to
dynamic.
<Device> system-view
[Device] interface route-aggregation 1
[Device-Route-Aggregation1] link-aggregation mode dynamic
# Configure an IP address and subnet mask for Layer 3 aggregate interface Route-Aggregation 1.
[Device-Route-Aggregation1] ip address 192.168.1.1 24
76
[Device] interface ten-gigabitethernet 1/0/2
[Device-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[Device-Ten-GigabitEthernet1/0/2] quit
The output shows that Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 are in Individual
state when they do not receive LACPDUs from the server. Both Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 can forward traffic. When one port fails, its traffic is automatically switched
to the other port.
77
Configuring port isolation
The port isolation feature isolates Layer 2 traffic for data privacy and security without using VLANs.
Ports in an isolation group cannot communicate with each other. However, they can communicate
with ports outside the isolation group.
Task Command
Display isolation group information. display port-isolate group [ group-id ]
78
Port isolation configuration example
Network requirements
As shown in Figure 21:
• LAN users Host A, Host B, and Host C are connected to Ten-GigabitEthernet 1/0/1,
Ten-GigabitEthernet 1/0/2, and Ten-GigabitEthernet 1/0/3 on the device, respectively.
• The device connects to the Internet through Ten-GigabitEthernet 1/0/4.
Configure the device to provide Internet access for the hosts, and isolate them from one another at
Layer 2.
Figure 21 Network diagram
Internet
XGE1/0/4
Device
XGE1/0/1 XGE1/0/3
XGE1/0/2
Configuration procedure
# Create isolation group 1.
<Device> system-view
[Device] port-isolate group 1
79
Port isolation group information:
Group ID: 1
Group members:
Ten-GigabitEthernet1/0/1 Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/3
80
Configuring spanning tree protocols
Spanning tree protocols eliminate loops in a physical link-redundant network by selectively blocking
redundant links and putting them in a standby state.
The recent versions of STP include the Rapid Spanning Tree Protocol (RSTP), the Per-VLAN
Spanning Tree (PVST), and the Multiple Spanning Tree Protocol (MSTP).
STP
STP was developed based on the 802.1d standard of IEEE to eliminate loops at the data link layer in
a LAN. Networks often have redundant links as backups in case of failures, but loops are a very
serious problem. Devices running STP detect loops in the network by exchanging information with
one another. They eliminate loops by selectively blocking certain ports to prune the loop structure
into a loop-free tree structure. This avoids proliferation and infinite cycling of packets that would
occur in a loop network.
In a narrow sense, STP refers to IEEE 802.1d STP. In a broad sense, STP refers to the IEEE 802.1d
STP and various enhanced spanning tree protocols derived from that protocol.
81
• Protocol ID—Fixed at 0x0000, which represents IEEE 802.1d.
• Protocol version ID—Spanning tree protocol version ID. The protocol version ID for STP is
0x00.
• BPDU type—Type of the BPDU. The value is 0x00 for a configuration BPDU.
• Flags—An 8-bit field indicates the purpose of the BPDU. The lowest bit is the Topology Change
(TC) flag. The highest bit is the Topology Change Acknowledge (TCA) flag. All other bits are
reserved.
• Root ID—Root bridge ID formed by the priority and MAC address of the root bridge.
• Root path cost—Cost of the path to the root bridge.
• Bridge ID—Designated bridge ID formed by the priority and MAC address of the designated
bridge.
• Port ID—Designated port ID formed by the priority and global port number of the designated
port.
• Message age—Age of the configuration BPDU while it propagates in the network.
• Max age—Maximum age of the configuration BPDU stored on the switch.
• Hello time—Configuration BPDU transmission interval.
• Forward delay—Delay for STP bridges to transit port state.
Devices use the root bridge ID, root path cost, designated bridge ID, designated port ID, message
age, max age, hello time, and forward delay for spanning tree calculation.
TCN BPDUs
Devices use TCN BPDUs to announce changes in the network topology. Figure 23 shows the TCN
BPDU format.
Figure 23 TCN BPDU format
82
Basic concepts in STP
Root bridge
A tree network must have a root bridge. The entire network contains only one root bridge, and all the
other bridges in the network are called leaf nodes. The root bridge is not permanent, but can change
with changes of the network topology.
Upon initialization of a network, each device generates and periodically sends configuration BPDUs,
with itself as the root bridge. After network convergence, only the root bridge generates and
periodically sends configuration BPDUs. The other devices only forward the BPDUs.
Root port
On a non-root bridge, the port nearest to the root bridge is the root port. The root port communicates
with the root bridge. Each non-root bridge has only one root port. The root bridge has no root port.
Designated bridge and designated port
As shown in Figure 24, Device B and Device C are directly connected to a LAN.
If Device A forwards BPDUs to Device B through port A1, the designated bridge and designated port
are as follows:
• The designated bridge for Device B is Device A.
• The designated port for Device B is port A1 on Device A.
If Device B forwards BPDUs to the LAN, the designated bridge and designated port are as follows:
• The designated bridge for the LAN is Device B.
• The designated port for the LAN is port B2 on Device B.
Figure 24 Designated bridges and designated ports
Port states
Table 6 lists the port states in STP.
83
Table 6 STP port states
Path cost
Path cost is a reference value used for link selection in STP. To prune the network into a loop-free
tree, STP calculates path costs to select the most robust links and block redundant links that are less
robust.
Step Description
A non-root-bridge device regards the port on which it received the optimum configuration
1 BPDU as the root port. Table 7 describes how the optimum configuration BPDU is
selected.
Based on the configuration BPDU and the path cost of the root port, the device calculates
a designated port configuration BPDU for each of the other ports.
• The root bridge ID is replaced with that of the configuration BPDU of the root port.
2 • The root path cost is replaced with that of the configuration BPDU of the root port plus
the path cost of the root port.
• The designated bridge ID is replaced with the ID of this device.
• The designated port ID is replaced with the ID of this port.
84
Step Description
The device compares the calculated configuration BPDU with the configuration BPDU on
the port whose port role will be determined. Then, the device acts depending on the result
of the comparison:
• If the calculated configuration BPDU is superior, the device performs the following
operations:
{ Considers this port as the designated port.
3
{ Replaces the configuration BPDU on the port with the calculated configuration
BPDU.
{ Periodically sends the calculated configuration BPDU.
• If the configuration BPDU on the port is superior, the device blocks this port without
updating its configuration BPDU. The blocked port can receive BPDUs, but cannot
send BPDUs or forward data traffic.
When the network topology is stable, only the root port and designated ports forward user traffic.
Other ports are all in the blocking state to receive BPDUs but not to forward BPDUs or user
traffic.
Table 7 Selecting the optimum configuration BPDU
Step Actions
Upon receiving a configuration BPDU on a port, the device compares the priority of the
received configuration BPDU with that of the configuration BPDU generated by the port.
• If the former priority is lower, the device discards the received configuration BPDU
1
and keeps the configuration BPDU the port generated.
• If the former priority is higher, the device replaces the content of the configuration
BPDU generated by the port with the content of the received configuration BPDU.
The device compares the configuration BPDUs of all the ports and chooses the optimum
2
configuration BPDU.
85
Figure 25 The STP algorithm
As shown in Figure 25, the priority values of Device A, Device B, and Device C are 0, 1, and 2,
respectively. The path costs of links among the three devices are 5, 10, and 4.
1. Device state initialization.
In Table 8, each configuration BPDU contains the following fields: root bridge ID, root path cost,
designated bridge ID, and designated port ID.
Table 8 Initial state of each device
Configuration BPDU on
Device Port name
the port
Port A1 {0, 0, 0, Port A1}
Device A
Port A2 {0, 0, 0, Port A2}
Port B1 {1, 0, 1, Port B1}
Device B
Port B2 {1, 0, 1, Port B2}
Port C1 {2, 0, 2, Port C1}
Device C
Port C2 {2, 0, 2, Port C2}
86
Table 9 Comparison process and result on each device
Configuration BPDU
Device Comparison process on ports after
comparison
Port A1 performs the following operations:
1. Receives the configuration BPDU of Port B1 {1, 0, 1,
Port B1}.
2. Determines that its existing configuration BPDU {0, 0,
0, Port A1} is superior to the received configuration
BPDU.
3. Discards the received one.
Port A2 performs the following operations: • Port A1: {0, 0, 0, Port
1. Receives the configuration BPDU of Port C1 {2, 0, 2, A1}
Device A Port C1}. • Port A2: {0, 0, 0, Port
2. Determines that its existing configuration BPDU {0, 0, A2}
0, Port A2} is superior to the received configuration
BPDU.
3. Discards the received one.
Device A determines that it is both the root bridge and
designated bridge in the configuration BPDUs of all its
ports. It considers itself as the root bridge. It does not
change the configuration BPDU of any port and starts to
periodically send configuration BPDUs.
Port B1 performs the following operations:
1. Receives the configuration BPDU of Port A1 {0, 0, 0,
Port A1}.
2. Determines that the received configuration BPDU is
superior to its existing configuration BPDU {1, 0, 1,
Port B1}. • Port B1: {0, 0, 0, Port
3. Updates its configuration BPDU. A1}
Port B2 performs the following operations: • Port B2: {1, 0, 1, Port
1. Receives the configuration BPDU of Port C2 {2, 0, 2, B2}
Port C2}.
2. Determines that its existing configuration BPDU {1, 0,
1, Port B2} is superior to the received configuration
BPDU.
3. Discards the received BPDU.
Device B
Device B performs the following operations:
1. Compares the configuration BPDUs of all its ports.
2. Decides that the configuration BPDU of Port B1 is the
optimum.
3. Selects Port B1 as the root port with the configuration
BPDU unchanged. • Root port (Port B1):
Based on the configuration BPDU and path cost of the root {0, 0, 0, Port A1}
port, Device B calculates a designated port configuration • Designated port (Port
BPDU for Port B2 {0, 5, 1, Port B2}. Device B compares it B2): {0, 5, 1, Port B2}
with the existing configuration BPDU of Port B2 {1, 0, 1, Port
B2}. Device B determines that the calculated one is
superior, and determines that Port B2 is the designated
port. It replaces the configuration BPDU on Port B2 with the
calculated one, and periodically sends the calculated
configuration BPDU.
87
Configuration BPDU
Device Comparison process on ports after
comparison
Port C1 performs the following operations:
1. Receives the configuration BPDU of Port A2 {0, 0, 0,
Port A2}.
2. Determines that the received configuration BPDU is
superior to its existing configuration BPDU {2, 0, 2,
Port C1}. • Port C1: {0, 0, 0, Port
3. Updates its configuration BPDU. A2}
Port C2 performs the following operations: • Port C2: {1, 0, 1, Port
1. Receives the original configuration BPDU of Port B2 B2}
{1, 0, 1, Port B2}.
2. Determines that the received configuration BPDU is
superior to the existing configuration BPDU {2, 0, 2,
Port C2}.
3. Updates its configuration BPDU.
Device C performs the following operations:
1. Compares the configuration BPDUs of all its ports.
2. Decides that the configuration BPDU of Port C1 is the
optimum.
3. Selects Port C1 as the root port with the configuration • Root port (Port C1):
BPDU unchanged. {0, 0, 0, Port A2}
Device C
Based on the configuration BPDU and path cost of the root • Designated port (Port
port, Device C calculates the configuration BPDU of Port C2 C2): {0, 10, 2, Port
{0, 10, 2, Port C2}. Device C compares it with the existing C2}
configuration BPDU of Port C2 {1, 0, 1, Port B2}. Device C
determines that the calculated configuration BPDU is
superior to the existing one, selects Port C2 as the
designated port, and replaces the configuration BPDU of
Port C2 with the calculated one.
Port C2 performs the following operations:
1. Receives the updated configuration BPDU of Port B2
{0, 5, 1, Port B2}.
2. Determines that the received configuration BPDU is
superior to its existing configuration BPDU {0, 10, 2,
Port C2}. • Port C1: {0, 0, 0, Port
A2}
3. Updates its configuration BPDU.
• Port C2: {0, 5, 1, Port
Port C1 performs the following operations: B2}
1. Receives a periodic configuration BPDU {0, 0, 0, Port
A2} from Port A2.
2. Determines that it is the same as the existing
configuration BPDU.
3. Discards the received BPDU.
88
Configuration BPDU
Device Comparison process on ports after
comparison
Device C determines that the root path cost of Port C1 is
larger than that of Port C2. The root path cost of Port C1 is
10, root path cost of the received configuration BPDU (0)
plus path cost of Port C1 (10). The root path cost of Port C2
is 9, root path cost of the received configuration BPDU (5)
plus path cost of Port C2 (4). Device C determines that the
configuration BPDU of Port C2 is the optimum, and selects
Port C2 as the root port with the configuration BPDU
unchanged.
Based on the configuration BPDU and path cost of the root • Blocked port (Port
port, Device C performs the following operations: C1): {0, 0, 0, Port A2}
1. Calculates a designated port configuration BPDU for • Root port (Port C2):
Port C1 {0, 9, 2, Port C1}. {0, 5, 1, Port B2}
2. Compares it with the existing configuration BPDU of
Port C1 {0, 0, 0, Port A2}.
3. Determines that the existing configuration BPDU is
superior to the calculated one and blocks Port C1 with
the configuration BPDU unchanged.
Port C1 does not forward data until a new event triggers a
spanning tree calculation process: for example, the link
between Device B and Device C is down.
After the comparison processes described in Table 9, a spanning tree with Device A as the root
bridge is established, as shown in Figure 26.
Figure 26 The final calculated spanning tree
89
• If a path fails, the root port on this path no longer receives new configuration BPDUs and the old
configuration BPDUs will be discarded due to timeout. The device generates a configuration
BPDU with itself as the root and sends the BPDUs and TCN BPDUs. This triggers a new
spanning tree calculation process to establish a new path to restore the network connectivity.
However, the newly calculated configuration BPDU cannot be propagated throughout the network
immediately. As a result, the old root ports and designated ports that have not detected the topology
change continue forwarding data along the old path. If the new root ports and designated ports begin
to forward data as soon as they are elected, a temporary loop might occur.
STP timers
The most important timing parameters in STP calculation are forward delay, hello time, and max age.
• Forward delay
Forward delay is the delay time for port state transition. By default, the forward delay is 15
seconds.
A path failure can cause spanning tree re-calculation to adapt the spanning tree structure to the
change. However, the resulting new configuration BPDU cannot propagate throughout the
network immediately. If the newly elected root ports and designated ports start to forward data
immediately, a temporary loop will likely occur.
The newly elected root ports or designated ports must go through the listening and learning
states before they transit to the forwarding state. This requires twice the forward delay time and
allows the new configuration BPDU to propagate throughout the network.
• Hello time
The device sends configuration BPDUs at the hello time interval to the neighboring devices to
ensure that the paths are fault-free. By default, the hello time is 2 seconds. If the device does
not receive configuration BPDUs within the timeout period, it recalculates the spanning tree.
The formula for calculating the timeout period is timeout period = timeout factor × 3 × hello time.
• Max age
The device uses the max age to determine whether a stored configuration BPDU has expired
and discards it if the max age is exceeded. By default, the max age is 20 seconds. In the CIST
of an MSTP network, the device uses the max age timer to determine whether a configuration
BPDU received by a port has expired. If it is expired, a new spanning tree calculation process
starts. The max age timer does not take effect on MSTIs.
If a port does not receive any configuration BPDUs within the timeout period, the port transits to the
listening state. The device will recalculate the spanning tree. It takes the port 50 seconds to transit
back to the forwarding state. This period includes 20 seconds for the max age, 15 seconds for the
listening state, and 15 seconds for the learning state.
To ensure a fast topology convergence, make sure the timer settings meet the following formulas:
• 2 × (forward delay – 1 second) ≥ max age
• Max age ≥ 2 × (hello time + 1 second)
RSTP
RSTP achieves rapid network convergence by allowing a newly elected root port or designated port
to enter the forwarding state much faster than STP.
90
• BPDU type—The value is 0x02 for RSTP BPDUs.
• Flags—All 8 bits are used.
• Version1 length—The value is 0x00, which means no version 1 protocol information is
present.
RSTP does not use TCN BPDUs to advertise topology changes. RSTP floods BPDUs with the TC
flag set in the network to advertise topology changes.
91
− The designated port connects to a point-to-point link and receives a handshake
response from the directly connected device.
PVST
In an STP- or RSTP-enabled LAN, all bridges share one spanning tree. Traffic from all VLANs is
forwarded along the spanning tree, and ports cannot be blocked on a per-VLAN basis to prune loops.
PVST allows every VLAN to have its own spanning tree, which increases usage of links and
bandwidth. Because each VLAN runs RSTP independently, a spanning tree only serves its VLAN.
A PVST-enabled HPE device can communicate with a third-party device that is running Rapid PVST
or PVST. The PVST-enabled HPE device supports fast network convergence like RSTP when
connected to PVST-enabled HPE devices or third-party devices enabled with Rapid PVST.
92
• The destination MAC address of a PVST BPDU is 01-00-0c-cc-cc-cd, which is a private MAC
address.
• Each PVST BPDU carries a VLAN tag. The VLAN tag identifies the VLAN to which the PVST
BPDU belongs.
• The organization code and PID fields are added to the LLC header of the PVST BPDU.
Figure 28 PVST BPDU format
A port's link type determines the type of BPDUs the port sends.
• An access port sends RSTP BPDUs.
• A trunk or hybrid port sends RSTP BPDUs in the default VLAN and sends PVST BPDUs in other
VLANs.
MSTP
MSTP overcomes the following STP, RSTP, and PVST limitations:
• STP limitations—STP does not support rapid state transition of ports. A newly elected port
must wait twice the forward delay time before it transits to the forwarding state.
• RSTP limitations—Although RSTP enables faster network convergence than STP, RSTP fails
to provide load balancing among VLANs. As with STP, all RSTP bridges in a LAN share one
spanning tree and forward frames from all VLANs along this spanning tree.
• PVST limitations—Because each VLAN has its spanning tree, the amount of PVST BPDUs is
proportional to the number of VLANs on a trunk or hybrid port. When the trunk or hybrid port
permits too many VLANs, both resources and calculations for maintaining the VLAN spanning
trees increase dramatically. If a status change occurs on the trunk or hybrid port that permits
multiple VLANs, the device CPU will be overburdened with recalculating the affected spanning
trees. As a result, network performance is degraded.
MSTP features
Developed based on IEEE 802.1s, MSTP overcomes the limitations of STP, RSTP, and PVST. In
addition to supporting rapid network convergence, it allows data flows of different VLANs to be
forwarded along separate paths. This provides a better load sharing mechanism for redundant links.
93
MSTP provides the following features:
• MSTP divides a switched network into multiple regions, each of which contains multiple
spanning trees that are independent of one another.
• MSTP supports mapping VLANs to spanning tree instances by means of a VLAN-to-instance
mapping table. MSTP can reduce communication overheads and resource usage by mapping
multiple VLANs to one instance.
• MSTP prunes a loop network into a loop-free tree, which avoids proliferation and endless
cycling of frames in a loop network. In addition, it supports load balancing of VLAN data by
providing multiple redundant paths for data forwarding.
• MSTP is compatible with STP and RSTP, and partially compatible with PVST.
The first 13 fields of an MSTP BPDU are the same as an RSTP BPDU. The other six fields are
unique to MSTP.
• Protocol version ID—The value is 0x03 for MSTP.
• BPDU type—The value is 0x02 for RSTP/MSTP BPDUs.
• Root ID—ID of the common root bridge.
• Root path cost—CIST external path cost.
• Bridge ID—ID of the regional root for the IST or an MSTI.
• Port ID—ID of the designated port in the CIST.
• Version3 length—Length of the MSTP-specific fields. Devices use this field for verification
upon receiving an MSTP BPDU.
• MST configuration ID—Includes the format selector, configuration name, revision level, and
configuration digest. The value for format selector is fixed at 0x00. The other parameters are
used to identify the MST region for the originating bridge.
94
• CIST IRPC—Internal root path cost (IRPC) from the originating bridge to the root of the MST
region.
• CIST bridge ID—ID of the bridge that sends the MSTP BPDU.
• CIST remaining ID—Remaining hop count. This field limits the scale of the MST region. The
regional root sends a BPDU with the remaining hop count set to the maximum value. Each
device that receives the BPDU decrements the hop count by one. When the hop count reaches
zero, the BPDU is discarded. Devices beyond the maximum hops of the MST region cannot
participate in spanning tree calculation. The default remaining hop count is 20.
• MSTI configuration messages—Contains MSTI configuration messages. Each MSTI
configuration message is 16 bytes. This field can contain 0 to 64 MSTI configuration messages.
The number of the MSTI configuration messages is determined by the number of MSTIs in the
MST region.
95
Figure 31 Network diagram and topology of MST region 3
MST region
A multiple spanning tree region (MST region) consists of multiple devices in a switched network and
the network segments among them. All these devices have the following characteristics:
• A spanning tree protocol enabled
• Same region name
• Same VLAN-to-instance mapping configuration
• Same MSTP revision level
• Physically linked together
Multiple MST regions can exist in a switched network. You can assign multiple devices to the same
MST region, as shown in Figure 30.
• The switched network contains four MST regions, MST region 1 through MST region 4.
• All devices in each MST region have the same MST region configuration.
MSTI
MSTP can generate multiple independent spanning trees in an MST region, and each spanning tree
is mapped to the specific VLANs. Each spanning tree is referred to as a multiple spanning tree
instance (MSTI).
In Figure 31, MST region 3 contains three MSTIs, MSTI 1, MSTI 2, and MSTI 0.
VLAN-to-instance mapping table
As an attribute of an MST region, the VLAN-to-instance mapping table describes the mapping
relationships between VLANs and MSTIs.
In Figure 31, the VLAN-to-instance mapping table of MST region 3 is as follows:
• VLAN 1 to MSTI 1.
• VLAN 2 and VLAN 3 to MSTI 2.
• Other VLANs to MSTI 0.
MSTP achieves load balancing by means of the VLAN-to-instance mapping table.
CST
The common spanning tree (CST) is a single spanning tree that connects all MST regions in a
switched network. If you regard each MST region as a device, the CST is a spanning tree calculated
by these devices through STP or RSTP.
96
The blue lines in Figure 30 represent the CST.
IST
An internal spanning tree (IST) is a spanning tree that runs in an MST region. It is also called MSTI 0,
a special MSTI to which all VLANs are mapped by default.
In Figure 30, MSTI 0 is the IST in MST region 3.
CIST
The common and internal spanning tree (CIST) is a single spanning tree that connects all devices in
a switched network. It consists of the ISTs in all MST regions and the CST.
In Figure 30, the ISTs (MSTI 0) in all MST regions plus the inter-region CST constitute the CIST of the
entire network.
Regional root
The root bridge of the IST or an MSTI within an MST region is the regional root of the IST or MSTI.
Based on the topology, different spanning trees in an MST region might have different regional roots,
as shown in MST region 3 in Figure 31.
• The regional root of MSTI 1 is Device B.
• The regional root of MSTI 2 is Device C.
• The regional root of MSTI 0 (also known as the IST) is Device A.
Common root bridge
The common root bridge is the root bridge of the CIST.
In Figure 30, the common root bridge is a device in MST region 1.
Port roles
A port can play different roles in different MSTIs. As shown in Figure 32, an MST region contains
Device A, Device B, Device C, and Device D. Port A1 and port A2 of Device A connect to the
common root bridge. Port B2 and Port B3 of Device B form a loop. Port C3 and Port C4 of Device C
connect to other MST regions. Port D3 of Device D directly connects to a host.
Figure 32 Port roles
To the common root
Boundary port
Port C1
Port C2
Normal link
Device C
Blocked link
Port C3 Port C4
97
MSTP calculation involves the following port roles:
• Root port—Forwards data for a non-root bridge to the root bridge. The root bridge does not
have any root port.
• Designated port—Forwards data to the downstream network segment or device.
• Alternate port—Acts as the backup port for a root port or master port. When the root port or
master port is blocked, the alternate port takes over.
• Backup port—Acts as the backup port of a designated port. When the designated port is
invalid, the backup port becomes the new designated port. A loop occurs when two ports of the
same spanning tree device are connected, so the device blocks one of the ports. The blocked
port acts as the backup.
• Edge port—Directly connects to a user host rather than a network device or network segment.
• Master port—Acts as a port on the shortest path from the local MST region to the common root
bridge. The master port is not always located on the regional root. It is a root port on the IST or
CIST and still a master port on the other MSTIs.
• Boundary port—Connects an MST region to another MST region or to an STP/RSTP-running
device. In MSTP calculation, a boundary port's role on an MSTI is consistent with its role on the
CIST. However, that is not true with master ports. A master port on MSTIs is a root port on the
CIST.
Port states
In MSTP, a port can be in one of the following states:
• Forwarding—The port receives and sends BPDUs, learns MAC addresses, and forwards user
traffic.
• Learning—The port receives and sends BPDUs, learns MAC addresses, but does not forward
user traffic. Learning is an intermediate port state.
• Discarding—The port receives and sends BPDUs, but does not learn MAC addresses or
forward user traffic.
NOTE:
When in different MSTIs, a port can be in different states.
A port state is not exclusively associated with a port role. Table 11 lists the port states that each port
role supports. (A check mark [√] indicates that the port supports this state, while a dash [—] indicates
that the port does not support this state.)
Table 11 Port states that different port roles support
98
Like STP, MSTP uses configuration BPDUs to calculate spanning trees. An important difference is
that an MSTP BPDU carries the MSTP configuration of the bridge from which the BPDU is sent.
CIST calculation
During the CIST calculation, the following process takes place:
• The device with the highest priority is elected as the root bridge of the CIST.
• MSTP generates an IST within each MST region through calculation.
• MSTP regards each MST region as a single device and generates a CST among these MST
regions through calculation.
The CST and ISTs constitute the CIST of the entire network.
MSTI calculation
Within an MST region, MSTP generates different MSTIs for different VLANs based on the
VLAN-to-instance mappings. For each spanning tree, MSTP performs a separate calculation
process similar to spanning tree calculation in STP. For more information, see "Calculation process
of the STP algorithm."
In MSTP, a VLAN frame is forwarded along the following paths:
• Within an MST region, the frame is forwarded along the corresponding MSTI.
• Between two MST regions, the frame is forwarded along the CST.
99
Figure 33 Edge port rapid transition
P/A transition
The P/A transition enables a designated port to rapidly transit to the forwarding state after a
handshake with its peer. The P/A transition applies only to point-to-point links.
• P/A transition for RSTP and PVST.
In RSTP or PVST, the ports on a new link or recovered link are designated ports in blocking
state. When one of the designated ports transits to the discarding or learning state, it sets the
proposal flag in its BPDU. Its peer bridge receives the BPDU and determines whether the
receiving port is the root port. If it is the root port, the bridge blocks the other ports except edge
ports. The bridge then replies an agreement BPDU to the designated port. The designated port
immediately transits to the forwarding state upon receiving the agreement BPDU. If the
designated port does not receive the agreement BPDU, it waits for twice the forward delay to
transit to the forwarding state.
As shown in Figure 35, the P/A transition operates as follows:
100
a. Device A sends a proposal BPDU to Device B through Port A1.
b. Device B receives the proposal BPDU on Port B2. Port B2 is elected as the root port.
c. Device B blocks its designated port Port B1 and alternate port Port B3 to eliminate loops.
d. The root port Port B2 transits to the forwarding state and sends an agreement BPDU to
Device A.
e. The designated port Port A1 on Device A immediately transits to the forwarding state after
receiving the agreement BPDU.
Figure 35 P/A transition for RSTP and PVST
101
Protocols and standards
MSTP is documented in the following protocols and standards:
• IEEE 802.1d, Media Access Control (MAC) Bridges
• IEEE 802.1w, Part 3: Media Access Control (MAC) Bridges—Amendment 2: Rapid
Reconfiguration
• IEEE 802.1s, Virtual Bridged Local Area Networks—Amendment 3: Multiple Spanning Trees
• IEEE 802.1Q-REV/D1.3, Media Access Control (MAC) Bridges and Virtual Bridged Local Area
Networks —Clause 13: Spanning tree Protocols
102
STP configuration task list
Tasks at a glance
Configuring the root bridge:
• (Required.) Setting the spanning tree mode
• (Optional.) Configuring the root bridge or a secondary root bridge
• (Optional.) Configuring the device priority
• (Optional.) Configuring the network diameter of a switched network
• (Optional.) Setting spanning tree timers
• (Optional.) Setting the timeout factor
• (Optional.) Configuring the BPDU transmission rate
• (Optional.) Enabling outputting port state transition information
• (Required.) Enabling the spanning tree feature
Configuring the leaf nodes:
• (Required.) Setting the spanning tree mode
• (Optional.) Configuring the device priority
• (Optional.) Setting the timeout factor
• (Optional.) Configuring the BPDU transmission rate
• (Optional.) Configuring path costs of ports
• (Optional.) Configuring the port priority
• (Optional.) Enabling outputting port state transition information
• (Required.) Enabling the spanning tree feature
(Optional.) Configuring TC Snooping
(Optional.) Configuring protection features
(Optional.) Enabling BPDU transparent transmission on a port
(Optional.) Enabling SNMP notifications for new-root election and topology change events
103
Tasks at a glance
Configuring the leaf nodes:
• (Required.) Setting the spanning tree mode
• (Optional.) Configuring the device priority
• (Optional.) Setting the timeout factor
• (Optional.) Configuring the BPDU transmission rate
• (Optional.) Configuring edge ports
• (Optional.) Configuring path costs of ports
• (Optional.) Configuring the port priority
• (Optional.) Configuring the port link type
• (Optional.) Enabling outputting port state transition information
• (Required.) Enabling the spanning tree feature
(Optional.) Performing mCheck
(Optional.) Configuring TC Snooping
(Optional.) Configuring protection features
(Optional.) Enabling BPDU transparent transmission on a port
(Optional.) Enabling SNMP notifications for new-root election and topology change events
104
Tasks at a glance
(Optional.) Configuring protection features
(Optional.) Enabling the device to log events of detecting or receiving TC BPDUs
(Optional.) Enabling BPDU transparent transmission on a port
(Optional.) Enabling SNMP notifications for new-root election and topology change events
105
Setting the spanning tree mode
The spanning tree modes include:
• STP mode—All ports of the device send STP BPDUs. Select this mode when the peer device
of a port supports only STP.
• RSTP mode—All ports of the device send RSTP BPDUs. A port in this mode automatically
transits to the STP mode when it receives STP BPDUs from the peer device. A port in this mode
does not transit to the MSTP mode when it receives MSTP BPDUs from the peer device.
• PVST mode—All ports of the device send PVST BPDUs. Each VLAN maintains a spanning
tree. In a network, the amount of spanning trees maintained by all devices equals the number of
PVST-enabled VLANs multiplied by the number of PVST-enabled ports. If the amount of
spanning trees exceeds the capacity of the network, device CPUs will be overloaded. Packet
forwarding is interrupted, and the network becomes unstable. The number of PVST-enabled
VLANs supported by the device is 144.
• MSTP mode—All ports of the device send MSTP BPDUs. A port in this mode automatically
transits to the STP mode when receiving STP BPDUs from the peer device. A port in this mode
does not transit to the RSTP mode when receiving RSTP BPDUs from the peer device.
The MSTP mode is compatible with the RSTP mode, and the RSTP mode is compatible with the STP
mode.
Compatibility of the PVST mode depends on the link type of a port.
• On an access port, the PVST mode is compatible with other spanning tree modes in all VLANs.
• On a trunk port or hybrid port, the PVST mode is compatible with other spanning tree modes
only in the default VLAN.
To set the spanning tree mode:
106
To configure an MST region:
107
Step Command Remarks
• In STP/RSTP mode:
stp root primary
• In PVST mode:
2. Configure the device as By default, the device is not a
stp vlan vlan-id-list root primary
the root bridge. root bridge.
• In MSTP mode:
stp [ instance instance-list ] root
primary
108
Configuration BPDUs sent by the regional root bridge always have a hop count set to the maximum
value. When a device receives this configuration BPDU, it decrements the hop count by one, and
uses the new hop count in the BPDUs that it propagates. When the hop count of a BPDU reaches
zero, it is discarded by the device that received it. Devices beyond the reach of the maximum hops
can no longer participate in spanning tree calculations, so the size of the MST region is limited.
Make this configuration only on the root bridge. All other devices in the MST region use the maximum
hop value set for the root bridge.
You can configure the maximum hops of an MST region based on the STP network size. As a best
practice, set the maximum hops to a value that is greater than the maximum hops of each edge
device to the root bridge.
To configure the maximum number of hops of an MST region:
109
its state after a forward delay timer. This ensures that the state transition of the local port stays
synchronized with the peer.
• Hello time—Interval at which the device sends configuration BPDUs to detect link failures. If
the device does not receive configuration BPDUs within the timeout period, it recalculates the
spanning tree. The formula for calculating the timeout period is timeout period = timeout factor ×
3 × hello time.
• Max age—In the CIST of an MSTP network, the device uses the max age timer to determine
whether a configuration BPDU received by a port has expired. If it is expired, a new spanning
tree calculation process starts. The max age timer does not take effect on MSTIs.
To ensure a fast topology convergence, make sure the timer settings meet the following formulas:
• 2 × (forward delay – 1 second) ≥ max age
• Max age ≥ 2 × (hello time + 1 second)
As a best practice, specify the network diameter and letting spanning tree protocols automatically
calculate the timers based on the network diameter instead of manually setting the spanning tree
timers. If the network diameter uses the default value, the timers also use their default values.
Set the timers only on the root bridge. The timer settings on the root bridge apply to all devices on the
entire switched network.
Configuration procedure
To set the spanning tree timers:
110
Step Command Remarks
• In STP/RSTP/MSTP mode:
stp timer hello time
3. Set the hello timer. • In PVST mode: The default setting is 2 seconds.
stp vlan vlan-id-list timer hello
time
• In STP/RSTP/MSTP mode:
stp timer max-age time
4. Set the max age timer. • In PVST mode: The default setting is 20 seconds.
stp vlan vlan-id-list timer
max-age time
111
Step Command Remarks
2. Enter Layer 2 Ethernet
interface or Layer 2 interface interface-type
N/A
aggregate interface view. interface-number
Configuration procedure
To configure a port as an edge port:
112
Specifying a standard for the device to use when it calculates
the default path cost
CAUTION:
If you change the standard that the device uses to calculate the default path costs, you restore the
path costs to the default.
You can specify a standard for the device to use in automatic calculation for the default path cost.
The device supports the following standards:
• dot1d-1998—The device calculates the default path cost for ports based on IEEE 802.1d-1998.
• dot1t—The device calculates the default path cost for ports based on IEEE 802.1t.
• legacy—The device calculates the default path cost for ports based on a private standard.
When you specify a standard for the device to use when it calculates the default path cost, follow
these guidelines:
• When it calculates the path cost for an aggregate interface, IEEE 802.1t takes into account the
number of Selected ports in its aggregation group. However, IEEE 802.1d-1998 does not take
into account the number of Selected ports. The calculation formula of IEEE 802.1t is: Path cost
= 200,000,000/link speed (in 100 kbps). The link speed is the sum of the link speed values of
the Selected ports in the aggregation group.
• IEEE 802.1d-1998 or the private standard always assigns the smallest possible value to a
single port or aggregate interface with a speed exceeding 10 Gbps. The forwarding path
selected based on this criterion might not be the best one. To solve this problem, perform one of
the following tasks:
{ Use dot1t as the standard for default path cost calculation.
{ Manually set the path cost for the port (see "Configuring path costs of ports").
To specify a standard for the device to use when it calculates the default path cost:
Table 12 Mappings between the link speed and the path cost
Path cost
Link speed Port type IEEE Private
IEEE 802.1t
802.1d-1998 standard
0 N/A 65535 200000000 200000
Single port 2000000 2000
Aggregate interface
containing two Selected 1000000 1800
10 Mbps ports 100
Aggregate interface
containing three Selected 666666 1600
ports
113
Path cost
Link speed Port type IEEE Private
IEEE 802.1t
802.1d-1998 standard
Aggregate interface
containing four Selected 500000 1400
ports
Single port 200000 200
Aggregate interface
containing two Selected 100000 180
ports
114
Path cost
Link speed Port type IEEE Private
IEEE 802.1t
802.1d-1998 standard
Aggregate interface
containing three Selected 166 1
ports
Aggregate interface
containing four Selected 125 1
ports
Single port 200 1
Aggregate interface
containing two Selected 100 1
ports
• In STP/RSTP mode:
stp cost cost-value
• In PVST mode: By default, the system
3. Configure the path cost of
the ports.
stp vlan vlan-id-list cost cost-value automatically calculates
• In MSTP mode: the path cost of each port.
stp [ instance instance-list ] cost
cost-value
Configuration example
# In MSTP mode, perform the following tasks:
• Configure the device to calculate the default path costs of its ports by using IEEE 802.1d-1998.
• Set the path cost of Ten-GigabitEthernet 1/0/3 to 200 on MSTI 2.
<Sysname> system-view
[Sysname] stp pathcost-standard dot1d-1998
Cost of every port will be reset and automatically re-calculated after you change the
current pathcost standard. Continue?[Y/N]:y
Cost of every port has been re-calculated.
115
[Sysname] interface ten-gigabitethernet 1/0/3
[Sysname-Ten-GigabitEthernet1/0/3] stp instance 2 cost 200
116
• You can configure the link type as point-to-point for a Layer 2 aggregate interface or a port that
operates in full duplex mode. As a best practice, use the default setting and let the device
automatically detect the port link type.
• In PVST or MSTP mode, the stp point-to-point force-false or stp point-to-point force-true
command configured on a port takes effect on all VLANs or all MSTIs.
• Before you set the link type of a port to point-to-point, make sure the port is connected to a
point-to-point link. Otherwise, a temporary loop might occur.
Configuration procedure
To configure the link type of a port:
117
Enabling outputting port state transition
information
In a large-scale spanning tree network, you can enable devices to output the port state transition
information. Then, you can monitor the port states in real time.
To enable outputting port state transition information:
118
Enabling the spanning tree feature in PVST mode
Step Command Remarks
1. Enter system view. system-view N/A
When the device starts up with
initial settings, the spanning tree
feature is globally disabled.
When the device starts up with
2. Enable the spanning tree factory defaults, the spanning tree
feature. stp global enable
feature is globally enabled.
For more informaiton about the
initial settings and factory
defaults, see Fundamentals
Configuration Guide.
3. Enable the spanning tree By default, the spanning tree
feature in VLANs. stp vlan vlan-id-list enable
feature is enabled in VLANs.
4. Enter Layer 2 Ethernet
interface or Layer 2 interface interface-type
N/A
aggregate interface view. interface-number
Performing mCheck
The mCheck feature enables user intervention in the port status transition process.
When a port on an MSTP, RSTP, or PVST device connects to an STP device and receives STP
BPDUs, the port automatically transits to the STP mode. However, the port cannot automatically
transit back to the original mode when the following conditions exist:
• The peer STP device is shut down or removed.
• The port cannot detect the change.
To forcibly transit the port to operate in the original mode, you can perform an mCheck operation.
For example, Device A, Device B, and Device C are connected in sequence. Device A runs STP,
Device B does not run any spanning tree protocol, and Device C runs RSTP, PVST, or MSTP. In this
case, when Device C receives an STP BPDU transparently transmitted by Device B, the receiving
port transits to the STP mode. If you configure Device B to run RSTP, PVST, or MSTP with Device C,
you must perform mCheck operations on the ports interconnecting Device B and Device C.
119
Performing mCheck in interface view
Step Command
1. Enter system view. system-view
2. Enter Layer 2 Ethernet interface or Layer 2
aggregate interface view. interface interface-type interface-number
As defined in IEEE 802.1s, connected devices are in the same region only when they have the same
MST region-related configurations, including:
• Region name.
• Revision level.
• VLAN-to-instance mappings.
120
A spanning tree device identifies devices in the same MST region by determining the configuration
ID in BPDUs. The configuration ID includes the region name, revision level, and configuration digest.
It is 16-byte long and is the result calculated through the HMAC-MD5 algorithm based on
VLAN-to-instance mappings.
Because spanning tree implementations vary by vendor, the configuration digests calculated through
private keys are different. The devices of different vendors in the same MST region cannot
communicate with each other.
To enable communication between an HPE device and a third-party device in the same MST region,
enable Digest Snooping on the HPE device port connecting them.
Configuration procedure
Use this feature on when your HPE device is connected to a third-party device that uses its private
key to calculate the configuration digest.
To configure Digest Snooping:
121
Enable Digest Snooping on the ports of Device A and Device B that connect to Device C, so that the
three devices can communicate with one another.
Figure 37 Network diagram
Designated port
Blocked port
Normal link
XGE1/0/1 XGE1/0/1
Blocked link
XGE1/0/2 XGE1/0/2
Device A Device B
Configuration procedure
# Enable Digest Snooping on Ten-GigabitEthernet 1/0/1 of Device A and enable global Digest
Snooping on Device A.
<DeviceA> system-view
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] stp config-digest-snooping
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] stp global config-digest-snooping
# Enable Digest Snooping on Ten-GigabitEthernet 1/0/1 of Device B and enable global Digest
Snooping on Device B.
<DeviceB> system-view
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] stp config-digest-snooping
[DeviceB-Ten-GigabitEthernet1/0/1] quit
[DeviceB] stp global config-digest-snooping
122
Figure 38 Rapid state transition of an MSTP designated port
Upstream device Downstream device
(1) Proposal for rapid transition The root port blocks non-edge
ports.
If the upstream device is a third-party device, the rapid state transition implementation might be
limited as follows:
• The upstream device uses a rapid transition mechanism similar to that of RSTP.
• The downstream device runs MSTP and does not operate in RSTP mode.
In this case, the following occurs:
1. The root port on the downstream device receives no agreement from the upstream device.
2. It sends no agreement to the upstream device.
As a result, the designated port of the upstream device can transit to the forwarding state only after a
period twice the Forward Delay.
To enable the designated port of the upstream device to transit its state rapidly, enable No
Agreement Check on the downstream device's port.
Configuration prerequisites
Before you configure the No Agreement Check feature, complete the following tasks:
• Connect a device to a third-party upstream device that supports spanning tree protocols
through a point-to-point link.
• Configure the same region name, revision level, and VLAN-to-instance mappings on the two
devices.
123
Configuration procedure
Enable the No Agreement Check feature on the root port.
To configure No Agreement Check:
Configuration procedure
# Enable No Agreement Check on Ten-GigabitEthernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] stp no-agreement-check
Configuring TC Snooping
As shown in Figure 41, an IRF fabric connects to two user networks through double links.
• Device A and Device B form the IRF fabric.
• The spanning tree feature is disabled on Device A and Device B and enabled on all devices in
user network 1 and user network 2.
• The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.
When the network topology changes, it takes time for the IRF fabric to update its MAC address table
and ARP table. During this period, traffic in the network might be interrupted.
124
Figure 41 TC Snooping application scenario
To avoid traffic interruption, you can enable TC Snooping on the IRF fabric. After receiving a
TC-BPDU through a port, the IRF fabric updates MAC address table and ARP table entries
associated with the port's VLAN. In this way, TC Snooping prevents topology change from
interrupting traffic forwarding in the network. For more information about the MAC address table and
the ARP table, see "Configuring the MAC address table" and Layer 3—IP Services Configuration
Guide.
Configuration procedure
To enable TC Snooping:
125
Configuring protection features
A spanning tree device supports the following protection features:
• BPDU guard
• Root guard
• Loop guard
• Port role restriction
• TC-BPDU transmission restriction
• TC-BPDU guard
• BPDU drop
• PVST BPDU guard
• Dispute gurad
126
Step Command Remarks
1. Enter system view. system-view N/A
127
As a result, loops occur in the switched network. The loop guard feature can suppress the
occurrence of such loops.
The initial state of a loop guard-enabled port is discarding in every MSTI. When the port receives
BPDUs, it transits its state. Otherwise, it stays in the discarding state to prevent temporary loops.
Do not enable loop guard on a port that connects user terminals. Otherwise, the port stays in the
discarding state in all MSTIs because it cannot receive BPDUs.
On a port, the loop guard feature is mutually exclusive with the root guard feature or the edge port
setting.
Configure loop guard on the root port and alternate ports of a device.
To enable loop guard:
The bridge ID change of a device in the user access network might cause a change to the spanning
tree topology in the core network. To avoid this problem, you can enable port role restriction on a port.
With this feature enabled, when the port receives a superior BPDU, it becomes an alternate port
rather than a root port.
Make this configuration on the port that connects to the user access network.
To configure port role restriction:
The topology change to the user access network might cause the forwarding address changes to the
core network. When the user access network topology is unstable, the user access network might
128
affect the core network. To avoid this problem, you can enable TC-BPDU transmission restriction on
a port. With this feature enabled, when the port receives a TC-BPDU, it does not forward the
TC-BPDU to other ports.
Make this configuration on the port that connects to the user access network.
To configure TC-BPDU transmission restriction:
129
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet interface interface-type
interface view. N/A
interface-number
3. Enable BPDU drop on the By default, BPDU drop is
interface. bpdu-drop any
disabled.
130
Figure 42 Dispute guard triggering scenario
131
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet
interface or Layer 2 interface interface-type
N/A
aggregate interface view. interface-number
132
Task Command
Display history about ports blocked by spanning tree
display stp abnormal-port
protection features.
display stp bpdu-statistics [ interface
Display BPDU statistics on ports. interface-type interface-number [ instance
instance-list ] ]
Display information about ports shut down by spanning
display stp down-port
tree protection features.
Display the port role calculation history for the specified display stp [ instance instance-list | vlan
MSTI or all MSTIs. vlan-id-list ] history [ slot slot-number ]
Display the incoming and outgoing TC/TCN BPDU display stp [ instance instance-list | vlan
statistics by all ports in the specified MSTI or all MSTIs. vlan-id-list ] tc [ slot slot-number ]
display stp [ instance instance-list | vlan
Display the spanning tree status and statistics. vlan-id-list ] [ interface interface-list | slot
slot-number ] [ brief ]
Display the MST region configuration information that
display stp region-configuration
has taken effect.
Display the root bridge information of all MSTIs. display stp root
Clear the spanning tree statistics. reset stp [ interface interface-list ]
133
Figure 43 Network diagram
XG
/0/
E1
E1
/0/
XG
XG
1
/0/
E1
E1
/0/
XG
1
Configuration procedure
1. Configure VLANs and VLAN member ports. (Details not shown.)
{ Create VLAN 10, VLAN 20, and VLAN 30 on both Device A and Device B.
{ Create VLAN 10, VLAN 20, and VLAN 40 on Device C.
{ Create VLAN 20, VLAN 30, and VLAN 40 on Device D.
{ Configure the ports on these devices as trunk ports and assign them to related VLANs.
2. Configure Device A:
# Enter MST region view, and configure the MST region name as example.
<DeviceA> system-view
[DeviceA] stp region-configuration
[DeviceA-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceA-mst-region] instance 1 vlan 10
[DeviceA-mst-region] instance 3 vlan 30
[DeviceA-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceA-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceA-mst-region] active region-configuration
[DeviceA-mst-region] quit
# Configure the Device A as the root bridge of MSTI 1.
[DeviceA] stp instance 1 root primary
# Enable the spanning tree feature globally.
[DeviceA] stp global enable
3. Configure Device B:
# Enter MST region view, and configure the MST region name as example.
<DeviceB> system-view
[DeviceB] stp region-configuration
[DeviceB-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
134
[DeviceB-mst-region] instance 1 vlan 10
[DeviceB-mst-region] instance 3 vlan 30
[DeviceB-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceB-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceB-mst-region] active region-configuration
[DeviceB-mst-region] quit
# Configure Device B as the root bridge of MSTI 3.
[DeviceB] stp instance 3 root primary
# Enable the spanning tree feature globally.
[DeviceB] stp global enable
4. Configure Device C:
# Enter MST region view, and configure the MST region name as example.
<DeviceC> system-view
[DeviceC] stp region-configuration
[DeviceC-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceC-mst-region] instance 1 vlan 10
[DeviceC-mst-region] instance 3 vlan 30
[DeviceC-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceC-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceC-mst-region] active region-configuration
[DeviceC-mst-region] quit
# Configure the Device C as the root bridge of MSTI 4.
[DeviceC] stp instance 4 root primary
# Enable the spanning tree feature globally.
[DeviceC] stp global enable
5. Configure Device D:
# Enter MST region view, and configure the MST region name as example.
<DeviceD> system-view
[DeviceD] stp region-configuration
[DeviceD-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceD-mst-region] instance 1 vlan 10
[DeviceD-mst-region] instance 3 vlan 30
[DeviceD-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceD-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceD-mst-region] active region-configuration
[DeviceD-mst-region] quit
# Enable the spanning tree feature globally.
[DeviceD] stp global enable
135
Verifying the configuration
In this example, Device B has the lowest root bridge ID. As a result, Device B is elected as the root
bridge in MSTI 0.
When the network is stable, you can use the display stp brief command to display brief spanning
tree information on each device.
# Display brief spanning tree information on Device A.
[DeviceA] display stp brief
MST ID Port Role STP State Protection
0 Ten-GigabitEthernet1/0/1 ALTE DISCARDING NONE
0 Ten-GigabitEthernet1/0/2 DESI FORWARDING NONE
0 Ten-GigabitEthernet1/0/3 ROOT FORWARDING NONE
1 Ten-GigabitEthernet1/0/1 DESI FORWARDING NONE
1 Ten-GigabitEthernet1/0/3 DESI FORWARDING NONE
3 Ten-GigabitEthernet1/0/2 DESI FORWARDING NONE
3 Ten-GigabitEthernet1/0/3 ROOT FORWARDING NONE
Based on the output, you can draw each MSTI mapped to each VLAN, as shown in Figure 44.
136
Figure 44 MSTIs mapped to different VLANs
A B A B
C C D
A B
D C D
137
Figure 45 Network diagram
XG
/0/
E1
E1
/0/
XG
XG
1
/0/
E1
E1
/0/
XG
1
Configuration procedure
1. Configure VLANs and VLAN member ports. (Details not shown.)
{ Create VLAN 10, VLAN 20, and VLAN 30 on both Device A and Device B.
{ Create VLAN 10, VLAN 20, and VLAN 40 on Device C.
{ Create VLAN 20, VLAN 30, and VLAN 40 on Device D.
{ Configure the ports on these devices as trunk ports and assign them to related VLANs.
2. Configure Device A:
# Set the spanning tree mode to PVST.
<DeviceA> system-view
[DeviceA] stp mode pvst
# Configure the device as the root bridge of VLAN 10 and VLAN 20.
[DeviceA] stp vlan 10 20 root primary
# Enable the spanning tree feature globally and in VLAN 10, VLAN 20, and VLAN 30.
[DeviceA] stp global enable
[DeviceA] stp vlan 10 20 30 enable
3. Configure Device B:
# Set the spanning tree mode to PVST.
<DeviceB> system-view
[DeviceB] stp mode pvst
# Configure the device as the root bridge of VLAN 30.
[DeviceB] stp vlan 30 root primary
# Enable the spanning tree feature globally and in VLAN 10, VLAN 20, and VLAN 30.
[DeviceB] stp global enable
[DeviceB] stp vlan 10 20 30 enable
4. Configure Device C:
# Set the spanning tree mode to PVST.
<DeviceC> system-view
[DeviceC] stp mode pvst
# Configure the device as the root bridge of VLAN 40.
[DeviceC] stp vlan 40 root primary
# Enable the spanning tree feature globally and in VLAN 10, VLAN 20, and VLAN 40.
[DeviceC] stp global enable
138
[DeviceC] stp vlan 10 20 40 enable
5. Configure Device D:
# Set the spanning tree mode to PVST.
<DeviceD> system-view
[DeviceD] stp mode pvst
# Enable the spanning tree feature globally and in VLAN 20, VLAN 30, and VLAN 40.
[DeviceD] stp global enable
[DeviceD] stp vlan 20 30 40 enable
139
30 Ten-GigabitEthernet1/0/2 ALTE DISCARDING NONE
40 Ten-GigabitEthernet1/0/3 ROOT FORWARDING NONE
Based on the output, you can draw a topology for each VLAN spanning tree, as shown in Figure 46.
Figure 46 VLAN spanning tree topologies
140
Configuring loop detection
Overview
Incorrect network connections or configurations can create Layer 2 loops, which results in repeated
transmission of broadcasts, multicasts, or unknown unicasts. The repeated transmissions can waste
network resources and can paralyze networks. The loop detection mechanism immediately
generates a log when a loop occurs so that you are promptly notified to adjust network connections
and configurations. You can configure loop detection to shut down the looped port. Logs are
maintained in the information center. For more information, see Network Management and
Monitoring Configuration Guide.
The Ethernet frame header for loop detection contains the following fields:
• DMAC—Destination MAC address of the frame, which is the multicast MAC address
010f-e200-0007. When a loop detection-enabled device receives a frame with this destination
MAC address, it performs the following operations:
{ Sends the frame to the CPU.
{ Floods the frame in the VLAN from which the frame was originally received.
• SMAC—Source MAC address of the frame, which is the bridge MAC address of the sending
device.
• TPID—Type of the VLAN tag, with the value of 0x8100.
• TCI—Information of the VLAN tag, including the priority and VLAN ID.
• Type—Protocol type, with the value of 0x8918.
Figure 48 Inner frame header for loop detection
141
The inner frame header for loop detection contains the following fields:
• Code—Protocol sub-type, which is 0x0001, indicating the loop detection protocol.
• Version—Protocol version, which is always 0x0000.
• Length—Length of the frame. The value includes the inner header, but excludes the Ethernet
header.
• Reserved—This field is reserved.
Frames for loop detection are encapsulated as TLV triplets.
Table 13 TLVs supported by loop detection
142
2. The device automatically sets the port to the forwarding state after the detection timer set by
using the shutdown-interval command expires. For more information about the
shutdown-interval command, see Fundamentals Command Reference.
3. The device shuts down the port again if a loop is still detected on the port when the detection
timer expires.
This process is repeated until the loop is removed.
NOTE:
Incorrect recovery can occur when loop detection frames are discarded to reduce the load. To avoid
this, use the shutdown action, or manually remove the loop.
143
Setting the loop protection action
You can set the loop protection action globally or on a per-port basis. The global setting applies to all
ports. The per-port setting applies to the individual ports. The per-port setting takes precedence over
the global setting.
144
Step Command Remarks
1. Enter system view. system-view N/A
2. Set the loop detection loopback-detection
interval. The default setting is 30 seconds.
interval-time interval
Task Command
Display the loop detection configuration and status. display loopback-detection
Device A
XGE1/0/1 XGE1/0/2
Device B Device C
VLAN 100
Configuration procedure
1. Configure Device A:
# Create VLAN 100, and globally enable loop detection for the VLAN.
<DeviceA> system-view
[DeviceA] vlan 100
[DeviceA-vlan100] quit
[DeviceA] loopback-detection global enable vlan 100
145
# Configure Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 as trunk ports, and
assign them to VLAN 100.
[DeviceA] interface Ten-GigabitEthernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Set the global loop protection action to shutdown.
[DeviceA] loopback-detection global action shutdown
# Set the loop detection interval to 35 seconds.
[DeviceA] loopback-detection interval-time 35
2. Configure Device B:
# Create VLAN 100.
<DeviceB> system-view
[DeviceB] vlan 100
[DeviceB–vlan100] quit
# Configure Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 as trunk ports, and
assign them to VLAN 100.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[DeviceB-Ten-GigabitEthernet1/0/1] quit
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[DeviceB-Ten-GigabitEthernet1/0/2] quit
3. Configure Device C:
# Create VLAN 100.
<DeviceC> system-view
[DeviceC] vlan 100
[DeviceC–vlan100] quit
# Configure Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 as trunk ports, and
assign them to VLAN 100.
[DeviceC] interface ten-gigabitethernet 1/0/1
[DeviceC-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[DeviceC-Ten-GigabitEthernet1/0/1] quit
[DeviceC] interface ten-gigabitethernet 1/0/2
[DeviceC-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[DeviceC-Ten-GigabitEthernet1/0/2] quit
146
[DeviceA]
%Feb 24 15:04:29:663 2013 DeviceA LPDT/4/LPDT LOOPED: Loopback exists on
Ten-GigabitEthernet1/0/1.
%Feb 24 15:04:29:667 2013 DeviceA LPDT/4/LPDT LOOPED: Loopback exists on
Ten-GigabitEthernet1/0/2.
%Feb 24 15:04:44:243 2013 DeviceA LPDT/5/LPDT RECOVERED: Loopback on
Ten-GigabitEthernet1/0/1 recovered.
%Feb 24 15:04:44:248 2013 DeviceA LPDT/5/LPDT RECOVERED: Loopback on
Ten-GigabitEthernet1/0/2 recovered.
The output shows that the device has removed the loops from Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 according to the shutdown action.
# Display the status of Ten-GigabitEthernet 1/0/1 on devices, for example, Device A.
[DeviceA] display interface ten-gigabitethernet 1/0/1
Ten-GigabitEthernet1/0/1 current state: DOWN (Loop detection down)
...
The output shows that Ten-GigabitEthernet 1/0/1 is already shut down by the loop detection module.
# Display the status of Ten-GigabitEthernet 1/0/2 on devices, for example, Device A.
[DeviceA] display interface ten-gigabitethernet 1/0/2
Ten-GigabitEthernet1/0/2 current state: DOWN (Loop detection down)
...
The output shows that Ten-GigabitEthernet 1/0/2 is already shut down by the loop detection module.
147
Configuring VLANs
Overview
Ethernet is a family of shared-media LAN technologies based on the CSMA/CD mechanism. An
Ethernet LAN is both a collision domain and a broadcast domain. Because the medium is shared,
collisions and broadcasts are common in an Ethernet LAN. Typically, bridges and Layer 2 switches
can reduce collisions in an Ethernet LAN. To confine broadcasts, a Layer 2 switch must use the
Virtual Local Area Network (VLAN) technology.
VLANs enable a Layer 2 switch to break a LAN down into smaller broadcast domains, as shown
in Figure 50.
Figure 50 A VLAN diagram
VLAN 2
Switch A Switch B
Router
VLAN 5
A VLAN is logically divided on an organizational basis rather than on a physical basis. For example,
you can assign all workstations and servers used by a particular workgroup to the same VLAN,
regardless of their physical locations. Hosts in the same VLAN can directly communicate with one
another. You need a router or a Layer 3 switch for hosts in different VLANs to communicate with one
another.
All these VLAN features reduce bandwidth waste, improve LAN security, and enable flexible virtual
group creation.
148
TPID to a different value. For compatibility with a neighbor device, set the TPID value on the
device to be the same as the neighbor device.
• Priority—3-bit long, identifies the 802.1p priority of the frame. For more information, see ACL
and QoS Configuration Guide.
• CFI—1-bit long canonical format indicator that indicates whether the MAC addresses are
encapsulated in the standard format when packets are transmitted across different media.
Available values include:
{ 0 (default)—The MAC addresses are encapsulated in the standard format.
{ 1—The MAC addresses are encapsulated in a non-standard format.
This field is always set to 0 for Ethernet.
• VLAN ID—12-bit long, identifies the VLAN to which the frame belongs. The VLAN ID range is 0
to 4095. VLAN IDs 0 and 4095 are reserved, and VLAN IDs 1 to 4094 are user configurable.
The way a network device handles an incoming frame depends on whether the frame has a VLAN
tag and the value of the VLAN tag (if any). For more information, see "Introduction."
Ethernet supports encapsulation formats Ethernet II, 802.3/802.2 LLC, 802.3/802.2 SNAP, and
802.3 raw. The Ethernet II encapsulation format is used here. For information about the VLAN tag
fields in other frame encapsulation formats, see related protocols and standards.
For a frame that has multiple VLAN tags, the device handles it according to its outermost VLAN tag
and transmits its inner VLAN tags as the payload.
Configuring a VLAN
Step Command Remarks
1. Enter system view. system-view N/A
2. (Optional.) Create a
VLAN and enter its vlan { vlan-id1 [ to vlan-id2 ] | By default, only the system default VLAN
view, or create a list of all } (VLAN 1) exists.
VLANs.
149
Step Command Remarks
By default, packet dropping is disabled in
a VLAN.
This feature enables the device to drop
6. (Optional.) Enable Layer 3 packets in a VLAN and packets
packet dropping in the block outbound originating from the device. To drop all
VLAN. packets that are received and transmitted
in the VLAN, you must configure a QoS
policy. For more information about
configuring QoS policies, see ACL and
QoS Configuration Guide.
NOTE:
• As the system default VLAN, VLAN 1 cannot be created or deleted.
• Before you delete a dynamic VLAN or a VLAN locked by an application, you must first remove
the configuration from the VLAN.
150
Step Command Remarks
6. Set the MTU for the VLAN
interface. mtu size The default setting is 1500 bytes.
7. Set the MAC address for By default, no MAC address is set for a
the VLAN interface. mac-address mac-address
VLAN interface.
8. Set the expected By default, the expected bandwidth (in
bandwidth for the bandwidth bandwidth-value kbps) is the interface baud rate divided
interface. by 1000.
9. (Optional.) Restore the
default settings for the default N/A
VLAN interface.
10. (Optional.) Bring up the
VLAN interface. undo shutdown N/A
151
You can use a nonexistent VLAN as the PVID for a hybrid or trunk port, but not for an access
port.
• As a best practice, set the same PVID for a local port and its peer.
• To prevent a port from dropping untagged packets or PVID-tagged packets, assign the port to
its PVID.
How ports of different link types handle frames
In a VLAN-aware network, the default processing order for untagged packets is as follows, in
descending order of priority:
• MAC-based VLANs.
• IP subnet-based VLANs.
• Protocol-based VLANs.
• Port-based VLANs.
152
Assign an access port to a VLAN in interface view
153
To assign a hybrid port to one or multiple VLANs:
154
MAC address of a MAC-to-VLAN entry, the port tags the frame with the VLAN ID specific to
this entry.
c. If no matching VLAN ID is found, the port determines the VLAN for the packet by using the
following VLAN match order:
− IP subnet-based VLAN.
− Protocol-based VLAN.
− Port-based VLAN.
When a match is found, the port tags the packet with the matching VLAN ID.
• For a tagged frame, the port determines whether the VLAN ID of the frame is permitted on the
port.
{ If the VLAN ID of the frame is permitted on the port, the port forwards the frame.
{ If the VLAN ID of the frame is not permitted on the port, the port drops the frame.
Dynamic MAC-based VLAN assignment
When you cannot determine the target MAC-based VLANs of a port, use dynamic MAC-based VLAN
assignment on the port. To use dynamic MAC-based VLAN assignment, perform the following tasks:
1. Create MAC-to-VLAN entries.
2. Enable the MAC-based VLAN feature on the port.
3. Enable dynamic MAC-based VLAN assignment on the port.
Dynamic MAC-based VLAN assignment uses the following workflow, as shown in Figure 52:
1. When a port receives a frame, it first determines whether the frame is tagged.
{ If the frame is tagged, the port gets the source MAC address of the frame.
{ If the frame is untagged, the port selects a VLAN for the frame by using the following
matching order:
− MAC-based VLAN (fuzzy and exact MAC address match).
− IP subnet-based VLAN.
− Protocol-based VLAN.
− Port-based VLAN.
After tagging the frame with the selected VLAN, the port gets the source MAC address of the
frame.
2. The port uses the source address and VLAN of the frame to match the MAC-to VLAN entries.
{ If the source MAC address of the frame exactly matches the MAC address in a
MAC-to-VLAN entry, the port checks whether the VLAN ID of the frame matches the VLAN
in the entry.
− If the two VLAN IDs match, the port joins the VLAN and forwards the frame.
− If the two VLAN IDs do not match, the port drops the frame.
{ If the source MAC address of the frame does not exactly match any MAC addresses in
MAC-to-VLAN entries, the port checks whether the VLAN ID of the frame is its PVID.
− If the VLAN ID of the frame is the PVID of the port, the port determines whether it allows
the PVID.
If the PVID is allowed, the port forwards the frame within the PVID. If the PVID is not
allowed, the port drops the frame.
− If the VLAN ID of the frame is not the PVID of the port, the port determines whether the
VLAN ID is the primary VLAN ID and the port PVID is a secondary VLAN ID.
If yes, the port forwards the frame. Otherwise, the port drops the frame.
155
Figure 52 Flowchart for processing a frame in dynamic MAC-based VLAN assignment
The port receives a
frame
No
Tagged frame ?
Yes
No VLAN IDs No
PVID allowed? Drops the frame
match?
Yes Yes
When you configure dynamic MAC-based VLAN assignment, follow these guidelines:
• When a port joins a VLAN specified in the MAC-to-VLAN entry, one of the following events
occurs depending on the port configuration:
{ If the port has not been configured to allow packets from the VLAN to pass through, the port
joins the VLAN as an untagged member.
{ If the port has been configured to allow packets from the VLAN to pass through, the port
configuration remains the same.
• If you configure both static and dynamic MAC-based VLAN assignments on a port, dynamic
MAC-based VLAN assignment takes effect.
• The 802.1p priority of the VLAN in a MAC-to-VLAN entry determines the transmission priority of
the matching packets.
Server-assigned MAC-based VLAN
Use this feature with access authentication, such as MAC-based 802.1X authentication, to
implement secure and flexible terminal access.
To implement server-assigned MAC-based VLAN, perform the following tasks:
1. Configure the server-assigned MAC-based VLAN feature on the access device.
2. Configure username-to-VLAN entries on the access authentication server.
When a user passes authentication of the access authentication server, the server assigns the
authorization VLAN information for the user to the device. The device then performs the following
operations:
1. Generates a MAC-to-VLAN entry by using the source MAC address of the user packet and the
authorization VLAN information. The authorization VLAN is a MAC-based VLAN.
The generated MAC-to-VLAN entry cannot conflict with the existing static MAC-to-VLAN entries.
If a confliction exists, the dynamic MAC-to-VLAN entry cannot be generated.
156
2. Assigns the port that connects the user to the MAC-based VLAN.
When the user goes offline, the device automatically deletes the MAC-to-VLAN entry and removes
the port from the MAC-based VLAN. For more information about 802.1X and MAC authentication,
see Security Configuration Guide.
4. Set the port link type to By default, all ports are access
hybrid. port link-type hybrid
ports.
By default, a hybrid port is an
Assign the hybrid port to untagged member of the
5. port hybrid vlan vlan-id-list { tagged |
the MAC-based VLANs. VLAN to which the port
untagged }
belongs when its link type is
access.
6. Enable the MAC-based By default, this feature is
VLAN feature. mac-vlan enable
disabled.
157
If the two features are configured together on a port and the port learns the configured
maximum number of MAC address entries, the port processes packets as follows:
{ Forwards only packets matching the MAC address entries learnt by the port.
{ Drops unmatching packets.
• For successful dynamic MAC-based VLAN assignment, use static VLANs when you create
MAC-to-VLAN entries.
• As a best practice, do not use dynamic MAC-based VLAN assignment with MSTP. In MSTP
mode, if a port is blocked in the MSTI of its target VLAN, the port drops the received packets
instead of delivering them to the CPU. As a result, the port will not be dynamically assigned to
the target VLAN.
• As a best practice, do not use dynamic MAC-based VLAN assignment with PVST. In PVST
mode, if the target VLAN of a port is not permitted on the port, the port is placed in blocked state.
The port drops the received packets instead of delivering them to the CPU. As a result, the port
will not be dynamically assigned to the target VLAN.
• As a best practice, do not configure both dynamic MAC-based VLAN assignment and automatic
voice VLAN assignment mode on a port. They can have a negative impact on each other.
Configuration procedure
To configure dynamic MAC-based VLAN assignment:
4. Set the port link type to By default, all ports are access
hybrid. port link-type hybrid
ports.
5. Enable the
MAC-based VLAN By default, MAC-based VLAN
mac-vlan enable
feature. is disabled.
By default, dynamic
MAC-based VLAN assignment
is disabled.
6. Enable dynamic The VLAN assignment for a
MAC-based VLAN mac-vlan trigger enable port is triggered only when the
assignment. source MAC address of its
receiving packet exactly
matches the MAC address in a
MAC-to-VLAN entry.
158
Configuring server-assigned MAC-based VLAN
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet
interface view. interface interface-type interface-number N/A
159
Task Command Remarks
• Enter Layer 2 Ethernet interface
view:
interface interface-type
interface-number
5. Enter interface view. N/A
• Enter Layer 2 aggregate interface
view:
interface bridge-aggregation
interface-number
6. Set the port link type
to hybrid. port link-type hybrid By default, all ports are access ports.
160
Step Command Remarks
protocol-vlan [ protocol-index ] { at | ipv4
3. Associate the VLAN | ipv6 | ipx { ethernetii | llc | raw | snap } | By default, a VLAN is not
with a protocol mode { ethernetii etype etype-id | llc associated with a protocol
template. { dsap dsap-id [ ssap ssap-id ] | ssap template.
ssap-id } | snap etype etype-id } }
4. Exit VLAN view. quit N/A
• Enter Layer 2 Ethernet interface
view:
interface interface-type
interface-number
5. Enter interface view. N/A
• Enter Layer 2 aggregate interface
view:
interface bridge-aggregation
interface-number
6. Set the port link type to By default, all ports are access
hybrid. port link-type hybrid
ports.
161
Task Command
display interface vlan-interface [ interface-number ] [ brief
Display VLAN interface information.
[ description | down ] ]
Display information about IP
display ip-subnet-vlan interface { interface-type
subnet-based VLANs that are associated
interface-number1 [ to interface-type interface-number2 ] | all }
with the specified ports.
Display information about IP
display ip-subnet-vlan vlan { vlan-id1 [ to vlan-id2 ] | all }
subnet-based VLANs.
Display information about protocol-based
display protocol-vlan interface { interface-type
VLANs that are associated with the
interface-number1 [ to interface-type interface-number2 ] | all }
specified ports.
Display information about protocol-based
display protocol-vlan vlan { vlan-id1 [ to vlan-id2 ] | all }
VLANs.
display vlan [ vlan-id1 [ to vlan-id2 ] | all | dynamic | reserved
Display VLAN information.
| static ]
Display brief VLAN information. display vlan brief
Display VLAN group information. display vlan-group [ group-name ]
Display hybrid ports or trunk ports on the
display port { hybrid | trunk }
device.
Clear statistics on a port. reset counters interface vlan-interface [ interface-number ]
Configuration procedure
1. Configure Device A:
# Create VLAN 100, and assign Ten-GigabitEthernet 1/0/1 to VLAN 100.
<DeviceA> system-view
162
[DeviceA] vlan 100
[DeviceA-vlan100] port ten-gigabitethernet 1/0/1
[DeviceA-vlan100] quit
# Create VLAN 200, and assign Ten-GigabitEthernet 1/0/2 to VLAN 200.
[DeviceA] vlan 200
[DeviceA-vlan200] port ten-gigabitethernet 1/0/2
[DeviceA-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign the port to VLANs 100 and
200.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/3] port trunk permit vlan 100 200
Please wait... Done.
2. Configure Device B in the same way Device A is configured. (Details not shown.)
3. Configure hosts:
a. Configure Host A and Host C to be on the same IP subnet. For example, 192.168.100.0/24.
b. Configure Host B and Host D to be on the same IP subnet. For example, 192.168.200.0/24.
Verifying the configuration
# Verify that Host A and Host C can ping each other, but they both fail to ping Host B and Host D.
(Details not shown.)
# Verify that Host B and Host D can ping each other, but they both fail to ping Host A and Host C.
(Details not shown.)
# Verify that VLANs 100 and 200 are correctly configured on Device A.
[DeviceA-Ten-GigabitEthernet1/0/3] display vlan 100
VLAN ID: 100
VLAN type: Static
Route interface: Not configured
Description: VLAN 0100
Name: VLAN 0100
Tagged ports:
Ten-GigabitEthernet1/0/3
Untagged ports:
Ten-GigabitEthernet1/0/1
[DeviceA-Ten-GigabitEthernet1/0/3] display vlan 200
VLAN ID: 200
VLAN type: Static
Route interface: Not configured
Description: VLAN 0200
Name: VLAN 0200
Tagged ports:
Ten-GigabitEthernet1/0/3
Untagged ports:
Ten-GigabitEthernet1/0/2
163
MAC-based VLAN configuration example
Network requirements
As shown in Figure 54:
• Ten-GigabitEthernet 1/0/1 of Device A and Device C are each connected to a meeting room.
Laptop 1 and Laptop 2 are used for meetings and might be used in either of the two meeting
rooms.
• One department uses VLAN 100 and owns Laptop 1. The other department uses VLAN 200
and owns Laptop 2.
Configure MAC-based VLANs, so that Laptop 1 and Laptop 2 can access Server 1 and Server 2,
respectively, no matter which meeting room they are used in.
Figure 54 Network diagram
Configuration procedure
1. Configure Device A:
# Create VLANs 100 and 200.
<DeviceA> system-view
[DeviceA] vlan 100
[DeviceA-vlan100] quit
[DeviceA] vlan 200
[DeviceA-vlan200] quit
# Associate the MAC addresses of Laptop 1 and Laptop 2 with VLANs 100 and 200,
respectively.
[DeviceA] mac-vlan mac-address 000d-88f8-4e71 vlan 100
[DeviceA] mac-vlan mac-address 0014-222c-aa69 vlan 200
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type hybrid
164
[DeviceA-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged
# Enable the MAC-based VLAN feature on Ten-GigabitEthernet 1/0/1.
[DeviceA-Ten-GigabitEthernet1/0/1] mac-vlan enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Configure the uplink port (Ten-GigabitEthernet 1/0/2) as a trunk port, and assign it to VLANs
100 and 200.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
[DeviceA-Ten-GigabitEthernet1/0/2] quit
2. Configure Device B:
# Create VLAN 100, and assign Ten-GigabitEthernet 1/0/3 to VLAN 100.
<DeviceB> system-view
[DeviceB] vlan 100
[DeviceB-vlan100] port ten-gigabitethernet 1/0/3
[DeviceB-vlan100] quit
# Create VLAN 200 and assign Ten-GigabitEthernet 1/0/4 to VLAN 200.
[DeviceB] vlan 200
[DeviceB-vlan200] port ten-gigabitethernet 1/0/4
[DeviceB-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the port to VLANs 100 and
200.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 200
[DeviceB-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign the port to VLANs 100 and
200.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
[DeviceB-Ten-GigabitEthernet1/0/2] quit
3. Configure Device C in the same way as the Device A is configured. (Details not shown.)
Verifying the configuration
# Verify that Laptop 1 can access only Server 1, and Laptop 2 can access only Server 2. (Details not
shown.)
# Verify the MAC-to-VLAN entries on Device A and Device C, for example, on Device A.
[DeviceA] display mac-vlan all
The following MAC VLAN addresses exist:
S:Static D:Dynamic
MAC address Mask VLAN ID Priority State
000d-88f8-4e71 ffff-ffff-ffff 100 0 S
0014-222c-aa69 ffff-ffff-ffff 200 0 S
165
IP subnet-based VLAN configuration example
Network requirements
As shown in Figure 55, the hosts in the office belong to different IP subnets.
Configure Device C to transmit packets from 192.168.5.0/24 and 192.168.50.0/24 in VLANs 100 and
200, respectively.
Figure 55 Network diagram
Device A Device B
XGE1/0/2 XGE1/0/3
Device C
XGE1/0/1
192.168.5.0/24 192.168.50.0/24
Office
Configuration procedure
1. Configure Device C:
# Associate IP subnet 192.168.5.0/24 with VLAN 100.
<DeviceC> system-view
[DeviceC] vlan 100
[DeviceC-vlan100] ip-subnet-vlan ip 192.168.5.0 255.255.255.0
[DeviceC-vlan100] quit
# Associate IP subnet 192.168.50.0/24 with VLAN 200.
[DeviceC] vlan 200
[DeviceC-vlan200] ip-subnet-vlan ip 192.168.50.0 255.255.255.0
[DeviceC-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port, and assign it to VLAN 100 as a tagged
VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/2
[DeviceC-Ten-GigabitEthernet1/0/2] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/2] port hybrid vlan 100 tagged
[DeviceC-Ten-GigabitEthernet1/0/2] quit
166
# Configure Ten-GigabitEthernet 1/0/3 as a hybrid port, and assign it to VLAN 200 as a tagged
VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/3
[DeviceC-Ten-GigabitEthernet1/0/3] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/3] port hybrid vlan 200 tagged
[DeviceC-Ten-GigabitEthernet1/0/3] quit
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/1
[DeviceC-Ten-GigabitEthernet1/0/1] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged
# Associate Ten-GigabitEthernet 1/0/1 with the IP subnet-based VLANs 100 and 200.
[DeviceC-Ten-GigabitEthernet1/0/1] port hybrid ip-subnet-vlan vlan 100
[DeviceC-Ten-GigabitEthernet1/0/1] port hybrid ip-subnet-vlan vlan 200
[DeviceC-Ten-GigabitEthernet1/0/1] quit
2. Configure Device A and Device B to forward packets from VLANs 100 and 200, respectively.
(Details not shown.)
Verifying the configuration
# Verify the IP subnet-based VLAN configuration on Device C.
[DeviceC] display ip-subnet-vlan vlan all
VLAN ID: 100
Subnet index IP address Subnet mask
0 192.168.5.0 255.255.255.0
167
Figure 56 Network diagram
VLAN 100 VLAN 200
XGE1/0/3
XGE1/0/4
XGE1/0/1 XGE1/0/2
Device
L2 switch A L2 switch B
Configuration procedure
In this example, L2 Switch A and L2 Switch B use the factory configuration.
1. Configure Device:
# Create VLAN 100, and configure the description for VLAN 100 as protocol VLAN for IPv4.
<Device> system-view
[Device] vlan 100
[Device-vlan100] description protocol VLAN for IPv4
# Assign Ten-GigabitEthernet 1/0/3 to VLAN 100.
[Device-vlan100] port ten-gigabitethernet 1/0/3
[Device-vlan100] quit
# Create VLAN 200, and configure the description for VLAN 200 as protocol VLAN for IPv6.
[Device] vlan 200
[Device-vlan200] description protocol VLAN for IPv6
# Assign Ten-GigabitEthernet 1/0/4 to VLAN 200.
[Device-vlan200] port ten-gigabitethernet 1/0/4
# Configure VLAN 200 as a protocol-based VLAN, and create an IPv6 protocol template with
the index 1 for VLAN 200.
[Device-vlan200] protocol-vlan 1 ipv6
[Device-vlan200] quit
# Configure VLAN 100 as a protocol-based VLAN. Create an IPv4 protocol template with the
index 1, and create an ARP protocol template with the index 2. (In Ethernet II encapsulation, the
protocol type ID for ARP is 0806 in hexadecimal notation.)
[Device] vlan 100
[Device-vlan100] protocol-vlan 1 ipv4
[Device-vlan100] protocol-vlan 2 mode ethernetii etype 0806
[Device-vlan100] quit
168
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[Device] interface ten-gigabitethernet 1/0/1
[Device-Ten-GigabitEthernet1/0/1] port link-type hybrid
[Device-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged
# Associate Ten-GigabitEthernet 1/0/1 with the IPv4 and ARP protocol templates of VLAN 100
and the IPv6 protocol template of VLAN 200.
[Device-Ten-GigabitEthernet1/0/1] port hybrid protocol-vlan vlan 100 1 to 2
[Device-Ten-GigabitEthernet1/0/1] port hybrid protocol-vlan vlan 200 1
[Device-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[Device] interface ten-gigabitethernet 1/0/2
[Device-Ten-GigabitEthernet1/0/2] port link-type hybrid
[Device-Ten-GigabitEthernet1/0/2] port hybrid vlan 100 200 untagged
# Associate Ten-GigabitEthernet 1/0/2 with the IPv4 and ARP protocol templates of VLAN 100
and the IPv6 protocol template of VLAN 200.
[Device-Ten-GigabitEthernet1/0/2] port hybrid protocol-vlan vlan 100 1 to 2
[Device-Ten-GigabitEthernet1/0/2] port hybrid protocol-vlan vlan 200 1
[Device-Ten-GigabitEthernet1/0/2] quit
2. Configure hosts and servers:
a. Configure IPv4 Host A, IPv4 Host B, and IPv4 server to be on the same network segment
(192.168.100.0/24, for example). (Details not shown.)
b. Configure IPv6 Host A, IPv6 Host B, and IPv6 server to be on the same network segment
(2001::1/64, for example). (Details not shown.)
Verifying the configuration
1. Verify the following:
{ The hosts and the server in VLAN 100 can successfully ping one another. (Details not
shown.)
{ The hosts and the server in VLAN 200 can successfully ping one another. (Details not
shown.)
{ The hosts or the server in VLAN 100 cannot ping the hosts or server in VLAN 200. (Details
not shown.)
2. Verify the protocol-based VLAN configuration:
# Display protocol-based VLANs on Device.
[Device] display protocol-vlan vlan all
VLAN ID: 100
Protocol index Protocol type
1 IPv4
2 Ethernet II Etype 0x0806
169
100 1 IPv4 Active
100 2 Ethernet II Etype 0x0806 Active
200 1 IPv6 Active
170
Configuring super VLANs
Hosts in a VLAN typically use IP addresses in the same subnet. For Layer 3 interoperability with
other VLANs, you can create a VLAN interface for the VLAN and assign an IP address to it. This
requires a large number of IP addresses.
The super VLAN feature was introduced to save IP addresses. A super VLAN is associated with
multiple sub-VLANs. These sub-VLANs use the VLAN interface of the super VLAN (also known as a
super VLAN interface) as the gateway for Layer 3 communication.
You can create a VLAN interface for a super VLAN and assign an IP address to it. However, you
cannot create a VLAN interface for a sub-VLAN. You can assign a physical port to a sub-VLAN, but
you cannot assign a physical port to a super VLAN. Sub-VLANs are isolated at Layer 2.
To enable Layer 3 communication between sub-VLANs, perform the following tasks:
1. Create a super VLAN and the VLAN interface for the super VLAN.
2. Enable local proxy ARP or ND on the super VLAN interface as follows:
{ In an IPv4 network, enable local proxy ARP on the super VLAN interface. The super VLAN
can then process ARP requests and replies sent from the sub-VLANs.
{ In an IPv6 network, enable local proxy ND on the super VLAN interface. The super VLAN
can then process the NS and NA messages sent from the sub-VLANs.
Creating a sub-VLAN
Step Command Remarks
1. Enter system view. system-view N/A
171
To configure a super VLAN:
172
Task Command
Display information about super VLANs and their
display supervlan [ supervlan-id ]
associated sub-VLANs.
Configuration procedure
# Create VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] quit
# Create VLAN 2, and assign Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to the VLAN.
[DeviceA] vlan 2
[DeviceA-vlan2] port ten-gigabitethernet 1/0/1 ten-gigabitethernet 1/0/2
173
[DeviceA-vlan2] quit
# Create VLAN 3, and assign Ten-GigabitEthernet 1/0/3 and Ten-GigabitEthernet 1/0/4 to the VLAN.
[DeviceA] vlan 3
[DeviceA-vlan3] port ten-gigabitethernet 1/0/3 ten-gigabitethernet 1/0/4
[DeviceA-vlan3] quit
# Create VLAN 5, and assign Ten-GigabitEthernet 1/0/5 and Ten-GigabitEthernet 1/0/6 to the VLAN.
[DeviceA] vlan 5
[DeviceA-vlan5] port ten-gigabitethernet 1/0/5 ten-gigabitethernet 1/0/6
[DeviceA-vlan5] quit
# Configure VLAN 10 as a super VLAN, and associate sub-VLANs 2, 3, and 5 with the super VLAN.
[DeviceA] vlan 10
[DeviceA-vlan10] supervlan
[DeviceA-vlan10] subvlan 2 3 5
[DeviceA-vlan10] quit
[DeviceA] quit
VLAN ID: 10
VLAN type: Static
It is a super VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0010
Name: VLAN 0010
Tagged ports: None
Untagged ports: None
VLAN ID: 2
VLAN type: Static
It is a sub VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0002
Name: VLAN 0002
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1
Ten-GigabitEthernet1/0/2
VLAN ID: 3
174
VLAN type: Static
It is a sub VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0003
Name: VLAN 0003
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/3
Ten-GigabitEthernet1/0/4
VLAN ID: 5
VLAN type: Static
It is a sub VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0005
Name: VLAN 0005
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/5
Ten-GigabitEthernet1/0/6
175
Configuring the private VLAN
VLAN technology provides a method for isolating traffic from customers. At the access layer of a
network, customer traffic must be isolated for security or accounting purposes. If VLANs are
assigned on a per-user basis, a large number of VLANs will be required.
The private VLAN feature saves VLAN resources. It uses a two-tier VLAN structure as follows:
• Primary VLAN—Used for connecting the upstream device. A primary VLAN can be associated
with multiple secondary VLANs. The upstream device identifies only the primary VLAN.
• Secondary VLANs—Used for connecting users. Secondary VLANs are isolated at Layer 2. To
implement Layer 3 communication between secondary VLANs associated with the primary
VLAN, enable local proxy ARP or ND on the upstream device (for example, L3 Device A
in Figure 58).
As shown in Figure 58, the private VLAN feature is enabled on L2 Device B. VLAN 10 is the primary
VLAN. VLANs 2, 5, and 8 are secondary VLANs that are associated with VLAN 10. L3 Device A is
only aware of VLAN 10.
Figure 58 Private VLAN example
If the private VLAN feature is configured on a Layer 3 device, use one of the following methods on
the Layer 3 device to enable Layer 3 communication. Layer 3 communication might be required
between secondary VLANs that are associated with the same primary VLAN, or between secondary
VLANs and other networks.
• Method 1:
a. Create VLAN interfaces for the secondary VLANs.
b. Assign IP addresses to the secondary VLAN interfaces.
• Method 2:
a. Enable Layer 3 communication between the secondary VLANs that are associated with the
primary VLAN.
b. Create the VLAN interface for the primary VLAN and assign an IP address to it. (Do not
create secondary VLAN interfaces if you use this method.)
c. Enable local proxy ARP or ND on the primary VLAN interface.
176
3. Associate the secondary VLANs with the primary VLAN.
4. Configure the uplink and downlink ports:
{ Configure the uplink port (for example, the port connecting L2 Device B to L3 Device A
in Figure 58):
− When the port allows only one primary VLAN, configure the port as a promiscuous port
of the primary VLAN. The promiscuous port can be automatically assigned to the
primary VLAN and its associated secondary VLANs.
− When the port allows multiple primary VLANs, configure the port as a trunk promiscuous
port of the primary VLANs. The trunk promiscuous port can be automatically assigned to
the primary VLANs and their associated secondary VLANs.
{ Configure a downlink port (for example, the port connecting L2 Device B to a host in Figure
58) as a host port. The host port can be automatically assigned to the secondary VLAN and
its associated primary VLAN.
{ If a downlink port allows multiple secondary VLANs, configure the port as a trunk secondary
port. The trunk secondary port can be automatically assigned to the secondary VLANs and
their associated primary VLANs.
For more information about promiscuous, trunk promiscuous, host, and trunk secondary ports,
see Layer 2—LAN Switching Command Reference.
5. Configure Layer 3 communication between the specified secondary VLANs that are associated
with the primary VLAN.
Configuration procedure
To configure the private VLAN feature:
177
Step Command Remarks
5. Create one or multiple
secondary VLANs. vlan { vlan-id1 [ to vlan-id2 ] | all } N/A
178
Step Command Remarks
19. Return to system view. quit N/A
a Enter VLAN interface view of
the primary VLAN interface: Use substeps a, b, c, and e for
interface vlan-interface devices that run IPv4 protocols.
interface-number Use substeps a, b, d, and f for
b Enable Layer 3 communication devices that run IPv6 protocols.
between secondary VLANs that By default:
are associated with the primary
• Secondary VLANs cannot
VLAN:
communicate with each
private-vlan secondary
other at Layer 3.
vlan-id-list
20. (Optional.) Configure • No IP address is configured
c Assign an IPv4 address to the
Layer 3 communication for a VLAN interface.
primary VLAN interface:
between the specified ip address ip-address • Local proxy ARP and ND
secondary VLANs. { mask-length | mask } [ sub ] are disabled.
d Assign an IPv6 address to the For more information about local
primary VLAN interface: proxy ARP and ND, see Layer
ipv6 address { ipv6-address 3—IP Services Configuration
prefix-length | Guide. For more information
ipv6-address/prefix-length } about the local-proxy-arp
e Enable local proxy ARP: enable and local-proxy-nd
local-proxy-arp enable enable commands, see Layer
f Enable local proxy ND: 3—IP Services Command
local-proxy-nd enable Reference.
Task Command
Display information about primary VLANs and the
display private-vlan [ primary-vlan-id ]
secondary VLANs associated with each primary VLAN.
179
Figure 59 Network diagram
Configuration procedure
This example describes the configurations on Device B and Device C.
1. Configure Device B:
# Configure VLAN 5 as a primary VLAN.
<DeviceB> system-view
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan primary
[DeviceB-vlan5] quit
# Create VLANs 2 and 3.
[DeviceB] vlan 2 to 3
# Associate secondary VLANs 2 and 3 with primary VLAN 5.
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan secondary 2 to 3
[DeviceB-vlan5] quit
# Configure the uplink port (Ten-GigabitEthernet 1/0/5) as a promiscuous port of VLAN 5.
[DeviceB] interface ten-gigabitethernet 1/0/5
[DeviceB-Ten-GigabitEthernet1/0/5] port private-vlan 5 promiscuous
[DeviceB-Ten-GigabitEthernet1/0/5] quit
# Assign downlink port Ten-GigabitEthernet 1/0/2 to VLAN 2, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port access vlan 2
[DeviceB-Ten-GigabitEthernet1/0/2] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Assign downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceB-Ten-GigabitEthernet1/0/3] port private-vlan host
180
[DeviceB-Ten-GigabitEthernet1/0/3] quit
2. Configure Device C:
# Configure VLAN 6 as a primary VLAN.
<DeviceC> system-view
[DeviceC] vlan 6
[DeviceC–vlan6] private-vlan primary
[DeviceC–vlan6] quit
# Create VLANs 3 and 4.
[DeviceC] vlan 3 to 4
# Associate secondary VLANs 3 and 4 with primary VLAN 6.
[DeviceC] vlan 6
[DeviceC-vlan6] private-vlan secondary 3 to 4
[DeviceC-vlan6] quit
# Configure the uplink port (Ten-GigabitEthernet 1/0/5) as a promiscuous port of VLAN 6.
[DeviceC] interface ten-gigabitethernet 1/0/5
[DeviceC-Ten-GigabitEthernet1/0/5] port private-vlan 6 promiscuous
[DeviceC-Ten-GigabitEthernet1/0/5] quit
# Assign downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a host
port.
[DeviceC] interface ten-gigabitethernet 1/0/3
[DeviceC-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceC-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceC-Ten-GigabitEthernet1/0/3] quit
# Assign downlink port Ten-GigabitEthernet 1/0/4 to VLAN 4, and configure the port as a host
port.
[DeviceC] interface ten-gigabitethernet 1/0/4
[DeviceC-Ten-GigabitEthernet1/0/4] port access vlan 4
[DeviceC-Ten-GigabitEthernet1/0/4] port private-vlan host
[DeviceC-Ten-GigabitEthernet1/0/4] quit
VLAN ID: 5
VLAN type: Static
Private VLAN type: Primary
Route interface: Not configured
Description: VLAN 0005
Name: VLAN 0005
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/3
Ten-GigabitEthernet1/0/5
181
VLAN ID: 2
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0002
Name: VLAN 0002
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/5
VLAN ID: 3
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0003
Name: VLAN 0003
Tagged Ports: None
Untagged Ports:
Ten-GigabitEthernet1/0/3
Ten-GigabitEthernet1/0/5
182
Figure 60 Network diagram
Configuration procedure
1. Configure Device B:
# Configure VLANs 5 and 10 as primary VLANs.
<DeviceB> system-view
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan primary
[DeviceB-vlan5] quit
[DeviceB] vlan 10
[DeviceB-vlan10] private-vlan primary
[DeviceB-vlan10] quit
# Create VLANs 2, 3, 6, and 8.
[DeviceB] vlan 2 to 3
[DeviceB] vlan 6
[DeviceB-vlan6] quit
[DeviceB] vlan 8
[DeviceB-vlan8] quit
# Associate secondary VLANs 2 and 3 with primary VLAN 5.
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan secondary 2 to 3
[DeviceB-vlan5] quit
# Associate secondary VLANs 6 and 8 with primary VLAN 10.
[DeviceB] vlan 10
[DeviceB-vlan10] private-vlan secondary 6 8
[DeviceB-vlan10] quit
# Configure the uplink port (Ten-GigabitEthernet 1/0/1) as a trunk promiscuous port of VLANs 5
and 10.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port private-vlan 5 10 trunk promiscuous
[DeviceB-Ten-GigabitEthernet1/0/1] quit
183
# Assign downlink port Ten-GigabitEthernet 1/0/2 to VLAN 2, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port access vlan 2
[DeviceB-Ten-GigabitEthernet1/0/2] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Assign downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceB-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Assign downlink port Ten-GigabitEthernet 1/0/4 to VLAN 6, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/4
[DeviceB-Ten-GigabitEthernet1/0/4] port access vlan 6
[DeviceB-Ten-GigabitEthernet1/0/4] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/4] quit
# Assign downlink port Ten-GigabitEthernet 1/0/5 to VLAN 8, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/5
[DeviceB-Ten-GigabitEthernet1/0/5] port access vlan 8
[DeviceB-Ten-GigabitEthernet1/0/5] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/5] quit
2. Configure Device A:
# Create VLANs 5 and 10.
[DeviceA] vlan 5
[DeviceA-vlan5] quit
[DeviceA] vlan 10
[DeviceA-vlan10] quit
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 5 and 10 as a
tagged VLAN member.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type hybrid
[DeviceA-Ten-GigabitEthernet1/0/1] port hybrid vlan 5 10 tagged
[DeviceA-Ten-GigabitEthernet1/0/1] quit
VLAN ID: 5
VLAN type: Static
Private VLAN type: Primary
Route interface: Not configured
Description: VLAN 0005
184
Name: VLAN 0005
Tagged ports:
Ten-GigabitEthernet1/0/1
Untagged ports:
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/3
VLAN ID: 2
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0002
Name: VLAN 0002
Tagged ports:
Ten-GigabitEthernet1/0/1
Untagged ports:
Ten-GigabitEthernet1/0/2
VLAN ID: 3
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0003
Name: VLAN 0003
Tagged ports:
Ten-GigabitEthernet1/0/1
Untagged ports:
Ten-GigabitEthernet1/0/3
185
{ Downlink port Ten-GigabitEthernet 1/0/3 permits secondary VLAN 12.
• Secondary VLANs 11 and 12 are associated with primary VLAN 10.
• Secondary VLANs 21 and 22 are associated with primary VLAN 20.
Figure 61 Network diagram
Configuration procedure
1. Configure Device A:
# Configure VLANs 10 and 20 as primary VLANs.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] private-vlan primary
[DeviceA-vlan10] quit
[DeviceA] vlan 20
[DeviceA-vlan20] private-vlan primary
[DeviceA-vlan20] quit
# Create VLANs 11, 12, 21, and 22.
[DeviceA] vlan 11 to 12
[DeviceA] vlan 21 to 22
# Associate secondary VLANs 11 and 12 with primary VLAN 10.
[DeviceA] vlan 10
[DeviceA-vlan10] private-vlan secondary 11 12
[DeviceA-vlan10] quit
# Associate secondary VLANs 21 and 22 with primary VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] private-vlan secondary 21 22
186
[DeviceA-vlan20] quit
# Configure the uplink port (Ten-GigabitEthernet 1/0/5) as a trunk promiscuous port of VLANs
10 and 20.
[DeviceA] interface ten-gigabitethernet 1/0/5
[DeviceA-Ten-GigabitEthernet1/0/5] port private-vlan 10 20 trunk promiscuous
[DeviceA-Ten-GigabitEthernet1/0/5] quit
# Assign downlink port Ten-GigabitEthernet 1/0/1 to VLAN 22 and configure the port as a host
port.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port access vlan 22
[DeviceA-Ten-GigabitEthernet1/0/1] port private-vlan host
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Assign downlink port Ten-GigabitEthernet 1/0/3 to VLAN 12 and configure the port as a host
port.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port access vlan 12
[DeviceA-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Configure downlink port Ten-GigabitEthernet 1/0/2 as a trunk secondary port of VLANs 11
and 21.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port private-vlan 11 21 trunk secondary
[DeviceA-Ten-GigabitEthernet1/0/2] quit
2. Configure Device B:
# Create VLANs 11 and 21.
<DeviceB> system-view
[DeviceB] vlan 11
[DeviceB-vlan11] quit
[DeviceB] vlan 21
[DeviceB-vlan21] quit
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port, and assign it to VLANs 11 and 21 as a
tagged VLAN member.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type hybrid
[DeviceB-Ten-GigabitEthernet1/0/2] port hybrid vlan 11 21 tagged
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Assign Ten-GigabitEthernet 1/0/3 to VLAN 11.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port access vlan 11
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Assign Ten-GigabitEthernet 1/0/4 to VLAN 21.
[DeviceB] interface ten-gigabitethernet 1/0/4
[DeviceB-Ten-GigabitEthernet1/0/4] port access vlan 21
[DeviceB-Ten-GigabitEthernet1/0/4] quit
3. Configure Device C:
# Create VLANs 10 and 20.
<DeviceC> system-view
[DeviceC] vlan 10
187
[DeviceC-vlan10] quit
[DeviceC] vlan 20
[DeviceC-vlan20] quit
# Configure Ten-GigabitEthernet 1/0/5 as a hybrid port, and assign it to VLANs 10 and 20 as a
tagged VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/5
[DeviceC-Ten-GigabitEthernet1/0/5] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/5] port hybrid vlan 10 20 tagged
[DeviceC-Ten-GigabitEthernet1/0/5] quit
VLAN ID: 10
VLAN type: Static
Private-vlan type: Primary
Route interface: Not configured
Description: VLAN 0010
Name: VLAN 0010
Tagged ports:
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/5
Untagged ports:
Ten-GigabitEthernet1/0/3
VLAN ID: 11
VLAN type: Static
Private-vlan type: Secondary
Route interface: Not configured
Description: VLAN 0011
Name: VLAN 0011
Tagged ports:
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/5
Untagged ports: None
VLAN ID: 12
VLAN type: Static
Private-vlan type: Secondary
Route interface: Not configured
Description: VLAN 0012
Name: VLAN 0012
Tagged ports:
Ten-GigabitEthernet1/0/5
Untagged ports:
188
Ten-GigabitEthernet1/0/3
Configuration procedure
# Create VLAN 10 and configure it as a primary VLAN.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] private-vlan primary
[DeviceA-vlan10] quit
189
# Configure the uplink port (Ten-GigabitEthernet 1/0/1) as a promiscuous port of VLAN 10.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port private-vlan 10 promiscuous
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Assign downlink port Ten-GigabitEthernet 1/0/2 to VLAN 2, and configure the port as a host port.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port access vlan 2
[DeviceA-Ten-GigabitEthernet1/0/2] port private-vlan host
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Assign downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a host port.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceA-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Enable Layer 3 communication between secondary VLANs 2 and 3 that are associated with
primary VLAN 10.
[DeviceA] interface vlan-interface 10
[DeviceA-Vlan-interface10] private-vlan secondary 2 3
VLAN ID: 10
VLAN type: Static
Private VLAN type: Primary
Route interface: Configured
IPv4 address: 192.168.1.1
IPv4 subnet mask: 255.255.255.0
Description: VLAN 0010
Name: VLAN 0010
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/3
VLAN ID: 2
VLAN type: Static
Private VLAN type: Secondary
Route interface: Configured
190
IPv4 address: 192.168.1.1
IPv4 subnet mask: 255.255.255.0
Description: VLAN 0002
Name: VLAN 0002
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1
Ten-GigabitEthernet1/0/2
VLAN ID: 3
VLAN type: Static
Private VLAN type: Secondary
Route interface: Configured
IPv4 address: 192.168.1.1
IPv4 subnet mask: 255.255.255.0
Description: VLAN 0003
Name: VLAN 0003
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1
Ten-GigabitEthernet1/0/3
The Route interface field in the output is Configured, indicating that secondary VLANs 2 and 3 are
interoperable at Layer 3.
191
Configuring voice VLANs
Overview
A voice VLAN is used for transmitting voice traffic. The device can configure QoS parameters for
voice packets to ensure higher transmission priority of the voice packets.
Common voice devices include IP phones and integrated access devices (IADs). This chapter uses
IP phones as an example.
For an IP phone to access a device, the device must perform the following operations:
1. Identify the IP phone in the network and obtain the MAC address of the IP phone.
2. Advertise the voice VLAN information to the IP phone.
After receiving the voice VLAN information, the IP phone performs automatic configuration. Voice
packets sent from the IP phone can then be transmitted within the voice VLAN.
Typically, an OUI address refers to the first 24 bits of a MAC address (in binary notation) and is a
globally unique identifier that IEEE assigns to a vendor. However, OUI addresses in this chapter are
addresses that the system uses to identify voice packets. They are the logical AND results of the
mac-address and oui-mask arguments in the voice-vlan mac-address command.
192
Automatically identifying IP phones through LLDP
If IP phones support LLDP, configure LLDP for automatic IP phone discovery on the device. The
device can then automatically discover the peer through LLDP, and exchange LLDP TLVs with the
peer.
If the LLDP System Capabilities TLV received on a port indicates that the peer can act as a telephone,
the device performs the following operations:
1. Sends an LLDP TLV with the voice VLAN configuration to the peer.
2. Assigns the receiving port to the voice VLAN.
3. Increases the transmission priority of the voice packets sent from the IP phone.
4. Adds the MAC address of the IP phone to the MAC address table to ensure that the IP phone
can pass authentication.
Use LLDP instead of the OUI list to identify IP phones if the network has more IP phone categories
than the maximum number of OUI addresses supported on the device. LLDP has higher priority than
the OUI list.
For more information about LLDP, see "Configuring LLDP."
193
Figure 64 Connecting the host and IP phone in series
Voice gateway
Automatic mode
Use automatic mode when PCs and IP phones are connected in series to access the network
through the device, as shown in Figure 64. Ports on the device transmit both voice traffic and data
traffic.
When an IP phone is powered on, it sends out protocol packets. After receiving these protocol
packets, the device uses the source MAC address of the protocol packets to match its OUI
addresses. If the match succeeds, the device performs the following operations:
• Assigns the receiving port of the protocol packets to the voice VLAN.
• Issues ACL rules to set the packet precedence.
• Starts the voice VLAN aging timer.
If no voice packet is received from the port before the aging timer expires, the device will remove the
port from the voice VLAN. The aging timer is also configurable.
194
When the IP phone reboots, the port is reassigned to the voice VLAN to ensure the correct operation
of the existing voice connections. The reassignment occurs automatically without being triggered by
voice traffic as long as the voice VLAN operates correctly.
Manual mode
Use manual mode when only IP phones access the network through the device, as shown in Figure
65. In this mode, ports are assigned to a voice VLAN that transmits voice traffic exclusively. No data
traffic affects the voice traffic transmission.
You must manually assign the port that connects to the IP phone to a voice VLAN. The device uses
the source MAC address of the received voice packets to match its OUI addresses. If the match
succeeds, the device issues ACL rules to set the packet precedence.
To remove the port from the voice VLAN, you must manually remove it.
When IP phones send out untagged packets, you must set the voice VLAN assignment mode to
manual.
Table 16 Configuration requirements for ports in manual mode to support untagged voice
traffic
Port link
Configuration requirements
type
Access The voice VLAN must be the PVID of the port.
The voice VLAN must be the PVID of the port.
Trunk
The port must forward packets from the voice VLAN.
The voice VLAN must be the PVID of the port.
Hybrid
The port must forward packets from the voice VLAN without VLAN tags.
195
If an IP phone sends out tagged voice traffic, and its access port is configured with 802.1X
authentication, guest VLAN, Auth-Fail VLAN, or critical VLAN, VLAN IDs must be different for the
following VLANs:
• Voice VLAN.
• PVID of the access port.
• 802.1X guest, Auth-Fail, or critical VLAN.
If an IP phone sends out untagged voice traffic, the PVID of the access port must be the voice VLAN.
In this scenario, 802.1X authentication is not supported.
Voice VLAN
Packet type Packet processing
mode
• Untagged packets The port does not examine their source MAC addresses.
• Packets with the Both voice traffic and non-voice traffic can be transmitted in
Normal voice VLAN tags the voice VLAN.
Packets with other VLAN The port forwards or drops them depending on whether the
tags port permits packets from these VLANs to pass through.
• If the source MAC address of a packet matches an OUI
• Untagged packets address on the device, the packet is forwarded in the
• Packets with the voice VLAN.
Security voice VLAN tags • If the source MAC address of a packet does not match
an OUI address on the device, the packet is dropped.
Packets with other VLAN The port forwards or drops them depending on whether the
tags port permits packets from these VLANs to pass through.
196
Tasks at a glance
(Required.) Use one of the following methods:
• Configuring a port to operate in automatic voice VLAN assignment mode
• Configuring a port to operate in manual voice VLAN assignment mode
(Optional.) Enabling LLDP for automatic IP phone discovery
(Optional.) Use one of the following methods:
• Configuring LLDP to advertise a voice VLAN
• Configuring CDP to advertise a voice VLAN
197
Configuring a port to operate in automatic voice
VLAN assignment mode
Configuration restrictions and guidelines
When you configure a port to operate in automatic voice VLAN assignment mode, follow these
restrictions and guidelines:
• Do not configure a VLAN as both a voice VLAN and a protocol-based VLAN.
{ A voice VLAN in automatic mode on a hybrid port processes only tagged incoming voice
traffic.
{ A protocol-based VLAN on a hybrid port processes only untagged incoming packets. For
more information about protocol-based VLANs, see "Configuring protocol-based VLANs."
• As a best practice, do not use this mode with MSTP. In MSTP mode, if a port is blocked in the
MSTI of the target voice VLAN, the port drops the received packets instead of delivering them to
the CPU. As a result, the port will not be dynamically assigned to the voice VLAN.
• As a best practice, do not use this mode with PVST. In PVST mode, if the target voice VLAN is
not permitted on a port, the port is placed in blocked state. The port drops the received packets
instead of delivering them to the CPU. As a result, the port will not be dynamically assigned to
the voice VLAN.
• As a best practice, do not configure both dynamic MAC-based VLAN assignment and automatic
voice VLAN assignment mode on a port. They can have a negative impact on each other.
Configuration procedure
To configure a port to operate in automatic voice VLAN assignment mode:
198
Step Command Remarks
6. Configure the link type of • port link-type trunk
the port. N/A
• port link-type hybrid
7. Configure the port to By default, the automatic
operate in automatic voice voice-vlan mode auto voice VLAN assignment mode
VLAN assignment mode. is enabled.
By default, the voice VLAN
feature is disabled.
8. Enable the voice VLAN Before you execute this
feature on the port. voice-vlan vlan-id enable
command, make sure the
specified VLAN already
exists.
Configuration procedure
To configure a port to operate in manual voice VLAN assignment mode:
199
Step Command Remarks
5. Configure the port to
operate in manual voice By default, a port operates in
VLAN assignment undo voice-vlan mode auto automatic voice VLAN
mode. assignment mode.
Configuration procedure
To enable LLDP for automatic IP phone discovery:
200
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet interface interface-type
interface view. N/A
interface-number
By default, no advertised
voice VLAN ID is configured.
3. Configure an advertised lldp tlv-enable med-tlv For more information about
voice VLAN ID. network-policy vlan-id the command, see Layer
2—LAN Switching Command
Reference.
For more information about
4. (Optional.) Display the voice the command, see Layer
VLAN advertised by LLDP. display lldp local-information
2—LAN Switching Command
Reference.
201
Displaying and maintaining voice VLANs
Execute display commands in any view.
Task Command
Display the voice VLAN state. display voice-vlan state
Display OUI addresses on a device. display voice-vlan mac-address
Configuration procedure
1. Configure voice VLANs:
# Create VLANs 2 and 3.
<DeviceA> system-view
[DeviceA] vlan 2 to 3
# Set the voice VLAN aging timer to 30 minutes.
202
[DeviceA] voice-vlan aging 30
# Enable security mode for voice VLANs.
[DeviceA] voice-vlan security enable
# Add MAC addresses of IP phones A and B to the device with mask FFFF-FF00-0000.
[DeviceA] voice-vlan mac-address 0011-1100-0001 mask ffff-ff00-0000 description IP
phone A
[DeviceA] voice-vlan mac-address 0011-2200-0001 mask ffff-ff00-0000 description IP
phone B
2. Configure Ten-GigabitEthernet 1/0/1:
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type hybrid
# Configure Ten-GigabitEthernet 1/0/1 to operate in automatic voice VLAN assignment mode.
[DeviceA-Ten-GigabitEthernet1/0/1] voice-vlan mode auto
# Enable voice VLAN on Ten-GigabitEthernet 1/0/1 and configure VLAN 2 as the voice VLAN
for it.
[DeviceA-Ten-GigabitEthernet1/0/1] voice-vlan 2 enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
3. Configure Ten-GigabitEthernet 1/0/2:
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type hybrid
# Configure Ten-GigabitEthernet 1/0/2 to operate in automatic voice VLAN assignment mode.
[DeviceA-Ten-GigabitEthernet1/0/2] voice-vlan mode auto
# Enable voice VLAN on Ten-GigabitEthernet 1/0/2 and configure VLAN 3 as the voice VLAN
for it.
[DeviceA-Ten-GigabitEthernet1/0/2] voice-vlan 3 enable
[DeviceA-Ten-GigabitEthernet1/0/2] quit
203
Voice VLAN enabled ports and their modes:
Port VLAN Mode CoS DSCP
XGE1/0/1 2 Auto 6 46
XGE1/0/2 3 Auto 6 46
Configuration procedure
# Enable security mode for voice VLANs.
<DeviceA> system-view
[DeviceA] voice-vlan security enable
# Create VLAN 2.
[DeviceA] vlan 2
[DeviceA-vlan2] quit
204
# Enable voice VLAN and configure VLAN 2 as the voice VLAN on Ten-GigabitEthernet 1/0/1.
[DeviceA-Ten-GigabitEthernet1/0/1] voice-vlan 2 enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
205
Configuring MVRP
Multiple Registration Protocol (MRP) is an attribute registration protocol used to transmit attribute
values. Multiple VLAN Registration Protocol (MVRP) is a typical MRP application. It synchronizes
VLAN information among devices.
MVRP propagates local VLAN information to other devices, receives VLAN information from other
devices, and dynamically updates local VLAN information. When the network topology changes,
MVRP propagates and learns VLAN information again according to the new topology.
MRP
MRP allows devices in the same LAN to transmit attribute values on a per MSTI basis. For more
information about MSTIs, see "Configuring spanning tree protocols."
MRP implementation
An MRP-enabled port is called an MRP participant. An MVRP-enabled port is called an MVRP
participant.
As shown in Figure 68, an MRP participant sends declarations and withdrawals to notify other
participants to register and deregister its attribute values. It also registers and deregisters the
attribute values of other participants according to the received declarations and withdrawals. MRP
rapidly propagates the configuration information of an MRP participant throughout the LAN.
Figure 68 MRP implementation
MRP messages
MRP messages include the following types:
• Declaration—Includes Join and New messages.
• Withdrawal—Includes Leave and LeaveAll messages.
206
Join message
An MRP participant sends a Join message to request the peer participant to register attributes in the
Join message.
When receiving a Join message from the peer participant, an MRP participant performs the following
tasks:
• Registers the attributes in the Join message.
• Propagates the Join message to all other participants on the device.
After receiving the Join message, other participants send the Join message to their respective peer
participants.
Join messages sent from a local participant to its peer participant include the following types:
• JoinEmpty—Declares an unregistered attribute. For example, when an MRP participant joins
an unregistered static VLAN, it sends a JoinEmpty message.
VLANs created manually and locally are called static VLANs. VLANs learned through MRP are
called dynamic VLANs.
• JoinIn—Declares a registered attribute. A JoinIn message is used in one of the following
situations:
{ An MRP participant joins an existing static VLAN and sends a JoinIn message after
registering the VLAN.
{ The MRP participant receives a Join message propagated by another participant on the
device and sends a JoinIn message after registering the VLAN.
New message
Similar to a Join message, a New message enables MRP participants to register attributes.
When the MSTP topology changes, an MRP participant sends a New message to the peer
participant to declare the topology change.
Upon receiving a New message from the peer participant, an MRP participant performs the following
tasks:
• Registers the attributes in the message.
• Propagates the New message to all other participants on the device.
After receiving the New message, other participants send the New message to their respective peer
participants.
Leave message
An MRP participant sends a Leave message to the peer participant when it wants the peer
participant to deregister attributes that it has deregistered.
When the peer participant receives the Leave message, it performs the following tasks:
• Deregisters the attribute in the Leave message.
• Propagates the Leave message to all other participants on the device.
After a participant on the device receives the Leave message, it determines whether to send the
Leave message to its peer participant depending on the attribute status on the device.
• If the VLAN in the Leave message is a dynamic VLAN not registered by any participants on the
device, both of the following events occur:
{ The VLAN is deleted on the device.
{ The participant sends the Leave message to its peer participant.
• If the VLAN in the Leave message is a static VLAN, the participant will not send the Leave
message to its peer participant.
207
LeaveAll message
Each MRP participant starts its LeaveAll timer when starting up. When the timer expires, the MRP
participant sends LeaveAll messages to the peer participant.
Upon sending or receiving a LeaveAll message, the local participant starts the Leave timer. The local
participant determines whether to send a Join message depending on its attribute status. A
participant can re-register the attributes in the received Join message before the Leave timer
expires.
When the Leave timer expires, a participant deregisters all attributes that have not been
re-registered to periodically clear useless attributes in the network.
MRP timers
MRP uses the following timers to control message transmission.
Periodic timer
The Periodic timer controls the transmission of MRP messages. An MRP participant starts its own
Periodic timer upon startup, and stores MRP messages to be sent before the Periodic timer expires.
When the Periodic timer expires, MRP sends stored MRP messages in as few MRP frames as
possible and restarts the Periodic timer. This mechanism reduces the number of MRP frames sent.
You can enable or disable the Periodic timer. When the Periodic timer is disabled, MRP does not
periodically send MRP messages. Instead, an MRP participant sends MRP messages when the
LeaveAll timer expires or the participant receives a LeaveAll message from the peer participant.
Join timer
The Join timer controls the transmission of Join messages. An MRP participant starts the Join timer
after sending a Join message to the peer participant. Before the Join timer expires, the participant
does not resend the Join message when the following conditions exist:
• The participant receives a JoinIn message from the peer participant.
• The received JoinIn message has the same attributes as the sent Join message.
When both the Join timer and the Periodic timer expire, the participant resends the Join message.
Leave timer
The Leave timer controls the deregistration of attributes.
An MRP participant starts the Leave timer in one of the following conditions:
• The participant receives a Leave message from its peer participant.
• The participant receives or sends a LeaveAll message.
The MRP participant does not deregister the attributes in the Leave or LeaveAll message if the
following conditions exist:
• The participant receives a Join message before the Leave timer expires.
• The Join message includes the attributes that have been encapsulated in the Leave or LeaveAll
message.
If the participant does not receive a Join message for these attributes before the Leave timer expires,
MRP deregisters the attributes.
LeaveAll timer
After startup, an MRP participant starts its own LeaveAll timer. When the LeaveAll timer expires, the
MRP participant sends out a LeaveAll message and restarts the LeaveAll timer.
Upon receiving the LeaveAll message, other participants restart their LeaveAll timer. The value of
the LeaveAll timer is randomly selected between the LeaveAll timer and 1.5 times the LeaveAll timer.
This mechanism provides the following benefits:
208
• Effectively reduces the number of LeaveAll messages in the network.
• Prevents the LeaveAll timer of a particular participant from always expiring first.
209
receive undesired copies. For more information about port mirroring, see Network Management
and Monitoring Configuration Guide.
• MVRP takes effect only on trunk ports. For more information about trunk ports, see "Configuring
VLANs."
• Enabling MVRP on a Layer 2 aggregate interface takes effect on the aggregate interface and all
Selected member ports in the link aggregation group.
• MVRP configuration made on an aggregation group member port takes effect only after the port
is removed from the aggregation group.
Configuration prerequisites
Before configuring MVRP, make sure each MSTI is mapped to an existing VLAN on each device in
the network.
Enabling MVRP
Step Command Remarks
1. Enter system view. system-view N/A
By default, MVRP is globally
disabled.
2. Enable MVRP globally. mvrp global enable For MVRP to take effect on a port,
enable MVRP both on the port
and globally.
3. Enter Layer 2 Ethernet
interface view or Layer 2 interface interface-type
N/A
aggregate interface view. interface-number
210
Step Command Remarks
Optional.
3. Set an MVRP registration mvrp registration { fixed |
mode for the port. forbidden | normal } The default setting is normal
registration mode.
Optional.
3. Set the LeaveAll timer. mrp timer leaveall timer-value The default setting is 1000
centiseconds.
Optional.
4. Set the Join timer. mrp timer join timer-value The default setting is 20
centiseconds.
Optional.
5. Set the Leave timer. mrp timer leave timer-value The default setting is 60
centiseconds.
Optional.
The default setting is 100
6. Set the Periodic timer. mrp timer periodic timer-value centiseconds.
You can restore the Periodic timer
to the default at any time.
Table 18 shows the value ranges for Join, Leave, and LeaveAll timers and their dependencies.
• If you set a timer to a value beyond the allowed value range, your configuration fails. You can
set a timer by tuning the value of any other timer. The value of each timer must be an integer
multiple of 20 centiseconds and in the range defined in Table 18.
• As a best practice, restore the timers in the order of Join, Leave, and LeaveAll.
Table 18 Dependencies of the Join, Leave, and LeaveAll timers
211
Enabling GVRP compatibility
Enable GVRP compatibility for MVRP when the peer device supports GVRP. Then, the local end can
receive and send both MVRP and GVRP frames.
When you enable GVRP compatibility, follow these restrictions and guidelines:
• GVRP compatibility enables MVRP to work with STP or RSTP, but not MSTP.
• When the system is busy, disable the Period timer to prevent the participant from frequently
registering or deregistering attributes.
For more information about GVRP, see the IEEE 802.1Q standard.
To enable GVRP compatibility:
Task Command
Display MVRP running status. display mvrp running-status [ interface interface-list ]
Display the MVRP state of a port in a display mvrp state interface interface-type interface-number
VLAN. vlan vlan-id
Display MVRP statistics. display mvrp statistics [ interface interface-list ]
Clear MVRP statistics. reset mvrp statistics [ interface interface-list ]
212
Figure 69 Network diagram
Device A Device B
Permit: all VLANs
XGE1/0/3 XGE1/0/3
XG 2
XG
E1 /0/ VLAN 20
/0/
VLAN 10 /0/ E1
E1
E1
2 XG
/0/
XG
1
Permit: all VLANs Permit: VLANs 20, 40
s Pe
AN rm
ll VL it:
VL
1
a
XG
it: AN
/0/
E1 rm 40 XG
E1
2 Pe E1
/0/ /0/
E1
XG
/0/
2
XG
1
VLAN 10 MSTI 1
VLAN 20 MSTI 2
Other VLANs MSTI 0
Device C Device D
A B A B A B
C D C C D
MSTI 0 MSTI 1 MSTI 2
Configuration procedure
1. Configure Device A:
# Enter MST region view.
<DeviceA> system-view
[DeviceA] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceA-mst-region] region-name example
[DeviceA-mst-region] instance 1 vlan 10
[DeviceA-mst-region] instance 2 vlan 20
[DeviceA-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceA-mst-region] active region-configuration
[DeviceA-mst-region] quit
# Configure Device A as the primary root bridge of MSTI 1.
[DeviceA] stp instance 1 root primary
# Globally enable the spanning tree feature.
[DeviceA] stp global enable
# Globally enable MVRP.
213
[DeviceA] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit all VLANs.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/1] port trunk permit vlan all
# Enable MVRP on port Ten-GigabitEthernet 1/0/1.
[DeviceA-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit VLAN 40.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 40
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceA-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and configure it to permit all VLANs.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/3] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/3.
[DeviceA-Ten-GigabitEthernet1/0/3] mvrp enable
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Create VLAN 10.
[DeviceA] vlan 10
[DeviceA-vlan10] quit
2. Configure Device B:
# Enter MST region view.
<DeviceB> system-view
[DeviceB] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceB-mst-region] region-name example
[DeviceB-mst-region] instance 1 vlan 10
[DeviceB-mst-region] instance 2 vlan 20
[DeviceB-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceB-mst-region] active region-configuration
[DeviceB-mst-region] quit
# Configure Device B as the primary root bridge of MSTI 2.
[DeviceB] stp instance 2 root primary
# Globally enable the spanning tree feature.
[DeviceB] stp global enable
# Globally enable MVRP.
[DeviceB] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit VLANs 20 and
40.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port link-type trunk
214
[DeviceB-Ten-GigabitEthernet1/0/1] port trunk permit vlan 20 40
# Enable MVRP on Ten-GigabitEthernet 1/0/1.
[DeviceB-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceB-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit all VLANs.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/2] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceB-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and configure it to permit all VLANs.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/3] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/3.
[DeviceB-Ten-GigabitEthernet1/0/3] mvrp enable
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Create VLAN 20.
[DeviceB] vlan 20
[DeviceB-vlan20] quit
3. Configure Device C:
# Enter MST region view.
<DeviceC> system-view
[DeviceC] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceC-mst-region] region-name example
[DeviceC-mst-region] instance 1 vlan 10
[DeviceC-mst-region] instance 2 vlan 20
[DeviceC-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceC-mst-region] active region-configuration
[DeviceC-mst-region] quit
# Configure Device C as the root bridge of MSTI 0.
[DeviceC] stp instance 0 root primary
# Globally enable the spanning tree feature.
[DeviceC] stp global enable
# Globally enable MVRP.
[DeviceC] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit all VLANs.
[DeviceC] interface ten-gigabitethernet 1/0/1
[DeviceC-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/1] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/1.
[DeviceC-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceC-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit all VLANs.
215
[DeviceC] interface ten-gigabitethernet 1/0/2
[DeviceC-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/2] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceC-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceC-Ten-GigabitEthernet1/0/2] quit
4. Configure Device D:
# Enter MST region view.
<DeviceD> system-view
[DeviceD] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceD-mst-region] region-name example
[DeviceD-mst-region] instance 1 vlan 10
[DeviceD-mst-region] instance 2 vlan 20
[DeviceD-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceD-mst-region] active region-configuration
[DeviceD-mst-region] quit
# Globally enable the spanning tree feature.
[DeviceD] stp global enable
# Globally enable MVRP.
[DeviceD] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit VLANs 20 and
40.
[DeviceD] interface ten-gigabitethernet 1/0/1
[DeviceD-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceD-Ten-GigabitEthernet1/0/1] port trunk permit vlan 20 40
# Enable MVRP on Ten-GigabitEthernet 1/0/1.
[DeviceD-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceD-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit VLAN 40.
[DeviceD] interface ten-gigabitethernet 1/0/2
[DeviceD-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceD-Ten-GigabitEthernet1/0/2] port trunk permit vlan 40
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceD-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceD-Ten-GigabitEthernet1/0/2] quit
216
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default)
Declared VLANs :
1(default), 10, 20
Propagated VLANs :
1(default)
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
None
Declared VLANs :
1(default)
Propagated VLANs :
None
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
20
Declared VLANs :
1(default), 10
Propagated VLANs :
20
217
• Ten-GigabitEthernet 1/0/3 has registered VLAN 20, declared VLAN 1 and VLAN 10, and
propagated VLAN 20 through MVRP.
# Display local VLAN information on Device B.
[DeviceB] display mvrp running-status
-------[MVRP Global Info]-------
Global Status : Enabled
Compliance-GVRP : False
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default)
Declared VLANs :
1(default), 20
Propagated VLANs :
1(default)
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 10
Declared VLANs :
1(default), 20
Propagated VLANs :
1(default)
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 10
218
Declared VLANs :
20
Propagated VLANs :
10
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 10, 20
Declared VLANs :
1(default)
Propagated VLANs :
1(default), 10
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 20
Declared VLANs :
1(default), 10
Propagated VLANs :
1(default), 20
219
• Ten-GigabitEthernet 1/0/1 has registered VLAN 1, VLAN 10, and VLAN 20, declared VLAN 1,
and propagated VLAN 1 and VLAN 10 through MVRP.
• Ten-GigabitEthernet 1/0/2 has registered VLAN 1 and VLAN 20, declared VLAN 1 and VLAN 10,
and propagated VLAN 1 and VLAN 20 through MVRP.
# Display local VLAN information on Device D.
[DeviceD] display mvrp running-status
-------[MVRP Global Info]-------
Global Status : Enabled
Compliance-GVRP : False
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 20
Declared VLANs :
1(default)
Propagated VLANs :
1(default), 20
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default)
Declared VLANs :
None
Propagated VLANs :
None
220
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] mvrp registration fixed
[DeviceB-Ten-GigabitEthernet1/0/3] quit
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Fixed
Registered VLANs :
1(default), 10
Declared VLANs :
20
Propagated VLANs :
10
The output shows that VLAN information on Ten-GigabitEthernet 1/0/3 is not changed after you set
its MVRP registration mode to fixed.
# Delete VLAN 10 on Device A.
[DeviceA] undo vlan 10
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Fixed
Registered VLANs :
1(default), 10
Declared VLANs :
20
Propagated VLANs :
10
221
The output shows that dynamic VLAN information on Ten-GigabitEthernet 1/0/3 is not changed after
you set its MVRP registration mode to fixed.
222
Configuring QinQ
This document uses the following terms:
• CVLAN—Customer network VLANs, also called inner VLANs, refer to VLANs that a customer
uses on the private network.
• SVLAN—Service provider network VLANs, also called outer VLANs, refer to VLANs that a
service provider uses to transmit VLAN tagged traffic for customers.
Overview
802.1Q-in-802.1Q (QinQ) adds an 802.1Q tag to 802.1Q tagged customer traffic. It enables a
service provider to extend Layer 2 connections across an Ethernet network between customer sites.
QinQ provides the following benefits:
• Enables a service provider to use a single SVLAN to convey multiple CVLANs for a customer.
• Enables customers to plan CVLANs without conflicting with SVLANs.
• Enables customers to keep their VLAN assignment schemes unchanged when the service
provider changes its VLAN assignment scheme.
• Allows different customers to use overlapping CVLAN IDs. Devices in the service provider
network make forwarding decisions based on SVLAN IDs instead of CVLAN IDs.
As shown in Figure 71, customer A has remote sites CE 1 and CE 4. Customer B has remote sites
CE 2 and CE 3. The CVLANs of the two customers overlap. The service provider assigns SVLANs 3
and 4 to customers A and B, respectively.
223
When a tagged Ethernet frame from CE 1 arrives at PE 1, the PE tags the frame with SVLAN 3. The
double-tagged Ethernet frame travels over the service provider network until it arrives at PE 2. PE 2
removes the SVLAN tag of the frame, and then sends the frame to CE 4.
Figure 71 Typical QinQ application scenario
VLANs 1 to 20 VLANs 1 to 10
CE 3 CE 4
Customer Customer
network B network A
CVLAN B Data CVLAN A Data
PE 1 Internet PE 2
VLANs 1 to 10 VLANs 1 to 20
QinQ implementations
QinQ is enabled on a per-port basis. The link type of a QinQ-enabled port can be access, hybrid, or
trunk. The QinQ tagging behaviors are the same across these types of ports.
A QinQ-enabled port tags all incoming frames (tagged or untagged) with the PVID tag.
• If an incoming frame already has one tag, it becomes a double-tagged frame.
• If the frame does not have any 802.1Q tags, it becomes a frame tagged with the PVID.
QinQ provides the most basic VLAN manipulation method to tag all incoming frames (tagged or
untagged) with the PVID tag. To perform advanced VLAN manipulations, use VLAN mappings or
QoS policies as follows:
• To add different SVLANs for different CVLAN tags, use one-to-two VLAN mappings.
• To replace the SVLAN ID, CVLAN ID, or both IDs for an incoming double-tagged frame, use
two-to-two VLAN mappings.
• QinQ and two-to-two mappings are mutually exclusive. The device does not support adding an
SVLAN tag on a QinQ-enabled port and then modifying the CVLAN and SVLAN IDs.
• To use criteria other than the CVLAN ID to match packets for SVLAN tagging, use the QoS nest
action. The QoS nest action can also be used with other actions in the same traffic behavior.
• To set the 802.1p priority in SVLAN tags, use the priority marking action as described in "Setting
the 802.1p priority in SVLAN tags."
For more information about VLAN mappings, see "Configuring VLAN mapping." For more
information about QoS, see ACL and QoS Configuration Guide.
224
Protocols and standards
• IEEE 802.1Q, IEEE Standard for Local and Metropolitan Area Networks-Virtual Bridged Local
Area Networks
• IEEE 802.1ad, IEEE Standard for Local and Metropolitan Area Networks-Virtual Bridged Local
Area Networks-Amendment 4: Provider Bridges
Enabling QinQ
Enable QinQ on customer-side ports of PEs. A QinQ-enabled port tags an incoming frame with its
PVID.
Before you enable or disable QinQ on a port, you must remove any VLAN mappings on the port.
To enable QinQ:
225
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet
interface view or Layer 2 interface interface-type
N/A
aggregate interface view. interface-number
Set the port link type. By default, the link type of a port is
3. port link-type { hybrid | trunk }
access.
• For the hybrid port: By default, a trunk port allows
4. Configure the port to allow port hybrid vlan vlan-id-list packets only from VLAN 1 to pass
packets from its PVID and { tagged | untagged } through. A hybrid port is an
the transparent VLANs to • For the trunk port: untagged member of the VLAN to
pass through. port trunk permit vlan which the port belongs when its
{ vlan-id-list | all } link type is access.
By default, transparent
5. Specify transparent VLANs. qinq transparent-vlan vlan-id-list transmission is not configured for
any VLANs.
226
Protocol type Value
IPX/SPX 0x8137
IS-IS 0x8000
LACP 0x8809
LLDP 0x88cc
802.1X 0x888e
802.1ag 0x8902
Cluster 0x88a7
Reserved 0xfffd/0xfffe/0xffff
227
Step Command Remarks
1. Enter system view. system-view N/A
2. Create a traffic class and traffic classifier classifier-name [ operator By default, no traffic
enter its view. { and | or } ] classes exist.
• Match CVLAN IDs:
if-match customer-vlan-id vlan-id-list
3. Configure CVLAN match
criteria. • Match 802.1p priority: N/A
if-match customer-dot1p
dot1p-value&<1-8>
4. Return to system view. quit N/A
5. Create a traffic behavior By default, no traffic
and enter its view. traffic behavior behavior-name
behaviors exist.
• Replace the priority in the SVLAN tags of
matching frames with the configured
6. Configure a priority priority:
marking action for SVLAN remark dot1p dot1p-value N/A
tags. • Copy the 802.1p priority in the CVLAN
tag to the SVLAN tag:
remark dot1p customer-dot1p-trust
7. Return to system view. quit N/A
8. Create a QoS policy and By default, no QoS
enter its view. qos policy policy-name
policies exist.
9. Specify the traffic behavior
for the traffic class in the classifier classifier-name behavior
N/A
QoS policy. behavior-name
For more information about QoS policies, see ACL and QoS Configuration Guide.
228
Task Command
display qinq [ interface interface-type
Display QinQ-enabled ports.
interface-number ]
Configuration procedure
1. Configure PE 1:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLAN 100 and VLANs 10
through 70.
<PE1> system-view
[PE1] interface ten-gigabitethernet 1/0/1
[PE1-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 10 to 70
229
# Set the PVID of Ten-GigabitEthernet 1/0/1 to VLAN 100.
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] qinq enable
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 200.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
# Set the TPID value in the SVLAN tags to 0x8200 on Ten-GigabitEthernet 1/0/2.
[PE1-Ten-GigabitEthernet1/0/2] qinq ethernet-type service-tag 8200
[PE1-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign it to VLAN 200 and VLANs 30
through 90.
[PE1] interface ten-gigabitethernet 1/0/3
[PE1-Ten-GigabitEthernet1/0/3] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/3] port trunk permit vlan 200 30 to 90
# Set the PVID of Ten-GigabitEthernet 1/0/3 to VLAN 200.
[PE1-Ten-GigabitEthernet1/0/3] port trunk pvid vlan 200
# Enable QinQ on Ten-GigabitEthernet 1/0/3.
[PE1-Ten-GigabitEthernet1/0/3] qinq enable
[PE1-Ten-GigabitEthernet1/0/3] quit
2. Configure PE 2:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLAN 200 and VLANs 30
through 90.
<PE2> system-view
[PE2] interface ten-gigabitethernet 1/0/1
[PE2-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/1] port trunk permit vlan 200 30 to 90
# Set the PVID of Ten-GigabitEthernet 1/0/1 to VLAN 200.
[PE2-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 200
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE2-Ten-GigabitEthernet1/0/1] qinq enable
[PE2-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 200.
[PE2] interface ten-gigabitethernet 1/0/2
[PE2-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
# Set the TPID value in the SVLAN tags to 0x8200 on Ten-GigabitEthernet 1/0/2.
[PE2-Ten-GigabitEthernet1/0/2] qinq ethernet-type service-tag 8200
[PE2-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign it to VLAN 100 and VLANs 10
through 70.
[PE2] interface ten-gigabitethernet 1/0/3
[PE2-Ten-GigabitEthernet1/0/3] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/3] port trunk permit vlan 100 10 to 70
# Set the PVID of Ten-GigabitEthernet 1/0/3 to VLAN 100.
[PE2-Ten-GigabitEthernet1/0/3] port trunk pvid vlan 100
230
# Enable QinQ on Ten-GigabitEthernet 1/0/3.
[PE2-Ten-GigabitEthernet1/0/3] qinq enable
[PE2-Ten-GigabitEthernet1/0/3] quit
3. Configure the devices between PE 1 and PE 2:
# Set the MTU to a minimum of 1504 bytes for each port on the path of QinQ frames. (Details
not shown.)
# Configure all ports on the forwarding path to allow frames from VLANs 100 and 200 to pass
through without removing the VLAN tag. (Details not shown.)
Configuration procedure
1. Configure PE 1:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLANs 10 through 50,
100, and 3000.
<PE1> system-view
[PE1] interface ten-gigabitethernet 1/0/1
[PE1-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 3000 10 to 50
# Set the PVID of Ten-GigabitEthernet 1/0/1 to VLAN 100.
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] qinq enable
# Enable transparent transmission for VLAN 3000 on Ten-GigabitEthernet 1/0/1.
231
[PE1-Ten-GigabitEthernet1/0/1] qinq transparent-vlan 3000
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 3000.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 3000
[PE1-Ten-GigabitEthernet1/0/2] quit
2. Configure PE 2:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLANs 10 through 50,
100, and 3000.
<PE2> system-view
[PE2] interface ten-gigabitethernet 1/0/1
[PE2-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 3000 10 to 50
# Set the PVID of Ten-GigabitEthernet 1/0/1 to VLAN 100.
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE2-Ten-GigabitEthernet1/0/1] qinq enable
# Enable transparent transmission for VLAN 3000 on Ten-GigabitEthernet 1/0/1.
[PE2-Ten-GigabitEthernet1/0/1] qinq transparent-vlan 3000
[PE2-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 3000.
[PE2] interface ten-gigabitethernet 1/0/2
[PE2-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 3000
3. Configure the devices between PE 1 and PE 2:
# Set the MTU to a minimum of 1504 bytes for each port on the path of QinQ frames. (Details
not shown.)
# Configure all ports on the forwarding path to allow frames from VLANs 100 and 3000 to pass
through without removing the VLAN tag. (Details not shown.)
232
Configuring VLAN mapping
Overview
VLAN mapping re-marks VLAN tagged traffic with new VLAN IDs. Hewlett Packard Enterprise
provides the following types of VLAN mapping:
• One-to-one VLAN mapping—Replaces one VLAN tag with another.
• Many-to-one VLAN mapping—Replaces multiple VLAN tags with the same VLAN tag.
• One-to-two VLAN mapping—Tags single-tagged packets with an outer VLAN tag.
• Two-to-two VLAN mapping—Replaces the outer and inner VLAN IDs of double tagged traffic
with a new pair of VLAN IDs.
233
Figure 74 Application scenario of one-to-one and many-to-one VLAN mapping
DHCP client
VLAN 1
PC
Home gateway
VLAN 2
VoD
Wiring-closet
switch DHCP server
VLAN 1
PC VLAN 1 -> VLAN 102
VLAN 2 -> VLAN 202
VLAN 3 -> VLAN 302
...
VLAN 2
VoD
Home gateway VLANs 101 and 102 -> VLAN 501
VLANs 201 and 202 -> VLAN 502
VLAN 3 VLANs 301 and 302 -> VLAN 503
VoIP
...
...
...
...
Campus switch
...
VLAN 1
PC
VLANs 199 and 200 -> VLAN 501
VLANs 299 and 300 -> VLAN 502
Home gateway VLANs 399 and 400 -> VLAN 503
VLAN 2
VoD
Distribution
...
Wiring-closet
switch
VLAN 1
PC VLAN 1 -> VLAN 200
VLAN 2 -> VLAN 300
VLAN 3 -> VLAN 400
VLAN 2
VoD
Home gateway
VLAN 3
VoIP
234
Figure 75 Application scenario of one-to-two and two-to-two VLAN mapping
Site 1 and Site 2 are in VLAN 2 and VLAN 3, respectively. The SP 1 network assigns SVLAN 10 to
Site 1. The SP 2 network assigns SVLAN 20 to Site 2. When the packet from Site 1 arrives at PE 1,
PE 1 tags the packet with SVLAN 10 by using one-to-two VLAN mapping.
When the double-tagged packet from the SP 1 network arrives at the SP 2 network interface, PE 3
processes the packet as follows:
• Replaces SVLAN tag 10 with SVLAN tag 20.
• Replaces CVLAN tag 2 with CVLAN tag 3.
One-to-two VLAN mapping provides the following benefits:
• Enables a customer network to plan its CVLAN assignment without conflicting with SVLANs.
• Adds a VLAN tag to a tagged packet and expands the number of available VLANs to 4094 ×
4094.
• Reduces the stress on the SVLAN resources, which were 4094 VLANs in the SP network
before the mapping process was initiated.
235
Figure 76 Basic VLAN mapping terms
SP
Network-side port
Customer-side port
Uplink traffic
Downlink traffic
236
Figure 78 Many-to-one VLAN mapping implementation
...
...
One-to-two VLAN mapping
As shown in Figure 79, one-to-two VLAN mapping is implemented on the customer-side port to add
the SVLAN tag for the uplink traffic.
For the downlink traffic to be correctly sent to the customer network, make sure the SVLAN tag is
removed on the customer-side port before transmission. Use one of the following methods to remove
the SVLAN tag from the downlink traffic:
• Configure the customer-side port as a hybrid port and assign the port to the SVLAN as an
untagged member.
• Configure the customer-side port as a trunk port and set the port PVID to the SVLAN.
Figure 79 One-to-two VLAN mapping implementation
237
Figure 80 Two-to-two VLAN mapping implementation
IMPORTANT:
Use the appropriate VLAN mapping methods for the devices in the network.
238
Step Command Remarks
1. Enter system view. system-view N/A
• Enter Layer 2 Ethernet interface
view:
interface interface-type
2. Enter Layer 2 Ethernet interface-number
interface view or Layer 2 N/A
aggregate interface view. • Enter Layer 2 aggregate
interface view:
interface bridge-aggregation
interface-number
• Set the port link type to trunk:
port link-type trunk By default, the link type of a
3. Set the link type of the port.
• Set the port link type to hybrid: port is access.
port link-type hybrid
• For the trunk port:
port trunk permit vlan
4. Assign the port to the original vlan-id-list
VLANs and the translated N/A
VLANs. • For the hybrid port:
port hybrid vlan vlan-id-list
tagged
5. Configure a one-to-one VLAN vlan mapping vlan-id By default, no VLAN mapping
mapping. translated-vlan vlan-id is configured on an interface.
239
Many-to-one VLAN mapping configuration task list
Tasks at a glance
Enabling DHCP snooping
Enabling ARP detection
Configuring the customer-side port
Configuring the network-side port
240
Step Command Remarks
• For the trunk port:
port trunk permit vlan
4. Assign the port to the original vlan-id-list
VLANs and the translated N/A
VLANs. • For the hybrid port:
port hybrid vlan vlan-id-list
tagged
241
Configuring many-to-one VLAN mapping in a network with
static IP address assignment
In a network that uses static IP addresses, configure many-to-one VLAN mapping with ARP
snooping.
The switch replaces the SVLAN tag of the downlink traffic with the associated CVLAN tag based on
the ARP snooping entry lookup.
Configuration restrictions and guidelines
When you configure many-to-one VLAN mapping in a network that uses static address assignment,
follow these restrictions and guidelines:
• Before you configure many-to-one VLAN mapping, create the original VLANs and the
translated VLANs.
• Make sure hosts in different CVLANs do not use the same IP address.
• When an IP address is no longer associated with the MAC address and VLAN in an ARP
snooping entry, wait for this entry to be aged out. You can also use the reset arp snooping ip
ip-address command to clear the entry.
• Before you modify many-to-one VLAN mapping, use the reset arp snooping vlan vlan-id
command to clear the ARP snooping entries in each CVLAN.
• To ensure correct traffic forwarding from the service provider network to the customer network,
do not configure many-to-one VLAN mapping together with uRPF. For more information about
uRPF, see Security Configuration Guide.
Configuration task list
Tasks at a glance
Enabling ARP snooping
Configuring the customer-side port
Configuring the network-side port
242
Step Command Remarks
• Enter Layer 2 Ethernet
interface view:
interface interface-type
2. Enter Layer 2 Ethernet interface-number
interface view or Layer 2 • Enter Layer 2 aggregate N/A
aggregate interface view. interface view:
interface
bridge-aggregation
interface-number
• Set the port link type to trunk:
port link-type trunk
Set the link type of the port. By default, the link type of a port is
3. • Set the port link type to
access.
hybrid:
port link-type hybrid
• For the trunk port:
port trunk permit vlan
4. Assign the port to the original vlan-id-list
VLANs and the translated N/A
VLANs. • For the hybrid port:
port hybrid vlan vlan-id-list
tagged
vlan mapping uni { range
5. Configure a many-to-one vlan-range-list | single By default, no VLAN mapping is
VLAN mapping. vlan-id-list } translated-vlan configured on an interface.
vlan-id
243
Configuring one-to-two VLAN mapping
Configure one-to-two VLAN mapping on the customer-side ports of edge devices from which
customer traffic enters SP networks, for example, on PEs 1 and 4 in Figure 75. One-to-two VLAN
mapping enables the edge devices to add an SVLAN tag to each incoming packet.
Before you configure one-to-two VLAN mapping, create the CVLAN and the SVLAN.
The MTU of an interface is 1500 bytes by default. After a VLAN tag is added to a packet, the packet
length is added by 4 bytes. As a best practice, set the MTU to a minimum of 1504 bytes for ports on
the forwarding path of the packet in the service provider network.
To configure one-to-two VLAN mapping:
244
Configuring two-to-two VLAN mapping
Configure two-to-two VLAN mapping on the customer-side port of an edge device that connects two
SP networks, for example, on PE 3 in Figure 75. Two-to-two VLAN mapping enables two sites in
different VLANs to communicate at Layer 2 across two service provider networks that use different
VLAN assignment schemes.
Before you configure two-to-two VLAN mapping, create the original VLANs and the translated
VLANs.
To configure two-to-two VLAN mapping:
Task Command
Display VLAN mapping information. display vlan mapping [ interface interface-type interface-number ]
245
• Each household subscribes to PC, VoD, and VoIP services, and obtains the IP address through
DHCP.
• On the home gateways, VLANs 1, 2, and 3 are assigned to PC, VoD, and VoIP traffic,
respectively.
To isolate traffic of the same service type from different households, configure one-to-one VLAN
mappings on the wiring-closet switches. This feature assigns one VLAN to each type of traffic from
each household.
To save VLAN resources, configure many-to-one VLAN mappings on the campus switch (Switch C).
This feature transmits the same type of traffic from different households in one VLAN. Use VLANs
501, 502, and 503 for PC, VoD, and VoIP traffic, respectively.
Table 20 VLAN mappings for each service
246
Figure 81 Network diagram
DHCP client
VLAN 1
PC
Home gateway
VLAN 2
VoD
Wiring-closet XGE1/0/3
Switch A
VLAN 1 XGE1/0/2
PC VLAN 1 -> VLAN 102 DHCP server
VLAN 2 -> VLAN 202
VLAN 3 -> VLAN 302
VLAN 2
VoD
Home gateway VLANs 101–102 -> VLAN 501
VLAN 3 VLANs 201–202 -> VLAN 502
VoIP XGE1/0/1 VLANs 301–302 -> VLAN 503
Campus switch XGE1/0/3 XGE1/0/1
Switch D
Switch C
VLAN 1 XGE1/0/2 VLANs 103–104 -> VLAN 501
PC
VLANs 203–204 -> VLAN 502
Home gateway VLANs 303–304 -> VLAN 503
VLAN 2
VoD
Distribution
VLAN 1 -> VLAN 103 network
VLAN 3 VLAN 2 -> VLAN 203
VoIP XGE1/0/1 VLAN 3 -> VLAN 303
Wiring-closet XGE1/0/3
Switch B
VLAN 1 XGE1/0/2
PC VLAN 1 -> VLAN 104
VLAN 2 -> VLAN 204
VLAN 3 -> VLAN 304
VLAN 2
VoD
Home gateway
VLAN 3
VoIP
Configuration procedure
1. Configure Switch A:
# Create the original VLANs.
<SwitchA> system-view
[SwitchA] vlan 2 to 3
# Create the translated VLANs.
[SwitchA] vlan 101 to 102
[SwitchA] vlan 201 to 202
[SwitchA] vlan 301 to 302
# Configure customer-side port Ten-GigabitEthernet 1/0/1 as a trunk port.
<SwitchA> system-view
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] port link-type trunk
247
# Assign Ten-GigabitEthernet 1/0/1 to all original VLANs and translated VLANs.
[SwitchA-Ten-GigabitEthernet1/0/1] port trunk permit vlan 1 2 3 101 201 301
# Configure one-to-one VLAN mappings on Ten-GigabitEthernet 1/0/1 to map VLANs 1, 2, and
3 to VLANs 101, 201, and 301, respectively.
[SwitchA-Ten-GigabitEthernet1/0/1] vlan mapping 1 translated-vlan 101
[SwitchA-Ten-GigabitEthernet1/0/1] vlan mapping 2 translated-vlan 201
[SwitchA-Ten-GigabitEthernet1/0/1] vlan mapping 3 translated-vlan 301
[SwitchA-Ten-GigabitEthernet1/0/1] quit
# Configure customer-side port Ten-GigabitEthernet 1/0/2 as a trunk port.
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/2 to all original VLANs and translated VLANs.
[SwitchA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 1 2 3 102 202 302
# Configure one-to-one VLAN mappings on Ten-GigabitEthernet 1/0/2 to map VLANs 1, 2, and
3 to VLANs 102, 202, and 302, respectively.
[SwitchA-Ten-GigabitEthernet1/0/2] vlan mapping 1 translated-vlan 102
[SwitchA-Ten-GigabitEthernet1/0/2] vlan mapping 2 translated-vlan 202
[SwitchA-Ten-GigabitEthernet1/0/2] vlan mapping 3 translated-vlan 302
[SwitchA-Ten-GigabitEthernet1/0/2] quit
# Configure the network-side port (Ten-GigabitEthernet 1/0/3) as a trunk port.
[SwitchA] interface ten-gigabitethernet 1/0/3
[SwitchA-Ten-GigabitEthernet1/0/3] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/3 to the translated VLANs.
[SwitchA-Ten-GigabitEthernet1/0/3] port trunk permit vlan 101 201 301 102 202 302
[SwitchA-Ten-GigabitEthernet1/0/3] quit
2. Configure Switch B in the same way Switch A is configured. (Details not shown.)
3. Configure Switch C:
# Enable DHCP snooping.
<SwitchC> system-view
[SwitchC] dhcp snooping enable
# Create the original VLANs and translated VLANs, and enable ARP detection for these
VLANs.
[SwitchC] vlan 101
[SwitchC-vlan101] arp detection enable
[SwitchC-vlan101] vlan 201
[SwitchC-vlan201] arp detection enable
[SwitchC-vlan201] vlan 301
[SwitchC-vlan301] arp detection enable
[SwitchC-vlan301] vlan 102
[SwitchC-vlan102] arp detection enable
[SwitchC-vlan102] vlan 202
[SwitchC-vlan202] arp detection enable
[SwitchC-vlan202] vlan 302
[SwitchC-vlan302] arp detection enable
[SwitchC-vlan302] vlan 103
[SwitchC-vlan103] arp detection enable
[SwitchC-vlan103] vlan 203
[SwitchC-vlan203] arp detection enable
248
[SwitchC-vlan203] vlan 303
[SwitchC-vlan303] arp detection enable
[SwitchC-vlan303] vlan 104
[SwitchC-vlan104] arp detection enable
[SwitchC-vlan104] vlan 204
[SwitchC-vlan204] arp detection enable
[SwitchC-vlan204] vlan 304
[SwitchC-vlan304] arp detection enable
[SwitchC-vlan304] vlan 501
[SwitchC-vlan501] arp detection enable
[SwitchC-vlan501] vlan 502
[SwitchC-vlan502] arp detection enable
[SwitchC-vlan502] vlan 503
[SwitchC-vlan503] arp detection enable
[SwitchC-vlan503] quit
# Configure customer-side port Ten-GigabitEthernet 1/0/1 as a trunk port.
[SwitchC] interface ten-gigabitethernet 1/0/1
[SwitchC-Ten-GigabitEthernet1/0/1] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/1 to all original VLANs and translated VLANs.
[SwitchC-Ten-GigabitEthernet1/0/1] port trunk permit vlan 101 102 201 202 301 302 501
to 503
# Configure many-to-one VLAN mappings on Ten-GigabitEthernet 1/0/1 to map VLANs for PC,
VoD, and VoIP traffic to VLANs 501, 502, and 503, respectively.
[SwitchC-Ten-GigabitEthernet1/0/1] vlan mapping uni range 101 to 102 translated-vlan
501
[SwitchC-Ten-GigabitEthernet1/0/1] vlan mapping uni range 201 to 202 translated-vlan
502
[SwitchC-Ten-GigabitEthernet1/0/1] vlan mapping uni range 301 to 302 translated-vlan
503
# Enable DHCP snooping entry recording on Ten-GigabitEthernet 1/0/1.
[SwitchC-Ten-GigabitEthernet1/0/1] dhcp snooping binding record
[SwitchC-Ten-GigabitEthernet1/0/1] quit
# Configure customer-side port Ten-GigabitEthernet 1/0/2 as a trunk port.
[SwitchC] interface ten-gigabitethernet 1/0/2
[SwitchC-Ten-GigabitEthernet1/0/2] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/2 to all original VLANs and translated VLANs.
[SwitchC-Ten-GigabitEthernet1/0/2] port trunk permit vlan 103 104 203 204 303 304 501
to 503
# Configure many-to-one VLAN mappings on Ten-GigabitEthernet 1/0/2 to map VLANs for PC,
VoD, and VoIP traffic to VLANs 501, 502, and 503, respectively.
[SwitchC-Ten-GigabitEthernet1/0/2] vlan mapping uni range 103 to 104 translated-vlan
501
[SwitchC-Ten-GigabitEthernet1/0/2] vlan mapping uni range 203 to 204 translated-vlan
502
[SwitchC-Ten-GigabitEthernet1/0/2] vlan mapping uni range 303 to 304 translated-vlan
503
# Enable recording of client information in DHCP snooping entries on Ten-GigabitEthernet
1/0/2.
[SwitchC-Ten-GigabitEthernet1/0/2] dhcp snooping binding record
249
[SwitchC-Ten-GigabitEthernet1/0/2] quit
# Configure the network-side port (Ten-GigabitEthernet 1/0/3) to use the original VLAN tags of
the many-to-one mappings to replace the VLAN tags of the packets destined for the user
network.
[SwitchC] interface ten-gigabitethernet 1/0/3
[SwitchC-Ten-GigabitEthernet1/0/3] vlan mapping nni
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port.
[SwitchC-Ten-GigabitEthernet1/0/3] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/3 to the translated VLANs.
[SwitchC-Ten-GigabitEthernet1/0/3] port trunk permit vlan 501 to 503
# Configure Ten-GigabitEthernet 1/0/3 as a DHCP snooping trusted and ARP trusted port.
[SwitchC-Ten-GigabitEthernet1/0/3] dhcp snooping trust
[SwitchC-Ten-GigabitEthernet1/0/3] arp detection trust
[SwitchC-Ten-GigabitEthernet1/0/3] quit
4. Configure Switch D:
# Create the translated VLANs.
<SwitchD> system-view
[SwitchD] vlan 501 to 503
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port.
<SwitchD> system-view
[SwitchD] interface ten-gigabitethernet 1/0/1
[SwitchD-Ten-GigabitEthernet1/0/1] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/1 to the translated VLANs.
[SwitchD-Ten-GigabitEthernet1/0/1] port trunk permit vlan 501 to 503
[SwitchD-Ten-GigabitEthernet1/0/1] quit
250
103-104 N/A 501 N/A
203-204 N/A 502 N/A
303-304 N/A 503 N/A
Configuration procedure
1. Configure PE 1:
# Create VLANs 5 and 100.
<PE1> system-view
[PE1] vlan 5
[PE1-vlan5] quit
[PE1] vlan 100
[PE1-vlan100] quit
# Configure a one-to-two VLAN mapping on the customer-side port (Ten-GigabitEthernet 1/0/1)
to add SVLAN tag 100 to packets from VLAN 5.
[PE1] interface ten-gigabitethernet 1/0/1
[PE1-Ten-GigabitEthernet1/0/1] vlan mapping nest single 5 nested-vlan 100
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port.
[PE1-Ten-GigabitEthernet1/0/1] port link-type hybrid
# Assign Ten-GigabitEthernet 1/0/1 to VLAN 5 as a tagged member.
[PE1-Ten-GigabitEthernet1/0/1] port hybrid vlan 5 tagged
251
# Assign Ten-GigabitEthernet 1/0/1 to VLAN 100 as an untagged member.
[PE1-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 untagged
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure the network-side port (Ten-GigabitEthernet 1/0/2) as a trunk port.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/2 to VLAN 100.
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[PE1-Ten-GigabitEthernet1/0/2] quit
2. Configure PE 2:
# Create VLAN 100.
<PE2> system-view
[PE2] vlan 100
[PE2-vlan100] quit
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port.
[PE2] interface ten-gigabitethernet 1/0/1
[PE2-Ten-GigabitEthernet1/0/1] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/1 to VLAN 100.
[PE2-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[PE2-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port.
[PE2] interface ten-gigabitethernet 1/0/2
[PE2-Ten-GigabitEthernet1/0/2] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/2 to VLAN 100.
[PE2-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[PE2-Ten-GigabitEthernet1/0/2] quit
3. Configure PE 3:
# Create VLANs 5, 6, 100, and 200.
<PE3> system-view
[PE3] vlan 5 to 6
[PE3] vlan 100
[PE3-vlan100] quit
[PE3] vlan 200
[PE3-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port.
[PE3] interface ten-gigabitethernet 1/0/1
[PE3-Ten-GigabitEthernet1/0/1] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/1 to VLANs 100 and 200.
[PE3-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 200
# Configure a two-to-two VLAN mapping on Ten-GigabitEthernet 1/0/1 to map SVLAN 100 and
CVLAN 5 to SVLAN 200 and CVLAN 6.
[PE3-Ten-GigabitEthernet1/0/1] vlan mapping tunnel 100 5 translated-vlan 200 6
[PE3-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port.
[PE3] interface ten-gigabitethernet 1/0/2
[PE3-Ten-GigabitEthernet1/0/2] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/2 to VLAN 200.
252
[PE3-Ten-GigabitEthernet1/0/2] port trunk permit vlan 200
[PE3-Ten-GigabitEthernet1/0/2] quit
4. Configure PE 4:
# Create VLANs 6 and 200.
<PE4> system-view
[PE4] vlan 6
[PE4-vlan6] quit
[PE4] vlan 200
[PE4-vlan200] quit
# Configure the network-side port (Ten-GigabitEthernet 1/0/1) as a trunk port.
[PE4] interface ten-gigabitethernet 1/0/1
[PE4-Ten-GigabitEthernet1/0/1] port link-type trunk
# Assign Ten-GigabitEthernet 1/0/1 to VLAN 200.
[PE4-Ten-GigabitEthernet1/0/1] port trunk permit vlan 200
[PE4-Ten-GigabitEthernet1/0/1] quit
# Configure the customer-side port (Ten-GigabitEthernet 1/0/2) as a hybrid port.
[PE4] interface ten-gigabitethernet 1/0/2
[PE4-Ten-GigabitEthernet1/0/2] port link-type hybrid
# Assign Ten-GigabitEthernet 1/0/2 to VLAN 6 as a tagged member.
[PE4-Ten-GigabitEthernet1/0/2] port hybrid vlan 6 tagged
# Assign Ten-GigabitEthernet 1/0/2 to VLAN 200 as an untagged member.
[PE4-Ten-GigabitEthernet1/0/2] port hybrid vlan 200 untagged
# Configure a one-to-two VLAN mapping on Ten-GigabitEthernet 1/0/2 to add SVLAN tag 200
to packets from VLAN 6.
[PE4-Ten-GigabitEthernet1/0/2] vlan mapping nest single 6 nested-vlan 200
[PE4-Ten-GigabitEthernet1/0/2] quit
253
Configuring LLDP
Overview
In a heterogeneous network, a standard configuration exchange platform ensures that different
types of network devices from different vendors can discover one another and exchange
configuration.
The Link Layer Discovery Protocol (LLDP) is specified in IEEE 802.1AB. The protocol operates on
the data link layer to exchange device information between directly connected devices. With LLDP, a
device sends local device information as TLV (type, length, and value) triplets in LLDP Data Units
(LLDPDUs) to the directly connected devices. Local device information includes its system
capabilities, management IP address, device ID, port ID, and so on. The device stores the device
information in LLDPDUs from the LLDP neighbors in a standard MIB. For more information about
MIBs, see Network Management and Monitoring Configuration Guide. LLDP enables a network
management system to quickly detect and identify Layer 2 network topology changes.
Basic concepts
LLDP agent
An LLDP agent is a mapping of an entity where LLDP runs. Multiple LLDP agents can run on the
same interface.
LLDP agents are divided into the following types:
• Nearest bridge agent.
• Nearest customer bridge agent.
• Nearest non-TPMR bridge agent.
A Two-port MAC Relay (TPMR) is a type of bridge that has only two externally-accessible bridge
ports. It supports a subset of the features of a MAC bridge. A TPMR is transparent to all frame-based
media-independent protocols except for the following protocols:
• Protocols destined to it.
• Protocols destined to reserved MAC addresses that the relay feature of the TPMR is configured
not to forward.
LLDP exchanges packets between neighbor agents and creates and maintains neighbor information
for them. Figure 83 shows the neighbor relationships for these LLDP agents. LLDP has two bridge
modes: customer bridge (CB) and service bridge (SB).
Figure 83 LLDP neighbor relationships
254
LLDP frame formats
LLDP sends device information in LLDP frames. LLDP frames are encapsulated in Ethernet II or
Subnetwork Access Protocol (SNAP) frames.
• LLDP frame encapsulated in Ethernet II
Figure 84 Ethernet II-encapsulated LLDP frame
Field Description
MAC address to which the LLDP frame is advertised. LLDP specifies
different multicast MAC addresses as destination MAC addresses for
LLDP frames destined for agents of different types. This helps
distinguish between LLDP frames sent and received by different agent
types on the same interface. The destination MAC address is fixed to
one of the following multicast MAC addresses:
Destination MAC address • 0x0180-c200-000E for LLDP frames destined for nearest bridge
agents.
• 0x0180-c200-0000 for LLDP frames destined for nearest customer
bridge agents.
• 0x0180-c200-0003 for LLDP frames destined for nearest
non-TPMR bridge agents.
Source MAC address MAC address of the sending port.
Type Ethernet type for the upper-layer protocol. This field is 0x88CC for LLDP.
Data LLDPDU.
Frame check sequence, a 32-bit CRC value used to determine the
FCS
validity of the received Ethernet frame.
255
Figure 85 SNAP-encapsulated LLDP frame
Field Description
MAC address to which the LLDP frame is advertised. It is the same as
Destination MAC address
that for Ethernet II-encapsulated LLDP frames.
Source MAC address MAC address of the sending port.
SNAP type for the upper-layer protocol. This field is
Type
0xAAAA-0300-0000-88CC for LLDP.
Data LLDPDU.
Frame check sequence, a 32-bit CRC value used to determine the
FCS
validity of the received Ethernet frame.
LLDPDUs
LLDP uses LLDPDUs to exchange information. An LLDPDU comprises multiple TLVs. Each TLV
carries a type of device information, as shown in Figure 86.
Figure 86 LLDPDU encapsulation format
An LLDPDU can carry up to 32 types of TLVs. Mandatory TLVs include Chassis ID TLV, Port ID TLV,
and Time to Live TLV. Other TLVs are optional.
TLVs
A TLV is an information element that contains the type, length, and value fields.
LLDPDU TLVs include the following categories:
• Basic management TLVs
• Organizationally (IEEE 802.1 and IEEE 802.3) specific TLVs
• LLDP-MED (media endpoint discovery) TLVs
Basic management TLVs are essential to device management.
Organizationally specific TLVs and LLDP-MED TLVs are used for enhanced device management.
They are defined by standardization or other organizations and are optional for LLDPDUs.
• Basic management TLVs
Table 23 lists the basic management TLV types. Some of them are mandatory for LLDPDUs.
256
Table 23 Basic management TLVs
Type Description
Port VLAN ID (PVID) Specifies the port VLAN identifier.
Port And Protocol VLAN ID Indicates whether the device supports protocol VLANs and, if so, what
(PPVID) VLAN IDs these protocols will be associated with.
VLAN Name Specifies the textual name of any VLAN to which the port belongs.
Protocol Identity Indicates protocols supported on the port.
Data center bridging exchange protocol.
DCBX NOTE:
Switches of this series do not support DCBX TLVs.
Edge Virtual Bridging module, including EVB TLV and CDCP TLV.
EVB module NOTE:
Switches of this series do not support EVB TLVs.
Indicates whether the port supports link aggregation, and if yes,
Link Aggregation
whether link aggregation is enabled.
Management VID Management VLAN ID.
VID Usage Digest VLAN ID usage digest.
ETS Configuration Enhanced Transmission Selection configuration.
ETS Recommendation ETS recommendation.
PFC Priority-based Flow Control.
APP Application protocol.
257
Type Description
QCN Quantized Congestion Notification.
NOTE:
• HPE devices support only receiving protocol identity TLVs and VID usage digest TLVs.
• Layer 3 Ethernet ports support only link aggregation TLVs.
Type Description
Contains the bit-rate and duplex capabilities of the port, support
MAC/PHY Configuration/Status for autonegotiation, enabling status of autonegotiation, and the
current rate and duplex mode.
Contains the power supply capabilities of the port:
• Port class (PSE or PD).
• Power supply mode.
• Whether PSE power supply is supported.
• Whether PSE power supply is enabled.
Power Via MDI • Whether pair selection can be controlled.
• Power supply type.
• Power source.
• Power priority.
• PD requested power.
• PSE allocated power.
Maximum Frame Size Indicates the supported maximum frame size.
Indicates the power state control configured on the sending
port, including the following:
Power Stateful Control • Power supply mode of the PSE/PD.
• PSE/PD priority.
• PSE/PD power.
Energy-Efficient Ethernet Indicates Energy Efficient Ethernet (EEE).
NOTE:
The Power Stateful Control TLV is defined in IEEE P802.3at D1.0 and is not supported in later
versions. HPE devices send this type of TLVs only after receiving them.
• LLDP-MED TLVs
LLDP-MED TLVs provide multiple advanced applications for voice over IP (VoIP), such as
basic configuration, network policy configuration, and address and directory management.
LLDP-MED TLVs provide a cost-effective and easy-to-use solution for deploying voice devices
in Ethernet. LLDP-MED TLVs are shown in Table 26.
Table 26 LLDP-MED TLVs
Type Description
Allows a network device to advertise the LLDP-MED TLVs that it
LLDP-MED Capabilities
supports.
258
Type Description
Allows a network device or terminal device to advertise the
Network Policy VLAN ID of a port, the VLAN type, and the Layer 2 and Layer 3
priorities for specific applications.
Allows a network device or terminal device to advertise power
Extended Power-via-MDI supply capability. This TLV is an extension of the Power Via MDI
TLV.
Hardware Revision Allows a terminal device to advertise its hardware version.
Firmware Revision Allows a terminal device to advertise its firmware version.
Software Revision Allows a terminal device to advertise its software version.
Serial Number Allows a terminal device to advertise its serial number.
Manufacturer Name Allows a terminal device to advertise its vendor name.
Model Name Allows a terminal device to advertise its model name.
Allows a terminal device to advertise its asset ID. The typical
Asset ID case is that the user specifies the asset ID for the endpoint to
facilitate directory management and asset tracking.
Allows a network device to advertise the appropriate location
Location Identification identifier information for a terminal device to use in the context of
location-based applications.
NOTE:
• If the MAC/PHY configuration/status TLV is not advertisable, none of the LLDP-MED TLVs
will be advertised even if they are advertisable.
• If the LLDP-MED capabilities TLV is not advertisable, the other LLDP-MED TLVs will not be
advertised even if they are advertisable.
Management address
The network management system uses the management address of a device to identify and manage
the device for topology maintenance and network management. The management address is
encapsulated in the management address TLV.
Working mechanism
LLDP operating modes
An LLDP agent can operate in one of the following modes:
• TxRx mode—An LLDP agent in this mode can send and receive LLDP frames.
• Tx mode—An LLDP agent in this mode can only send LLDP frames.
• Rx mode—An LLDP agent in this mode can only receive LLDP frames.
• Disable mode—An LLDP agent in this mode cannot send or receive LLDP frames.
Each time the LLDP operating mode of an LLDP agent changes, its LLDP protocol state machine
reinitializes. A configurable reinitialization delay prevents frequent initializations caused by frequent
changes to the operating mode. If you configure the reinitialization delay, an LLDP agent must wait
the specified amount of time to initialize LLDP after the LLDP operating mode changes.
Transmitting LLDP frames
An LLDP agent operating in TxRx mode or Tx mode sends LLDP frames to its directly connected
devices both periodically and when the local configuration changes. To prevent LLDP frames from
overwhelming the network during times of frequent changes to local device information, LLDP uses
259
the token bucket mechanism to rate limit LLDP frames. For more information about the token bucket
mechanism, see ACL and QoS Configuration Guide.
LLDP automatically enables the fast LLDP frame transmission mechanism in either of the following
cases:
• A new LLDP frame is received and carries device information new to the local device.
• The LLDP operating mode of the LLDP agent changes from Disable or Rx to TxRx or Tx.
The fast LLDP frame transmission mechanism successively sends the specified number of LLDP
frames at a configurable fast LLDP frame transmission interval. The mechanism helps LLDP
neighbors discover the local device as soon as possible. Then, the normal LLDP frame transmission
interval resumes.
Receiving LLDP frames
An LLDP agent operating in TxRx mode or Rx mode confirms the validity of TLVs carried in every
received LLDP frame. If the TLVs are valid, the LLDP agent saves the information and starts an
aging timer. The initial value of the aging timer is equal to the TTL value in the Time To Live TLV
carried in the LLDP frame. When the LLDP agent receives a new LLDP frame, the aging timer
restarts. When the aging timer decreases to zero, all saved information ages out.
260
Performing basic LLDP configurations
Enabling LLDP
To make LLDP take effect on specific ports, you must enable LLDP both globally and on these ports.
To use LLDP together with OpenFlow, you must enable LLDP globally on OpenFlow switches. To
prevent LLDP from affecting topology discovery of OpenFlow controllers, disable LLDP on ports of
OpenFlow instances. For more information about OpenFlow, see OpenFlow Configuration Guide.
To enable LLDP:
NOTE:
An LLDP-enabled IRF physical interface supports only the nearest bridge agents.
261
Step Command Remarks
2. Enter Layer 2/Layer 3
Ethernet interface view,
management Ethernet
interface view, Layer interface interface-type
N/A
2/Layer 3 aggregate interface-number
interface view, or IRF
physical interface view.
By default:
• The nearest bridge agent
• In Layer 2/Layer 3 Ethernet operates in txrx mode.
interface view or management
• The nearest customer
Ethernet interface view:
bridge agent and nearest
lldp [ agent { nearest-customer
non-TPMR bridge agent
| nearest-nontpmr } ]
operate in disable mode.
admin-status { disable | rx | tx |
txrx } In Ethernet interface view, if you
3. Set the LLDP operating • In Layer 2/Layer 3 aggregate do not specify an agent type, the
mode. interface view: command sets the operating
lldp agent { nearest-customer | mode for nearest bridge agents.
nearest-nontpmr } In aggregate interface view, you
admin-status { disable | rx | tx | can set the operating mode only
txrx } for nearest customer bridge
• In IRF physical interface view: agents and nearest non-TPMR
lldp admin-status { disable | rx | bridge agents.
tx | txrx } In IRF physical interface view,
you can set the operating mode
only for nearest bridge agents.
262
Step Command Remarks
2. Enter Layer 2/Layer 3
Ethernet interface view,
management Ethernet interface interface-type
interface view, Layer 2/Layer N/A
interface-number
3 aggregate interface view, or
IRF physical interface view.
• In Layer 2/Layer 3 Ethernet
interface view or management
Ethernet interface view:
lldp [ agent { nearest-customer |
nearest-nontpmr } ]
check-change-interval interval
3. Enable LLDP polling and set • In Layer 2/Layer 3 aggregate By default, LLDP polling is
the polling interval. interface view: disabled.
lldp agent { nearest-customer |
nearest-nontpmr }
check-change-interval interval
• In IRF physical interface view:
lldp check-change-interval
interval
263
Step Command Remarks
• lldp tlv-enable { basic-tlv { all |
port-description |
system-capability |
system-description |
system-name |
management-address-tlv
[ ipv6 ] [ ip-address ] } | dot1-tlv
{ all | congestion-notification |
port-vlan-id | link-aggregation
| protocol-vlan-id [ vlan-id ] |
vlan-name [ vlan-id ] |
management-vid [ mvlan-id ] } |
dot3-tlv { all | mac-physic |
max-frame-size | power } |
med-tlv { all | capability | By default:
inventory | network-policy • Nearest bridge agents can
[ vlan-id ] | advertise all LLDP TLVs
power-over-ethernet | except the location
location-id { civic-address identification, port and
device-type country-code protocol VLAN ID, VLAN
{ ca-type ca-value }&<1-10> | name, and management
3. Configure the advertisable elin-address tel-number } } } VLAN ID TLVs.
TLVs (in Layer 2 Ethernet
• lldp agent nearest-nontpmr • Nearest non-TPMR bridge
interface view).
tlv-enable { basic-tlv { all | agents do not advertise
port-description | TLVs.
system-capability |
• Nearest customer bridge
system-description |
agents can advertise basic
system-name |
TLVs and IEEE 802.1
management-address-tlv
organizationally specific
[ ipv6 ] [ ip-address ] } | dot1-tlv
TLVs.
{ all | congestion-notification |
port-vlan-id |
link-aggregation } }
• lldp agent nearest-customer
tlv-enable { basic-tlv { all |
port-description |
system-capability |
system-description |
system-name |
management-address-tlv
[ ipv6 ] [ ip-address ] } | dot1-tlv
{ all | congestion-notification |
port-vlan-id |
link-aggregation } }
264
Step Command Remarks
• lldp tlv-enable { basic-tlv { all |
port-description |
system-capability |
system-description |
system-name |
management-address-tlv
[ ipv6 ] [ ip-address | interface By default:
loopback interface-number ] } | • Nearest bridge agents can
dot1-tlv { all | advertise all types of LLDP
link-aggregation } | dot3-tlv TLVs (only link aggregation
{ all | mac-physic | TLV is supported in 802.1
max-frame-size | power } | organizationally specific
med-tlv { all | capability | TLVs) except the network
4. Configure the advertisable inventory | policy TLV.
TLVs (in Layer 3 Ethernet power-over-ethernet | • Nearest non-TPMR bridge
interface view). location-id { civic-address agents do not advertise
device-type country-code TLVs.
{ ca-type ca-value }&<1-10> |
elin-address tel-number } } } • Nearest customer bridge
agents can advertise basic
• lldp agent { nearest-nontpmr | TLVs and IEEE 802.1
nearest-customer } tlv-enable organizationally specific
{ basic-tlv { all | TLVs (only link aggregation
port-description | TLV is supported).
system-capability |
system-description |
system-name |
management-address-tlv
[ ipv6 ] [ ip-address ] } | dot1-tlv
{ all | link-aggregation } }
• lldp tlv-enable { basic-tlv { all |
port-description |
system-capability |
system-description |
system-name |
management-address-tlv By default:
[ ipv6 ] [ ip-address ] } | dot1-tlv • Nearest bridge agents can
{ all | link-aggregation } | advertise all types of LLDP
dot3-tlv { all | mac-physic | TLVs (only link aggregation
max-frame-size | power } | TLV is supported in 802.1
med-tlv { all | capability | organizationally specific
inventory | TLVs) except the network
5. Configure the advertisable power-over-ethernet | policy TLV.
TLVs (in management location-id { civic-address • Nearest non-TPMR bridge
Ethernet interface view). device-type country-code agents do not advertise
{ ca-type ca-value }&<1-10> | TLVs.
elin-address tel-number } } }
• Nearest customer bridge
• lldp agent { nearest-nontpmr | agents can advertise basic
nearest-customer } tlv-enable TLVs and IEEE 802.1
{ basic-tlv { all | organizationally specific
port-description | TLVs (only link aggregation
system-capability | TLV is supported).
system-description |
system-name |
management-address-tlv
[ ipv6 ] [ ip-address ] } | dot1-tlv
{ all | link-aggregation } }
265
Step Command Remarks
• lldp agent nearest-nontpmr
tlv-enable { basic-tlv { all |
management-address-tlv
[ ipv6 ] [ ip-address ] | By default:
port-description | • Nearest non-TPMR bridge
system-capability | agents do not advertise
system-description | TLVs.
system-name } | dot1-tlv { all | • Nearest customer bridge
port-vlan-id } } agents can advertise basic
• lldp agent nearest-customer TLVs and IEEE 802.1
6. Configure the advertisable
tlv-enable { basic-tlv { all | organizationally specific
TLVs (in Layer 2 aggregate
interface view).
management-address-tlv TLVs (only port and
[ ipv6 ] [ ip-address ] | protocol VLAN ID, VLAN
port-description | name, and management
system-capability | VLAN ID TLVs are
system-description | supported).
system-name } | dot1-tlv { all |
Nearest bridge agents are not
port-vlan-id } }
supported on Layer 2 aggregate
• lldp tlv-enable dot1-tlv interfaces.
{ protocol-vlan-id [ vlan-id ] |
vlan-name [ vlan-id ] |
management-vid [ mvlan-id ] }
By default:
lldp agent { nearest-nontpmr | • Nearest non-TPMR bridge
nearest-customer } tlv-enable agents do not advertise
basic-tlv { all | TLVs.
7. Configure the advertisable
TLVs (in Layer 3 aggregate management-address-tlv [ ipv6 ] • Nearest customer bridge
interface view). [ ip-address ] | port-description | agents can advertise only
system-capability | basic TLVs.
system-description |
Nearest bridge agents are not
system-name }
supported on Layer 3 aggregate
interfaces.
An LLDP-enabled IRF physical
lldp tlv-enable basic-tlv interface supports only the
8. Configure the advertisable { port-description | nearest bridge agent.
TLVs (in IRF physical system-capability |
interface view). system-description | By default, nearest bridge
system-name } agents can advertise all types of
LLDP TLVs.
266
Step Command Remarks
2. Enter Layer 2/Layer 3
Ethernet interface view,
management Ethernet interface interface-type
interface view, or Layer N/A
interface-number
2/Layer 3 aggregate
interface view.
• In Layer 2 Ethernet interface
view or management Ethernet
interface view:
lldp [ agent
{ nearest-customer |
nearest-nontpmr } ] tlv-enable By default:
basic-tlv • Nearest bridge agents
management-address-tlv and nearest customer
[ ipv6 ] [ ip-address ] bridge agents can
• In Layer 3 Ethernet interface advertise the
3. Allow LLDP to advertise the view: management address in
management address in lldp [ agent LLDP frames.
LLDP frames and configure { nearest-customer | • Nearest non-TPMR
the advertised management nearest-nontpmr } ] tlv-enable bridge agents cannot
address. basic-tlv advertise the
management-address-tlv management address in
[ ipv6 ] [ ip-address ] | interface LLDP frames.
loopback interface-number ]
The device supports only the
• In Layer 2/Layer 3 aggregate numeric encoding format for
interface view: IPv6 management addresses.
lldp agent { nearest-customer
| nearest-nontpmr } tlv-enable
basic-tlv
management-address-tlv
[ ipv6 ] [ ip-address ]
• In Layer 2/Layer 3 Ethernet
interface view or management
Ethernet interface view:
lldp [ agent
{ nearest-customer |
nearest-nontpmr } ]
4. Set the encoding format of management-address-format By default, the encoding
the management address to string format of the management
string. address is numeric.
• In Layer 2/Layer 3 aggregate
interface view:
lldp agent { nearest-customer
| nearest-nontpmr }
management-address-format
string
267
Step Command Remarks
1. Enter system view. system-view N/A
2. Set the TTL multiplier. lldp hold-multiplier value The default setting is 4.
3. Set the LLDP frame The default setting is 30
transmission interval. lldp timer tx-interval interval
seconds.
4. Set the token bucket size for
sending LLDP frames. lldp max-credit credit-value The default setting is 5.
268
Disabling LLDP PVID inconsistency check
By default, when the system receives an LLDP packet, it compares the PVID value contained in
packet with the PVID configured on the receiving interface. If the two PVIDs do not match, a log
message will be printed to notify the user.
You can disable PVID inconsistency check if different PVIDs are required on a link.
To disable LLDP PVID inconsistency check:
269
Configuration prerequisites
Before you configure CDP compatibility, complete the following tasks:
• Globally enable LLDP.
• Enable LLDP on the port connecting to a CDP device.
• Configure LLDP to operate in TxRx mode on the port.
Configuration procedure
CDP-compatible LLDP operates in one of the following modes:
• TxRx—CDP packets can be transmitted and received.
• Rx—CDP packets can be received but cannot be transmitted.
• Disable—CDP packets cannot be transmitted or received.
To make CDP-compatible LLDP take effect on a port, follow these steps:
1. Enable CDP-compatible LLDP globally.
2. Configure CDP-compatible LLDP to operate in TxRx mode on the port.
The maximum TTL value that CDP allows is 255 seconds. To make CDP-compatible LLDP work
correctly with CDP devices, configure the LLDP frame transmission interval to be no more than 1/3 of
the TTL value.
To configure LLDP to be compatible with CDP:
270
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2/Layer 3
Ethernet interface view,
management Ethernet
interface view, Layer interface interface-type interface-number N/A
2/Layer 3 aggregate
interface view, or IRF
physical interface view.
• In Layer 2/Layer 3 Ethernet interface
view or management Ethernet
interface view:
lldp [ agent { nearest-customer |
nearest-nontpmr } ] notification
remote-change enable
• In Layer 2/Layer 3 aggregate interface By default, LLDP trapping
3. Enable LLDP trapping.
view: is disabled.
lldp agent { nearest-customer |
nearest-nontpmr } notification
remote-change enable
• In IRF physical interface view:
lldp notification remote-change
enable
4. Enable LLDP-MED
trapping (in Layer 2/Layer
3 Ethernet interface view lldp notification med-topology-change By default, LLDP-MED
or management Ethernet enable trapping is disabled.
interface view).
5. Return to system view. quit N/A
6. (Optional.) Set the LLDP The default setting is 30
trap transmission interval. lldp timer notification-interval interval
seconds.
Task Command
Display local LLDP display lldp local-information [ global | interface interface-type
information. interface-number ]
Display the information
display lldp neighbor-information [ [ [ interface interface-type
contained in the LLDP
interface-number ] [ agent { nearest-bridge | nearest-customer |
TLVs sent from
nearest-nontpmr } ] [ verbose ] ] | list [ system-name system-name ] ]
neighboring devices.
display lldp statistics [ global | [ interface interface-type interface-number ]
Display LLDP statistics.
[ agent { nearest-bridge | nearest-customer | nearest-nontpmr } ] ]
Display LLDP status of a display lldp status [ interface interface-type interface-number ] [ agent
port. { nearest-bridge | nearest-customer | nearest-nontpmr } ]
Display types of
display lldp tlv-config [ interface interface-type interface-number ] [ agent
advertisable optional LLDP
{ nearest-bridge | nearest-customer | nearest-nontpmr } ]
TLVs.
271
LLDP configuration examples
Basic LLDP configuration example
Network requirements
As shown in Figure 87, enable LLDP globally on Switch A and Switch B to perform the following
tasks:
• Monitor the link between Switch A and Switch B on the NMS.
• Monitor the link between Switch A and the MED device on the NMS.
Figure 87 Network diagram
Configuration procedure
1. Configure Switch A:
# Enable LLDP globally.
<SwitchA> system-view
[SwitchA] lldp global enable
# Enable LLDP on Ten-GigabitEthernet 1/0/1. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] lldp enable
# Set the LLDP operating mode to Rx on Ten-GigabitEthernet 1/0/1.
[SwitchA-Ten-GigabitEthernet1/0/1] lldp admin-status rx
[SwitchA-Ten-GigabitEthernet1/0/1] quit
# Enable LLDP on Ten-GigabitEthernet 1/0/2. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] lldp enable
# Set the LLDP operating mode to Rx on Ten-GigabitEthernet 1/0/2.
[SwitchA-Ten-GigabitEthernet1/0/2] lldp admin-status rx
[SwitchA-Ten-GigabitEthernet1/0/2] quit
2. Configure Switch B:
# Enable LLDP globally.
<SwitchB> system-view
[SwitchB] lldp global enable
# Enable LLDP on Ten-GigabitEthernet 1/0/1. By default, LLDP is enabled on ports.
[SwitchB] interface ten-gigabitethernet 1/0/1
[SwitchB-Ten-GigabitEthernet1/0/1] lldp enable
# Set the LLDP operating mode to Tx on Ten-GigabitEthernet 1/0/1.
[SwitchB-Ten-GigabitEthernet1/0/1] lldp admin-status tx
272
[SwitchB-Ten-GigabitEthernet1/0/1] quit
273
Port status of LLDP : Enable
Admin status : Rx_Only
Trap flag : No
MED trap flag : No
Polling interval : 0s
Number of LLDP neighbors : 1
Number of MED neighbors : 0
Number of CDP neighbors : 0
Number of sent optional TLV : 21
Number of received unknown TLV : 3
274
LLDP status information of port 1 [Ten-GigabitEthernet1/0/1]:
LLDP agent nearest-bridge:
Port status of LLDP : Enable
Admin status : Rx_Only
Trap flag : No
MED trap flag : No
Polling interval : 0s
Number of LLDP neighbors : 1
Number of MED neighbors : 1
Number of CDP neighbors : 0
Number of sent optional TLV : 0
Number of received unknown TLV : 5
275
Number of sent optional TLV : 1
Number of received unknown TLV : 0
Configuration procedure
1. Configure a voice VLAN on Switch A:
# Create VLAN 2.
<SwitchA> system-view
[SwitchA] vlan 2
[SwitchA-vlan2] quit
# Set the link type of Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to trunk, and
enable voice VLAN on them.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/1] voice vlan 2 enable
[SwitchA-Ten-GigabitEthernet1/0/1] quit
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/2] voice vlan 2 enable
[SwitchA-Ten-GigabitEthernet1/0/2] quit
2. Configure CDP-compatible LLDP on Switch A:
276
# Enable LLDP globally, and enable CDP compatibility globally.
[SwitchA] lldp global enable
[SwitchA] lldp compliance cdp
# Enable LLDP on Ten-GigabitEthernet 1/0/1. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] lldp enable
# Configure LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/1.
[SwitchA-Ten-GigabitEthernet1/0/1] lldp admin-status txrx
# Configure CDP-compatible LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/1.
[SwitchA-Ten-GigabitEthernet1/0/1] lldp compliance admin-status cdp txrx
[SwitchA-Ten-GigabitEthernet1/0/1] quit
# Enable LLDP on Ten-GigabitEthernet 1/0/2. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] lldp enable
# Configure LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/2.
[SwitchA-Ten-GigabitEthernet1/0/2] lldp admin-status txrx
# Configure CDP-compatible LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/2.
[SwitchA-Ten-GigabitEthernet1/0/2] lldp compliance admin-status cdp txrx
[SwitchA-Ten-GigabitEthernet1/0/2] quit
277
Configuring L2PT
Overview
Layer 2 Protocol Tunneling (L2PT) can transparently send Layer 2 protocol packets from
geographically dispersed customer networks across a service provider network.
Background
Dedicated lines are used in a service provider network to build user-specific Layer 2 networks. As a
result, a customer network contains sites located at different sides of the service provider network.
As shown in Figure 89, Customer A's network is divided into network 1 and network 2, which are
connected by the service provider network. For Customer A's network to implement Layer 2 protocol
calculations, the Layer 2 protocol packets must be transmitted across the service provider network.
Upon receiving a Layer 2 protocol packet, the PEs cannot determine whether the packet is from the
customer network or the service provider network. They must deliver the packet to the CPU for
processing. In this case, the Layer 2 protocol calculation in Customer A's network is mixed with the
Layer 2 protocol calculation in the service provider network. Neither the customer network nor the
service provider network can implement independent Layer 2 protocol calculations.
Figure 89 L2PT application scenarios
L2PT is introduced to resolve the problem. L2PT provides the following functions:
• Multicasts Layer 2 protocol packets from a customer network in a VLAN. Dispersed customer
networks can complete an independent Layer 2 protocol calculation, which is transparent to the
service provider network.
• Isolates Layer 2 protocol packets from different customer networks through different VLANs.
HPE devices support L2PT for the following protocols:
• CDP.
• DLDP.
• EOAM.
• GVRP.
• LACP.
• LLDP.
• MVRP.
• PAgP.
278
• PVST.
• STP (including STP, RSTP, and MSTP).
• UDLD.
• VTP.
Customer Customer
Service provider network
network network
For example, as shown in Figure 91, PE 1 receives an STP packet (BPDU) from network 1 to
network 2. CEs are the edge devices on the customer network, and PEs are the edge devices on the
service provider network. L2PT processes the packet as follows:
1. PE 1 performs the following operations:
a. Changes the packet's destination multicast MAC address 0180-c200-0000 to a specified
multicast MAC address (010f-e200-0003 by default) for the BPDU.
b. Sends the tunneled packet out of all ISP-facing ports in the packet's VLAN.
2. Upon receiving the tunneled packet, PE 2 decapsulates the packet and sends the BPDU to CE
2.
Through L2PT, both the ISP network and Customer A's network can perform independent spanning
tree calculations.
279
Figure 91 L2PT network diagram
Enabling L2PT
Restrictions and guidelines
• Before you enable L2PT for a Layer 2 protocol on a port, perform the following tasks:
{ Enable the protocol on the connected CE, and disable the protocol on the port.
{ Enable L2PT on PE ports connected to a customer network. If you enable L2PT on ports
connected to the service provider network, L2PT determines that the ports are connected to
a customer network.
{ Make sure the VLAN tags of Layer 2 protocol packets are not changed or deleted for the
tunneled packets to be transmitted correctly across the service provider network.
• L2PT for LLDP supports LLDP packets from only nearest bridge agents.
• You can enable L2PT on a member port of a Layer 2 aggregation group, but the configuration
does not take effect.
• Do not enable L2PT on a port that is going to join a service loopback group. All configuration is
removed after the port joins the group.
• LACP and EOAM require point-to-point transmission. If you enable L2PT for LACP or EOAM,
L2PT multicasts LACP or EOAM packets out of customer-facing ports. As a result, the
transmission between two CEs is not point-to-point. To ensure point-to-point transmission for
the LACP or EOAM packets, you must configure other features (for example, VLAN).
280
Step Command Remarks
• Enter Layer 2 Ethernet interface view:
interface interface-type interface-number
2. Enter interface view. • Enter Layer 2 aggregate interface view: N/A
interface bridge-aggregation interface-type
interface-number
• In Layer 2 Ethernet interface view:
l2protocol { cdp | dldp | eoam | gvrp | lacp | lldp
| mvrp | pagp | pvst | stp | udld | vtp } tunnel By default, L2PT is
3. Enable L2PT for a dot1q
protocol. disabled for all
• In Layer 2 aggregate interface view: protocols.
l2protocol { gvrp | mvrp | pvst | stp | vtp }
tunnel dot1q
Task Command
display l2protocol statistics [ interface interface-type
Display L2PT statistics.
interface-number ]
reset l2protocol statistics [ interface interface-type
Clear L2PT statistics.
interface-number ]
281
L2PT configuration examples
Configuring L2PT for STP
Network requirements
As shown in Figure 92, the MAC addresses of CE 1 and CE 2 are 00e0-fc02-5800 and
00e0-fc02-5802, respectively. MSTP is enabled in Customer A's network, and default MSTP settings
are used.
Perform the following tasks on the PEs:
• Configure the ports that connect to CEs as access ports, and configure the ports in the service
provider network as trunk ports. Configure ports in the service provider network to allow packets
from any VLAN to pass.
• Enable L2PT for STP to enable Customer A's network to implement independent spanning tree
calculation across the service provider network.
• Set the destination multicast MAC address to 0100-0ccd-cdd0 for tunneled packets.
Figure 92 Network diagram
Configuration procedures
1. Configure PE 1:
# Set the destination multicast address to 0100-0ccd-cdd0 for tunneled packets.
<PE1> system-view
[PE1] l2protocol tunnel-dmac 0100-0ccd-cdd0
# Create VLAN 2.
[PE1] vlan 2
[PE1-vlan2] quit
# Configure Ten-GigabitEthernet 1/0/1 as an access port and assign the port to VLAN 2.
[PE1] interface ten-gigabitethernet 1/0/1
[PE1-Ten-GigabitEthernet1/0/1] port access vlan 2
# Disable STP and enable L2PT for STP on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] undo stp enable
[PE1-Ten-GigabitEthernet1/0/1] l2protocol stp tunnel dot1q
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 connected to the service provider network as a trunk
port, and assign the port to all VLANs.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
282
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan all
[PE1-Ten-GigabitEthernet1/0/2] quit
2. Configure PE 2 in the same way PE 1 is configured. (Details not shown.)
Verifying the configuration
# Verify that the root bridge of Customer A's network is CE 1.
<CE2> display stp root
MST ID Root Bridge ID ExtPathCost IntPathCost Root Port
0 32768.00e0-fc02-5800 0 0
# Verify that the root bridge of the service provider network is not CE 1.
[PE1] display stp root
MST ID Root Bridge ID ExtPathCost IntPathCost Root Port
0 32768.0cda-41c5-ba50 0 0
Requirements analysis
To meet the network requirements, perform the following tasks:
• For Ethernet link aggregation to operate correctly, configure VLANs on the PEs to ensure
point-to-point transmission between CE 1 and CE 2 in an aggregation group.
{ Set the PVIDs to VLAN 2 and VLAN 3 for Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 on PE 1, respectively.
{ Configure PE 2 in the same way PE 1 is configured.
{ Configure ports that connect to the CEs as trunk ports.
• To retain the VLAN tag of the customer network, enable QinQ on Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 on both PE 1 and PE 2.
283
• For packets from any VLAN to be transmitted, configure all ports in the service provider network
as trunk ports.
Configuration procedures
1. Configure CE 1:
# Configure Layer 2 aggregation group Bridge-Aggregation 1 to operate in dynamic
aggregation mode.
<CE1> system-view
[CE1] interface bridge-aggregation 1
[CE1-Bridge-Aggregation1] port link-type access
[CE1-Bridge-Aggregation1] link-aggregation mode dynamic
[CE1-Bridge-Aggregation1] quit
# Assign Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to Bridge-Aggregation 1.
[CE1] interface ten-gigabitethernet 1/0/1
[CE1-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[CE1-Ten-GigabitEthernet1/0/1] quit
[CE1] interface ten-gigabitethernet 1/0/2
[CE1-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[CE1-Ten-GigabitEthernet1/0/2] quit
2. Configure CE 2 in the same way CE 1 is configured. (Details not shown.)
3. Configure PE 1:
# Create VLANs 2 and 3.
<PE1> system-view
[PE1] vlan 2
[PE1-vlan2] quit
[PE1] vlan 3
[PE1-vlan3] quit
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, assign the port to VLAN 2, and set the
PVID to VLAN 2.
[PE1] interface ten-gigabitethernet 1/0/1
[PE1-Ten-GigabitEthernet1/0/1] port link-mode bridge
[PE1-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/1] port trunk permit vlan 2
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 2
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] qinq enable
# Enable L2PT for LACP on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] l2protocol lacp tunnel dot1q
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, assign the port to VLAN 3, and set the
PVID to VLAN 3.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-mode bridge
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 3
[PE1-Ten-GigabitEthernet1/0/2] port trunk pvid vlan 3
# Enable QinQ on Ten-GigabitEthernet 1/0/2.
[PE1-Ten-GigabitEthernet1/0/2] qinq enable
284
# Enable L2PT for LACP on Ten-GigabitEthernet 1/0/2.
[PE1-Ten-GigabitEthernet1/0/2] l2protocol lacp tunnel dot1q
[PE1-Ten-GigabitEthernet1/0/2] quit
4. Configure PE 2 in the same way PE 1 is configured. (Details not shown.)
Verifying the configuration
# Verify that CE 1 and CE 2 have completed Ethernet link aggregation successfully.
[CE1] display link-aggregation member-port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
Ten-GigabitEthernet1/0/1:
Aggregate Interface: Bridge-Aggregation1
Local:
Port Number: 3
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Remote:
System ID: 0x8000, 0004-0000-0000
Port Number: 3
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Received LACP Packets: 23 packet(s)
Illegal: 0 packet(s)
Sent LACP Packets: 26 packet(s)
Ten-GigabitEthernet1/0/2:
Aggregate Interface: Bridge-Aggregation1
Local:
Port Number: 4
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Remote:
System ID: 0x8000, 0004-0000-0000
Port Number: 4
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Received LACP Packets: 10 packet(s)
Illegal: 0 packet(s)
Sent LACP Packets: 13 packet(s)
[CE2] display link-aggregation member-port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
285
Ten-GigabitEthernet1/0/1:
Aggregate Interface: Bridge-Aggregation1
Local:
Port Number: 3
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Remote:
System ID: 0x8000, 0001-0000-0000
Port Number: 3
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Received LACP Packets: 23 packet(s)
Illegal: 0 packet(s)
Sent LACP Packets: 26 packet(s)
Ten-GigabitEthernet1/0/2:
Aggregate Interface: Bridge-Aggregation1
Local:
Port Number: 4
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Remote:
System ID: 0x8000, 0001-0000-0000
Port Number: 4
Port Priority: 32768
Oper-Key: 1
Flag: {ACDEF}
Received LACP Packets: 10 packet(s)
Illegal: 0 packet(s)
Sent LACP Packets: 13 packet(s)
286
Configuring cut-through forwarding
A cut-through forwarding-enabled device forwards a frame after it receives the first 64 bytes of the
frame. This feature reduces the transmission time of a frame and enhances forwarding performance.
To configure cut-through forwarding:
NOTE:
A frame is forwarded before its CRC field is received, and thus CRC-error frames are forwarded
instead of dropped.
287
Configuring service loopback groups
A service loopback group contains one or multiple Ethernet ports for looping packets sent out by the
device back to the device. This feature must work with other features, such as GRE.
A service loopback group provides one of the following services:
• Tunnel—Supports unicast tunnel traffic.
• Multicast tunnel—Supports multicast tunnel traffic.
• Multiport—Supports multiport ARP traffic.
• VSI gateway—Supports VSI gateway traffic.
You can configure only one service loopback group for a service type. However, you can use one
service loopback group with multiple features.
Member ports in a service loopback group are load balanced.
Configuration procedure
Follow these guidelines when you configure a service loopback group:
• Make sure the ports you are assigning to a service loopback group meet the following
requirements:
{ The ports are not used for any other purposes. The configuration on a port is removed when
it is assigned to a service loopback group.
{ The ports support the service type of the service loopback group and are not members of
any other service loopback group.
• You cannot change the service type of a service loopback group.
• Do not delete a service loopback group that is being used by a feature.
• To avoid IRF split, do not assign a physical interface to a service loopback group if that interface
is the only member interface of an IRF port.
• For correct traffic processing, make sure a service loopback group has a minimum of one
member port when it is being used by a feature.
To configure a service loopback group:
288
Displaying and maintaining service loopback
groups
Execute display commands in any view.
Task Command
Display information about service loopback groups. display service-loopback group [ group-id ]
Configuration procedure
# Create service loopback group 1, and specify its service type as tunnel.
<DeviceA> system-view
[DeviceA] service-loopback group 1 type tunnel
# Create the interface Tunnel 1 and set it to GRE mode. The interface will automatically use service
loopback group 1.
[DeviceA] interface tunnel 1 mode gre
[DeviceA-Tunnel1]
289
Document conventions and icons
Conventions
This section describes the conventions used in the documentation.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
[ x | y | ... ]
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
{ x | y | ... } *
bars, from which you select at least one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
[ x | y | ... ] *
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
&<1-n>
can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in Boldface. For
Boldface
example, the New User window opens; click OK.
Multi-level menus are separated by angle brackets. For example, File > Create >
>
Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed
WARNING! can result in personal injury.
An alert that calls attention to important information that if not understood or followed
CAUTION: can result in data loss, data corruption, or damage to hardware or software.
290
Network topology icons
Convention Description
291
Support and other resources
Accessing Hewlett Packard Enterprise Support
• For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website:
www.hpe.com/assistance
• To access documentation and support services, go to the Hewlett Packard Enterprise Support
Center website:
www.hpe.com/support/hpesc
Information to collect
• Technical support registration number (if applicable)
• Product name, model or version, and serial number
• Operating system name and version
• Firmware version
• Error messages
• Product-specific reports and logs
• Add-on products or components
• Third-party products or components
Accessing updates
• Some software products provide a mechanism for accessing software updates through the
product interface. Review your product documentation to identify the recommended software
update method.
• To download product updates, go to either of the following:
{ Hewlett Packard Enterprise Support Center Get connected with updates page:
www.hpe.com/support/e-updates
{ Software Depot website:
www.hpe.com/support/softwaredepot
• To view and update your entitlements, and to link your contracts, Care Packs, and warranties
with your profile, go to the Hewlett Packard Enterprise Support Center More Information on
Access to Support Materials page:
www.hpe.com/support/AccessToSupportMaterials
IMPORTANT:
Access to some updates might require product entitlement when accessed through the Hewlett
Packard Enterprise Support Center. You must have an HP Passport set up with relevant
entitlements.
292
Websites
Website Link
Networking websites
Hewlett Packard Enterprise Information Library for
www.hpe.com/networking/resourcefinder
Networking
Hewlett Packard Enterprise Networking website www.hpe.com/info/networking
Hewlett Packard Enterprise My Networking website www.hpe.com/networking/support
Hewlett Packard Enterprise My Networking Portal www.hpe.com/networking/mynetworking
Hewlett Packard Enterprise Networking Warranty www.hpe.com/networking/warranty
General websites
Hewlett Packard Enterprise Information Library www.hpe.com/info/enterprise/docs
Hewlett Packard Enterprise Support Center www.hpe.com/support/hpesc
Hewlett Packard Enterprise Support Services Central ssc.hpe.com/portal/site/ssc/
Contact Hewlett Packard Enterprise Worldwide www.hpe.com/assistance
Subscription Service/Support Alerts www.hpe.com/support/e-updates
Software Depot www.hpe.com/support/softwaredepot
Customer Self Repair (not applicable to all devices) www.hpe.com/support/selfrepair
Insight Remote Support (not applicable to all devices) www.hpe.com/info/insightremotesupport/docs
Remote support
Remote support is available with supported devices as part of your warranty, Care Pack Service, or
contractual support agreement. It provides intelligent event diagnosis, and automatic, secure
submission of hardware event notifications to Hewlett Packard Enterprise, which will initiate a fast
and accurate resolution based on your product’s service level. Hewlett Packard Enterprise strongly
recommends that you register your device for remote support.
For more information and device support details, go to the following website:
www.hpe.com/info/insightremotesupport/docs
Documentation feedback
Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help
us improve the documentation, send any errors, suggestions, or comments to Documentation
Feedback ([email protected]). When submitting your feedback, include the document title,
293
part number, edition, and publication date located on the front cover of the document. For online help
content, include the product name, product version, help edition, and publication date located on the
legal notices page.
294
Index
Numerics MAC Information queue length, 38
advertising
1:1 VLAN mapping
LLDP advertisable TLV, 263
application scenario, 233, 233
voice VLAN advertisement (CDP), 201
configuration, 238, 245
voice VLAN advertisement (LLDP), 200
implementation, 235, 236
voice VLAN information advertisement to IP
1:2 VLAN mapping phones, 193
application scenario, 233, 234 aggregating
configuration, 244, 251 link. See link aggregation
implementation, 235, 237 aging
10-GE interface;010-GE interface MAC address table timer, 28
combine, 2 spanning tree max age timer, 109
2:2 VLAN mapping algorithm
application scenario, 233, 234 Ethernet link aggregation load sharing algorithm
configuration, 245, 251 settings, 59
implementation, 235, 237 STP calculation, 84
40-GE interface;040-GE interface alternate port (MST), 97
split, 2 ARP
802 MAC address table ARP fast update, 32
802.1 LLDPDU TLV types, 256 ARP detection
802.1Q-in-802.1Q. Use QinQ M:1 VLAN mapping (dynamic IP address
802.3 LLDPDU TLV types, 256 assignment), 240
QinQ SVLAN tag 802.1p priority, 227 ARP snooping
802.1X M:1 VLAN mapping (static IP address
VLAN group configuration, 161 assignment), 242
assigning
A
MAC address table learning priority, 29
accessing MAC-based VLAN assignment (dynamic), 155
port-based VLAN assignment (access MAC-based VLAN assignment
port), 152 (server-assigned), 156
action MAC-based VLAN assignment (static), 154
loop detection block, 142 port isolation group (multiple ports), 78
loop detection no-learning protection, 142 port-based VLAN access port, 152
loop detection protection action (Layer 2 port-based VLAN access port (interface
aggregate interface), 144 view), 153
loop detection protection action setting, 144 port-based VLAN access port (VLAN view), 152
loop detection shutdown protection, 142 port-based VLAN hybrid port, 153
adding port-based VLAN trunk port, 153
MAC address table blackhole entry, 25 voice VLAN assignment mode (automatic), 194
MAC address table entry (global), 24 voice VLAN assignment mode (manual), 195
MAC address table entry (on interface), 25 attribute
MAC address table multiport unicast entry, 25 Ethernet link aggregation attribute
address configuration, 42
Ethernet interface MAC address (Layer 3), 16 auto
Ethernet subinterface MAC address (Layer Ethernet interface auto power-down, 9
3), 16 loop detection port status auto recovery, 142
MAC address learning disable, 26 voice VLAN assignment (automatic), 194
MAC address table learning limit, 28
295
voice VLAN assignment mode configuration spanning tree loop guard, 127
(automatic), 202 spanning tree root bridge, 107
voice VLAN LLDP automatic IP phone spanning tree root bridge (device), 107
discovery enable, 200 spanning tree root guard, 127
voice VLAN port operation configuration spanning tree secondary root bridge (device), 108
(automatic assignment), 198
STP designated bridge, 83
AutoMDIX mode (Ethernet interface), 14
STP root bridge, 83
B bulk
backing up interface configuration, 20, 20
MST backup port, 97 interface configuration display, 21
bandwidth interface configuration restrictions, 20
Ethernet link aggregate interface (expected C
bandwidth), 55
cable
basic management LLDPDU TLV types, 256
Ethernet interface cable connection (Layer 2), 14
BFD
calculating
Ethernet link aggregation group BFD, 56
MSTI calculation, 99
blackhole
MSTP CIST calculation, 99
MAC address table, 22
spanning tree port path cost calculation
MAC address table entry, 25
standard, 113
block action (loop detection), 142
spanning tree timeout factor, 111
boundary port (MST), 97
STP algorithm, 84
BPDU
CDP
configuration BPDUs, 81
LLDP CDP compatibility, 269
MST region max hops, 108
LLDP CDP-compatible configuration, 276
MSTP BPDU protocol frames, 94
voice VLAN advertisement, 201
PVST BPDU guard, 130
voice VLAN information advertisement to IP
RSTP BPDU processing, 92 phones, 193
spanning tree BPDU drop, 129 CE
spanning tree BPDU guard, 126 L2PT configuration, 278, 280, 282
spanning tree BPDU transparent transmission L2PT for LACP configuration, 283
(on port), 131
L2PT for STP configuration, 282
spanning tree hello time, 109
checking
spanning tree max age timer, 109
spanning tree No Agreement Check, 122, 124
spanning tree TC BPDU event logging (PVST
choosing
mode), 131
Ethernet link aggregation reference port, 43, 46
spanning tree TC-BPDU guard, 129
Cisco
spanning tree TC-BPDU transmission
restriction, 128 Discovery Protocol. Use CDP
STP BPDU forwarding, 89 LLDP CDP compatibility, 269
TCN BPDUs, 82 LLDP configuration (CDP-compatible), 276
transmission rate configuration, 111 CIST
bridging calculation, 99
Ethernet interface bridging enable (Layer network device connection, 97
2), 15 spanning tree max age timer, 109
LLDP agent customer bridge, 254 combining
LLDP agent nearest bridge, 254 Ethernet interfaces (10-GE > 40-GE), 2
LLDP agent non-TPMR bridge, 254 common root bridge, 97
LLDP bridge mode configuration, 261 configuring
MST common root bridge, 97 1:1 VLAN mapping, 238, 245
MST regional root, 97 1:2 VLAN mapping, 244, 251
spanning tree dispute guard, 130 2:2 VLAN mapping, 245, 251
296
Ethernet aggregate interface, 52 L2PT for LACP, 283
Ethernet aggregate interface (description), 52 L2PT for STP, 282
Ethernet aggregate interface (Layer 3 Layer 2 forwarding (cut-through), 287
edge), 76 LLDP, 254, 260, 272
Ethernet interface, 1 LLDP (CDP-compatible), 276
Ethernet interface (Layer 2), 11 LLDP advertisable TLVs, 263
Ethernet interface (Layer 3), 16 LLDP basics, 261, 272
Ethernet interface basic settings, 3 LLDP CDP compatibility, 269
Ethernet interface common settings, 1 LLDP management address, 266
Ethernet interface generic flow control, 7 LLDP management address encoding
Ethernet interface jumbo frame support, 5 format, 266
Ethernet interface link mode, 4 LLDP trapping, 270
Ethernet interface PFC, 7 LLDP-MED trapping, 270
Ethernet interface physical state change loop detection, 141, 143, 145
suppression, 5 M:1 VLAN mapping, 239, 245
Ethernet interface storm control (Layer 2), 11 M:1 VLAN mapping (dynamic IP address
Ethernet interface storm suppression, 10 assignment), 239
Ethernet link aggregate interface (Layer 2 M:1 VLAN mapping (static IP address
edge), 70 assignment), 242
Ethernet link aggregation, 41, 48, 64 M:1 VLAN mapping customer-side port (dynamic
Ethernet link aggregation (Layer 2 IP address assignment), 240
dynamic), 66 M:1 VLAN mapping customer-side port (static IP
Ethernet link aggregation (Layer 2 static), 64 address assignment), 242
Ethernet link aggregation (Layer 3 M:1 VLAN mapping network-side port (dynamic
dynamic), 73 IP address assignment), 241
Ethernet link aggregation (Layer 3 static), 71 M:1 VLAN mapping network-side port (static IP
Ethernet link aggregation edge aggregate address assignment), 243
interface, 55 MAC address move suppression, 31
Ethernet link aggregation group, 49 MAC address table, 22, 23, 35
Ethernet link aggregation group (Layer 2 MAC address table frame forwarding rule, 29
dynamic), 50 MAC address table multiport unicast entry
Ethernet link aggregation group (Layer 2 (global), 26
static), 49 MAC address table multiport unicast entry (on
Ethernet link aggregation group (Layer 3 interface), 26
dynamic), 51 MAC Information, 37, 38
Ethernet link aggregation group (Layer 3 MAC Information mode, 37
static), 51 MAC-based VLAN, 154, 164
Ethernet link aggregation group BFD, 56 MAC-based VLAN (server-assigned), 159
Ethernet link aggregation group load MAC-based VLAN assignment (dynamic), 157
sharing, 58 MAC-based VLAN assignment (static), 157
Ethernet link aggregation load sharing (Layer management Ethernet interface, 1
2), 68
MST region, 106
Ethernet link aggregation load sharing (Layer
MST region max hops, 108
3), 74
MSTP, 105, 133
Ethernet subinterface (Layer 3), 16
MVRP, 209, 212
Ethernet subinterface basic settings, 3
port isolation, 78, 79
interface (inloopback), 19
port-based VLAN, 151, 162
interface (loopback), 18
private VLAN, 176, 177, 179
interface (null), 18
private VLAN promiscuous port, 179
interfaces in bulk, 20, 20
private VLAN trunk promiscuous port, 182
IP subnet-based VLAN, 159, 166
private VLAN trunk promiscuous+secondary
L2PT, 278, 280, 282
port, 185
297
protocol-based VLAN, 160, 167 voice VLAN port operation (automatic
PVST, 104, 137 assignment), 198
QinQ, 223, 229 voice VLAN port operation (manual
QinQ basics, 229 assignment), 199
QinQ CVLAN tag TPID value, 227 voice VLAN traffic QoS priority settings, 197
QinQ SVLAN tag TPID value, 227 connecting
QinQ VLAN tag TPID value, 226 Ethernet interface cable connection (Layer 2), 14
QinQ VLAN transparent voice VLAN host+IP phone connection (in
transmission, 225, 231 series), 193
RSTP, 103 voice VLAN IP phone+device, 194
secondary VLAN Layer 3 communication, 189 CoS
service loopback group, 288, 289 voice VLAN traffic QoS priority settings, 197
spanning tree, 81, 102, 133 cost
spanning tree BPDU guard, 126 spanning tree port path cost calculation
standard, 113
spanning tree BPDU transmission rate, 111
spanning tree port path cost
spanning tree device priority, 108
configuration, 112, 115
spanning tree Digest Snooping, 120, 121
STP path cost, 84
spanning tree edge port, 112
creating
spanning tree No Agreement Check, 122, 124
super VLAN sub-VLAN, 171
spanning tree port link type, 116
CST
spanning tree port mode, 117
MST region connection, 96
spanning tree port path cost, 112, 115
customer
spanning tree port priority, 116
LLDP customer bridge mode, 261
spanning tree port role restriction, 128
cut-through Layer 2 forwarding configuration, 287
spanning tree protection, 126
CVLAN
spanning tree root bridge, 107
QinQ basic configuration, 229
spanning tree root bridge (device), 107
QinQ configuration, 223, 229
spanning tree secondary root bridge, 107
QinQ VLAN transparent transmission
spanning tree secondary root bridge configuration, 231
(device), 108
VLAN mapping application scenario, 233
spanning tree switched network diameter, 109
VLAN mapping configuration, 233, 238, 245
spanning tree TC Snooping, 124
VLAN mapping implementation, 235
spanning tree TC-BPDU transmission
restriction, 128 D
spanning tree timeout factor, 111 default
spanning tree timer, 109 Ethernet link aggregate interface default
STP, 103 settings, 57
super VLAN, 171, 171, 173 designated
super VLAN interface, 172 MST port, 97
VLAN, 148, 162 STP bridge, 83
VLAN basic settings, 149 STP port, 83
VLAN group, 161 detecting
VLAN interface, 150 Ethernet link aggregation group BFD, 56
VLAN mapping, 233, 238, 245 device
voice VLAN, 192, 196, 202 Ethernet interface configuration, 1
voice VLAN advertisement (CDP), 201 Layer 2 forwarding configuration
voice VLAN advertisement (LLDP), 200 (cut-through), 287
voice VLAN assignment mode LLDP basic configuration, 261, 272
(automatic), 202 LLDP CDP compatibility, 269
voice VLAN assignment mode (manual), 204 LLDP configuration, 254, 260, 272
LLDP configuration (CDP-compatible), 276
298
LLDP parameters, 267 loop detection, 145
loop protection actions, 142 MAC address table, 35
MSTP implementation, 99 MVRP, 212
MVRP configuration, 206, 209, 212 port isolation, 78
PVST BPDU guard, 130 private VLAN, 179
spanning tree BPDU drop, 129 QinQ, 228
spanning tree BPDU guard, 126 service loopback group, 289
spanning tree Digest Snooping, 120, 121 spanning tree, 132
spanning tree dispute guard, 130 super VLAN, 172
spanning tree inconsistent PVID protection VLAN, 161
disable, 120 VLAN mapping, 245
spanning tree loop guard, 127 voice VLAN, 202
spanning tree No Agreement Check, 122, 124 dispute
spanning tree port role restriction, 128 spanning tree dispute guard, 130
spanning tree priority, 108 distance
spanning tree protection, 126 Ethernet interface connection distance (Layer
spanning tree root guard, 127 2), 15
spanning tree SNMP notification (new-root dot1d-1998 (STP port path cost calculation), 113
election, topology change events), 132 dot1s (STP port mode), 117
spanning tree TC BPDU event logging (PVST dot1t (STP port path cost calculation), 113
mode), 131 DSCP
spanning tree TC Snooping, 124 voice VLAN traffic QoS priority settings, 197
spanning tree TC-BPDU guard, 129 dynamic
spanning tree TC-BPDU transmission Ethernet link aggregation (dynamic mode), 44
restriction, 128
Ethernet link aggregation (Layer 2), 66
voice VLAN IP phone+device connection, 194
Ethernet link aggregation (Layer 3), 73
DHCP snooping
Ethernet link aggregation edge aggregate
M:1 VLAN mapping, 240 interface, 48
diameter Ethernet link aggregation group, 49, 51
spanning tree switched network diameter, 109 Ethernet link aggregation group BFD, 56
Digest Snooping (spanning tree), 120, 121 Ethernet link aggregation mode, 43
directing Layer 2 Ethernet link aggregation group, 50
Ethernet link aggregation traffic redirection, 60 Layer 3 Ethernet link aggregation group, 51
disabling MAC address table dynamic aging timer, 28
LLDP PVID inconsistency check, 269 MAC address table entry, 22
MAC address learning (global), 27 MAC address table entry configuration
MAC address learning (on interface), 27 (global), 24
MAC address learning (on VLAN), 27 MAC address table entry configuration (on
MAC address table static source check, 33 interface), 25
spanning tree inconsistent PVID MAC-based VLAN assignment, 155, 157
protection, 120
E
discarding
MST discarding port state, 98 edge
displaying Ethernet aggregate interface (Layer 3 edge), 76
bulk interface configuration, 21 Ethernet link aggregate interface (Layer 2
edge), 70
Ethernet interface, 16
STP edge port rapid transition, 99
Ethernet link aggregation, 63
edge port
Ethernet subinterface, 16
MST, 97
interface, 19
spanning tree, 112
L2PT, 281
EEE energy saving, 9
LLDP, 271
299
enabling LLDP frame encapsulation (Ethernet II), 255
conversational remote MAC learning, 34 LLDP frame encapsulation (SNAP), 255
Ethernet interface auto power-down, 9 LLDP frame encapsulation format, 268
Ethernet interface bridging (Layer 2), 15 VLAN frame encapsulation, 148
Ethernet interface EEE, 9 Energy Efficient Ethernet. See EEE
Ethernet interface energy-saving features, 8 energy-saving features, 8
Ethernet interface loopback testing, 6 entry
Ethernet link aggregation traffic redirection, 60 conversational remote MAC learning, 34
L2PT, 280 Ethernet
L2PT (for protocol), 280 Ethernet interface auto power-down enable, 9
LLDP, 261 interface. See Ethernet interface
LLDP polling, 262 interface 10-GE > 40-GE combine;010-GE >
loop detection (global), 143 40-GE combine, 2
loop detection (port-specific), 143 interface 40-GE split;040-GE split, 2
M:1 VLAN mapping ARP detection (dynamic interface basic settings configuration, 3
IP address assignment), 240 interface bridging enable (Layer 2), 15
M:1 VLAN mapping ARP snooping (static IP interface cable connection (Layer 2), 14
address assignment), 242 interface configuration (Layer 2), 11
M:1 VLAN mapping DHCP snooping (dynamic interface configuration (Layer 3), 16
IP address assignment), 240 interface connection distance (Layer 2), 15
MAC address synchronization, 30 interface display, 16
MAC address table ARP fast update, 32 interface EEE enable, 9
MAC address table move notification, 31 interface energy-saving features, 8
MAC address table SNMP notification, 34 interface fiber port (Layer 2), 12
MAC Information, 37 interface fiber port restrictions (Layer 2), 13
MVRP, 210 interface generic flow control, 7
MVRP GVRP compatibility, 212 interface jumbo frame support configuration, 5
PVST BPDU guard, 130 interface link mode, 4
QinQ, 225 interface loopback test restrictions, 6
spanning tree BPDU drop, 129 interface loopback testing, 6
spanning tree BPDU guard (global), 126 interface maintain, 16
spanning tree BPDU guard (on interface), 126 interface MDIX mode (Layer 2), 14
spanning tree BPDU transparent transmission interface MTU setting (Layer 3), 16
(on port), 131
interface PFC configuration, 7
spanning tree dispute guard, 130
interface PFC configuration restrictions, 8
spanning tree feature, 118
interface physical state change suppression, 5
spanning tree loop guard, 127
interface statistics polling interval, 9
spanning tree port state transition information
interface storm control (Layer 2), 11
output, 118
interface storm control configuration restrictions
spanning tree root guard, 127
(Layer 2), 11
spanning tree SNMP notification (new-root
interface storm suppression, 10
election, topology change events), 132
interface storm suppression restrictions, 10
spanning tree TC BPDU event logging (PVST
mode), 131 link aggregation. See Ethernet link aggregation
spanning tree TC-BPDU guard, 129 LLDP frame encapsulation, 255
voice VLAN LLDP automatic IP phone LLDP trapping, 270
discovery, 200 LLDP-MED trapping, 270
encapsulating loop detection configuration, 141, 145
L2PT configuration, 278, 280, 282 loop detection protection action (Layer 2 Ethernet
L2PT for LACP configuration, 283 interface), 144
L2PT for STP configuration, 282 MAC address table configuration, 22, 23, 35
MAC Information configuration, 37, 38
300
port isolation configuration, 78, 79 configuration, 41, 48, 64
port-based VLAN assignment (access configuration types, 42
port), 152 display, 63
port-based VLAN assignment (hybrid dynamic mode, 44
port), 153 edge aggregate interface, 48, 55
port-based VLAN assignment (trunk port), 153 group (Layer 3 dynamic), 51
port-based VLAN configuration, 151 group (Layer 3 static), 51
private VLAN configuration, 176, 177, 179 group configuration, 49
private VLAN promiscuous port group configuration (Layer 2), 49
configuration, 179
group configuration (Layer 3), 51
private VLAN trunk promiscuous port
group load sharing configuration, 58
configuration, 182
group load sharing mode, 58
private VLAN trunk promiscuous+secondary
port configuration, 185 how dynamic link aggregation works, 46
QinQ CVLAN frame header tag, 223 interface configuration (expected bandwidth), 55
QinQ SVLAN frame header tag, 223 LACP, 45
secondary VLAN Layer 3 communication Layer 2 aggregate interface (ignored
configuration, 189 VLAN), 53, 53
service loopback group Layer 2 aggregate interface (Layer 2 edge), 70
configuration, 288, 289 Layer 2 aggregation configuration (dynamic), 66
subinterface. See Ethernet interface, Ethernet Layer 2 aggregation configuration (static), 64
subinterface, subinterface Layer 2 aggregation load sharing (Layer 2), 68
subinterface MAC address (Layer 3), 16 Layer 2 group (dynamic), 50
subinterface MTU setting (Layer 3), 16 Layer 2 group (static), 49
super VLAN configuration, 171, 171, 173 Layer 3 aggregate interface (Layer 3 edge), 76
super VLAN sub-VLAN creation, 171 Layer 3 aggregate interface configuration
VLAN basic configuration, 149 (MTU), 54
VLAN configuration, 148, 162 Layer 3 aggregation configuration (dynamic), 73
VLAN frame encapsulation, 148 Layer 3 aggregation configuration (static), 71
VLAN interface, 150 Layer 3 aggregation configuration load
VLAN port-based configuration, 162 sharing, 74
voice VLAN configuration, 192, 196, 202 load sharing algorithm settings, 59
Ethernet interface load sharing mode, 48
common settings configuration, 1 local-first load sharing, 59
configuration, 1 maintain, 63
MAC address (Layer 3), 16 management subnet, 62
management interface configuration, 1 management VLAN+management port, 61
naming conventions, 1 member port, 41
Ethernet link aggregation member port state, 41, 43, 46
aggregate group Selected ports min/max, 54 modes, 43
aggregate interface, 41 operational key, 42
aggregate interface (description), 52 reference port, 46
aggregate interface (MAC address), 53 reference port choice, 43
aggregate interface configuration, 52 static mode, 43
aggregate interface default settings, 57 traffic redirection, 60
aggregate interface shutdown, 57 traffic redirection restrictions, 61
aggregation group, 41 Ethernet subinterface, 1, See also Ethernet interface,
Layer 2 Ethernet subinterface, Layer 3 Ethernet
aggregation group restrictions, 49
subinterface
basic concepts, 41
basic settings, 3
BFD configuration, 56
display, 16
BFD configuration restrictions, 56
maintain, 16
301
external STP TCN BPDU protocol frames, 81
Ethernet interface external loopback testing, 6 VLAN frame encapsulation, 148
F G
fast GARP
MAC address table ARP fast update, 32 VLAN Registration Protocol. Use GVRP
fiber port generating
Ethernet interface fiber port (Layer 2), 12 conversational remote MAC learning, 34
flow control generic flow control (Ethernet interface), 7
Ethernet interface generic flow control, 7 Generic VLAN Registration Protocol. Use GVRP
Ethernet interface PFC, 7 global
forcing Ethernet link aggregation load sharing mode
Ethernet interface fiber port (Layer 2), 12 set, 58
format loop detection enable, 143
LLDP frame encapsulation (Ethernet II), 255 loop detection protection action, 144
LLDP frame encapsulation (SNAP), 255 MAC address learning disable, 27
LLDP frame encapsulation format, 268 MAC address table multiport unicast entry
LLDP management address encoding configuration, 26
format, 266 group
forwarding Ethernet link aggregate group Selected ports
Layer 2 forwarding configuration min/max, 54
(cut-through), 287 Ethernet link aggregation, 49
MAC address table frame forwarding rule, 29 Ethernet link aggregation group, 41
MST forwarding port state, 98 Ethernet link aggregation group (Layer 2
spanning tree forward delay timer, 109 static), 49, 50
STP BPDU forwarding, 89 Ethernet link aggregation group (Layer 2), 49
STP forward delay timer, 90 Ethernet link aggregation group (Layer 3
dynamic), 51
frame
Ethernet link aggregation group (Layer 3
Ethernet interface jumbo frame support, 5
static), 51
Layer 2 forwarding configuration
Ethernet link aggregation group (Layer 3), 51
(cut-through), 287
Ethernet link aggregation group load sharing, 58
LLDP frame encapsulation format, 268
Ethernet link aggregation LACP, 45
loop detection (Ethernet frame header), 141
Ethernet link aggregation load sharing
loop detection (inner frame header), 141
mode, 48, 58
loop detection interval, 142
Ethernet link aggregation member port state, 41
MAC address learning, 22
VLAN group configuration, 161
MAC address table blackhole entry, 25
GVRP
MAC address table configuration, 22, 23, 35
MVRP compatibility, 212
MAC address table entry configuration, 24
MAC address table frame forwarding rule, 29 H
MAC address table multiport unicast entry, 25 hello
MAC Information configuration, 37, 38 spanning tree timer, 109
MSTP BPDU protocol frames, 94 STP timer, 90
port-based VLAN frame handling, 152 host
PVST BPDU protocol frames, 92, 92 voice VLAN host+IP phone connection (in
QinQ CVLAN Ethernet frame header tag, 223 series), 193
QinQ implementation, 224 voice VLAN IP phone+device connection, 194
QinQ SVLAN Ethernet frame header tag, 223 hybrid port
RSTP BPDU protocol frames, 90 port-based VLAN assignment (hybrid port), 153
spanning tree port mode configuration, 117 I
STP BPDU protocol frames, 81
identifying
302
voice VLAN IP phone identification voice VLAN assignment mode+IP phone
(LLDP), 193 cooperation, 195
voice VLAN IP phone identification (OUI voice VLAN host+IP phone connection (in
address), 192 series), 193
ignored VLAN voice VLAN identification (LLDP), 193
Layer 2 aggregate interface, 53 voice VLAN identification (OUI address), 192
implementing voice VLAN information advertisement, 193
1:1 VLAN mapping, 235, 236 voice VLAN IP phone access method, 193
1:2 VLAN mapping, 235, 237 voice VLAN IP phone+device connection, 194
2:2 VLAN mapping, 235, 237 IP subnet-based VLAN
M:1 VLAN mapping, 235, 236 configuration, 159, 166
MSTP device, 99 isolating
QinQ, 224 ports. See port isolation
inloopback interface IST
configuration, 19 MST region, 97
display, 19 J
maintain, 19
jumbo frame support (Ethernet interface), 5
interface
bulk configuration, 20, 20 K
configuration (inloopback), 18, 19 key
configuration (loopback), 18, 18 Ethernet link aggregation operational key, 42
configuration (null), 18, 18
L
Ethernet aggregate interface, 52
Ethernet aggregate interface (description), 52 L2PT
Ethernet aggregate interface (MAC configuration, 278, 280, 282
address), 53 display, 281
Ethernet link aggregate interface default enable, 280
settings, 57 enable restrictions, 280
Ethernet link aggregate interface how it works, 279
shutdown, 57 LACP configuration, 283
Ethernet link aggregation edge aggregate maintain, 281
interface, 48, 55 STP configuration, 282
Layer 2 Ethernet aggregate interface (ignored tunneled packet destination multicast MAC
VLAN), 53
address, 281
Layer 3 aggregate interface configuration
LACP
(MTU), 54
Ethernet link aggregation, 45
internal
L2PT for LACP configuration, 283
Ethernet interface internal loopback testing, 6
LAN
interval
Virtual Local Area Network. Use VLAN
Ethernet link aggregation LACP long
timeout, 45 LAN switching
Ethernet link aggregation LACP short 1:1 VLAN mapping configuration, 238, 245
timeout, 45 1:2 VLAN mapping configuration, 244, 251
loop detection, 142, 144 2:2 VLAN mapping configuration, 245, 251
MAC change notification interval, 38 Ethernet aggregate interface, 52
IP addressing Ethernet aggregate interface (description), 52
IP subnet-based VLAN Ethernet aggregate interface (ignored VLAN), 53
configuration, 159, 166 Ethernet aggregate interface (Layer 3 edge), 76
super VLAN configuration, 171, 171, 173 Ethernet link aggregate group Selected ports
super VLAN interface configuration, 172 min/max, 54
voice VLAN configuration, 192, 196, 202 Ethernet link aggregate interface (expected
IP phone bandwidth), 55
303
Ethernet link aggregate interface (Layer 2 L2PT configuration, 278, 282
edge), 70 L2PT display, 281
Ethernet link aggregate interface default L2PT enable, 280
settings, 57 L2PT enable restrictions, 280
Ethernet link aggregate interface L2PT for LACP configuration, 283
shutdown, 57
L2PT for STP configuration, 282
Ethernet link aggregation (dynamic mode), 44
L2PT maintain, 281
Ethernet link aggregation (Layer 2
LLDP basic concepts, 254
dynamic), 66
LLDP basic configuration, 261, 272
Ethernet link aggregation (Layer 2 static), 64
LLDP CDP compatibility, 269
Ethernet link aggregation (Layer 3
dynamic), 73 LLDP configuration, 254, 260, 272
Ethernet link aggregation (Layer 3 static), 71 LLDP configuration (CDP-compatible), 276
Ethernet link aggregation (static mode), 43 LLDP display, 271
Ethernet link aggregation basic concepts, 41 LLDP protocols and standards, 260
Ethernet link aggregation BFD configuration loop detection configuration, 141, 143, 145
restrictions, 56 M:1 VLAN mapping configuration, 239, 245
Ethernet link aggregation M:1 VLAN mapping restrictions (dynamic IP
configuration, 41, 48, 64 address assignment), 239
Ethernet link aggregation display, 63 M:1 VLAN mapping restrictions (static IP address
Ethernet link aggregation edge aggregate assignment), 242
interface, 48, 55 MAC address table configuration, 22, 23, 35
Ethernet link aggregation group, 49 MAC Information configuration, 37, 38
Ethernet link aggregation group (dynamic MAC-based VLAN assignment (dynamic), 157
dynamic), 50 MAC-based VLAN assignment (static), 157
Ethernet link aggregation group (Layer 2 MAC-based VLAN assignment configuration
static), 49 restrictions (dynamic), 157
Ethernet link aggregation group (Layer 2), 49 MAC-based VLAN configuration, 154, 164
Ethernet link aggregation group (Layer 3 MAC-based VLAN configuration
dynamic), 51 (server-assigned), 159
Ethernet link aggregation group (Layer 3 MRP implementation, 206
static), 51 MST region, 106
Ethernet link aggregation group load MSTP configuration, 133
sharing, 58 MVRP configuration, 206, 209, 212
Ethernet link aggregation group load sharing MVRP configuration restrictions, 209
mode, 58
MVRP display, 212
Ethernet link aggregation group
MVRP GVRP compatibility, 212
restrictions, 49
MVRP maintain, 212
Ethernet link aggregation LACP, 45
MVRP protocols and standards, 209
Ethernet link aggregation load sharing (Layer
2), 68 MVRP registration mode setting, 210
Ethernet link aggregation load sharing (Layer MVRP timer set, 211
3), 74 port isolation configuration, 78, 79
Ethernet link aggregation load sharing port isolation display, 78
mode, 48 port isolation group assignment (multiple
Ethernet link aggregation local-first load ports), 78
sharing, 59 port-based VLAN assignment (access port), 152
Ethernet link aggregation maintain, 63 port-based VLAN assignment (hybrid port), 153
Ethernet link aggregation traffic redirection, 60 port-based VLAN assignment (trunk port), 153
Ethernet link aggregation traffic redirection port-based VLAN configuration, 151
restrictions, 61 private VLAN configuration, 176, 177, 179
IP subnet-based VLAN private VLAN configuration restrictions, 177
configuration, 159, 166
private VLAN display, 179
304
private VLAN promiscuous port voice VLAN display, 202
configuration, 179 voice VLAN LLDP automatic IP phone discovery
private VLAN trunk promiscuous port enable, 200
configuration, 182 voice VLAN port operation configuration
private VLAN trunk promiscuous+secondary (automatic assignment), 198
port configuration, 185 voice VLAN port operation configuration (manual
protocol-based VLAN configuration, 160, 167 assignment), 199
PVST configuration, 137 voice VLAN port operation configuration
QinQ basic configuration, 229 restrictions (automatic assignment), 198
QinQ configuration, 223, 229 voice VLAN port operation configuration
QinQ configuration restrictions, 225 restrictions (manual assignment), 199
QinQ display, 228 Layer 2
QinQ implementation, 224 Ethernet interface bridging enable, 15
QinQ protocols and standards, 225 Ethernet interface cable connection, 14
QinQ SVLAN tag 802.1p priority, 227 Ethernet interface configuration, 1, 11
QinQ VLAN tag TPID value, 226 Ethernet interface connection distance, 15
QinQ VLAN transparent transmission Ethernet interface fiber port, 12
configuration, 231 Ethernet interface fiber port restrictions, 13
secondary VLAN Layer 3 communication Ethernet interface MDIX mode, 14
configuration, 189 Ethernet interface storm control configuration, 11
service loopback group Ethernet interface storm control configuration
configuration, 288, 289 restrictions, 11
service loopback group display, 289 Ethernet link aggregate interface (Layer 2
spanning tree configuration, 81, 133 edge), 70
spanning tree Digest Snooping, 120, 121 Ethernet link aggregation (Layer 2 dynamic), 66
spanning tree display, 132 Ethernet link aggregation (Layer 2 static), 64
spanning tree maintain, 132 Ethernet link aggregation load sharing, 68
spanning tree No Agreement Check, 122, 124 forwarding configuration (cut-through), 287
spanning tree protection configuration, 126 L2PT configuration, 280
spanning tree TC Snooping, 124 L2PT tunneled packet destination multicast MAC
super VLAN configuration, 171, 171, 173 address, 281
super VLAN display, 172 LLDP basic configuration, 272
super VLAN interface configuration, 172 LLDP configuration, 272
super VLAN sub-VLAN creation, 171 LLDP trapping, 270
VLAN basic configuration, 149 LLDP-MED trapping, 270
VLAN configuration, 148, 162 loop detection protection action (Layer 2
aggregate interface), 144
VLAN configuration restrictions, 157
loop detection protection action (Layer 2 Ethernet
VLAN display, 161
interface), 144
VLAN group configuration, 161
VLAN basic configuration, 149
VLAN interface, 150
VLAN configuration, 148, 162
VLAN maintain, 161
voice VLAN configuration, 192, 196, 202
VLAN mapping configuration, 233, 238, 245
Layer 2 Protocol Tunneling. Use L2PT
VLAN mapping display, 245
Layer 3
VLAN port-based configuration, 162
aggregate interface configuration (MTU), 54
VLAN protocols and standards, 149
Ethernet aggregate interface, 52
voice VLAN advertisement (CDP), 201
Ethernet aggregate interface (description), 52
voice VLAN advertisement (LLDP), 200
Ethernet aggregate interface (Layer 3 edge), 76
voice VLAN assignment mode configuration
Ethernet aggregate interface (MAC address), 53
(automatic), 202
Ethernet interface configuration, 1, 16
voice VLAN assignment mode configuration
(manual), 204 Ethernet interface MAC address, 16
Ethernet interface MTU setting, 16
305
Ethernet link aggregate group Selected ports loop detection no-learning action, 142
min/max, 54 MAC address, 22
Ethernet link aggregate interface (expected MAC address learning disable, 26
bandwidth), 55 MAC address table learning limit, 28
Ethernet link aggregate interface default MAC address table learning priority, 29
settings, 57
MST learning port state, 98
Ethernet link aggregate interface
legacy
shutdown, 57
spanning tree port mode, 117
Ethernet link aggregation (Layer 3
dynamic), 73 spanning tree port path cost calculation, 113
Ethernet link aggregation (Layer 3 static), 71 link
Ethernet link aggregation aggregation. See link aggregation
configuration, 41, 48, 64 Ethernet interface link mode, 4
Ethernet link aggregation edge aggregate Link Layer Discovery Protocol. Use LLDP
interface, 48, 55 MSTP configuration, 133
Ethernet link aggregation group, 49, 51 PVST configuration, 137
Ethernet link aggregation group load spanning tree configuration, 81, 102, 133
sharing, 58 spanning tree hello time, 109
Ethernet link aggregation group load sharing spanning tree port link type configuration, 116
mode, 58 link aggregation
Ethernet link aggregation load sharing, 74 Ethernet link aggregation. See Ethernet link
Ethernet link aggregation local-first load aggregation
sharing, 59 LLDP
Ethernet link aggregation traffic redirection, 60 advertisable TLV configuration, 263
Ethernet subinterface configuration, 16 agent, 254
Ethernet subinterface MAC address, 16 basic concepts, 254
Ethernet subinterface MTU setting, 16 basic configuration, 261, 272
IP subnet-based VLAN configuration, 159 bridge mode configuration, 261
LAN switching LAN switching VLAN CDP compatibility configuration, 269
interface, 150
CDP-compatible configuration, 276
LLDP basic configuration, 272
configuration, 254, 260, 272
LLDP configuration, 272
disabling PVID inconsistency check, 269
LLDP trapping, 270
display, 271
LLDP-MED trapping, 270
enable, 261
port-based VLAN assignment (access
frame encapsulation (Ethernet II), 255
port), 152
frame encapsulation (SNAP), 255
port-based VLAN assignment (hybrid
port), 153 frame encapsulation format, 268
port-based VLAN assignment (trunk port), 153 frame format, 255
port-based VLAN configuration, 151 frame reception, 260
private VLAN configuration, 179 frame transmission, 259
private VLAN promiscuous port how it works, 259
configuration, 179 LLDPDU management address TLV, 259
private VLAN trunk promiscuous port LLDPDU TLV types, 256
configuration, 182 LLDPDU TLVs, 256
private VLAN trunk promiscuous+secondary LLDP-MED trapping configuration, 270
port configuration, 185 management address configuration, 266
protocol-based VLAN configuration, 160 management address encoding format, 266
secondary VLAN Layer 3 communication operating mode (disable), 259
configuration, 189 operating mode (Rx), 259
super VLAN configuration, 173 operating mode (Tx), 259
voice VLAN configuration, 192, 196, 202 operating mode (TxRx), 259
learning
306
operating mode set, 261 logging
parameter set, 267 spanning tree TC BPDU event logging (PVST
polling enable, 262 mode), 131
protocols and standards, 260 loop
reinitialization delay, 262 MSTP configuration, 133
trapping configuration, 270 PVST configuration, 137
voice VLAN advertisement, 200 spanning tree configuration, 81, 102, 133
voice VLAN information advertisement to IP spanning tree loop guard, 127
phones, 193 loop detection
voice VLAN IP phone identification, 193 configuration, 141, 143, 145
voice VLAN IP phone identification display, 145
method, 192 enable, 143
voice VLAN LLDP automatic IP phone interval, 142
discovery enable, 200 interval setting, 144
LLDPDU mechanisms, 141
LLDP basic configuration, 261, 272 port status auto recovery, 142
LLDP configuration, 254, 260, 272 protection action setting, 144
LLDP parameters, 267 protection action setting (Layer 2 aggregate
management address configuration, 266 interface), 144
management address encoding format, 266 protection actions, 142
management address TLV, 259 loopback
TLV basic management types, 256 Ethernet interface loopback testing, 6
TLV LLDP-MED types, 256 loopback interface
TLV organization-specific types, 256 configuration, 18
load balancing display, 19
service loopback group maintain, 19
configuration, 288, 289
M
load sharing
Ethernet link aggregation group M:1 VLAN mapping
configuration, 58 application scenario, 233, 233
Ethernet link aggregation group load ARP detection (dynamic IP address
sharing, 48 assignment), 240
Ethernet link aggregation load sharing (Layer ARP snooping (static IP address
2), 68 assignment), 242
Ethernet link aggregation load sharing (Layer configuration, 239, 245
3), 74 configuration (dynamic IP address
Ethernet link aggregation load sharing assignment), 239
algorithm settings, 59 configuration (static IP address assignment), 242
Ethernet link aggregation load sharing configuration restrictions (dynamic IP address
mode, 58 assignment), 239
Ethernet link aggregation load sharing mode configuration restrictions (static IP address
for MAC-in-MAC traffic (global), 60 assignment), 242
Ethernet link aggregation local-first load customer-side port (dynamic IP address
sharing, 59 assignment), 240
Ethernet link aggregation packet type-based customer-side port (static IP address
load sharing, 48 assignment), 242
Ethernet link aggregation per-flow load DHCP snooping (dynamic IP address
sharing, 48 assignment), 240
Ethernet link aggregation per-packet load implementation, 235, 236
sharing, 48 network-side port (dynamic IP address
local assignment), 241
Ethernet link aggregation local-first load
sharing, 59
307
network-side port (static IP address mode configuration, 37
assignment), 243 queue length setting, 38
MAC address table MAC relay (LLDP agent), 254
address learning, 22 MAC-based VLAN
address synchronization, 30 assignment (dynamic), 157
ARP fast update enable, 32 assignment (static), 157
blackhole entry, 25 configuration, 154, 164
configuration, 22, 23, 35 configuration (server-assigned), 159
conversational remote MAC learning dynamic assignment, 155
enable, 34 dynamic assignment configuration
display, 35 restrictions, 157
dynamic aging timer, 28 server-assigned, 156
entry configuration, 24 static assignment, 154
entry configuration (global), 24 MAC-in-MAC
entry configuration (on interface), 25 Ethernet link aggregation group load sharing
entry creation, 22 mode for MAC-in-MAC traffic, 60
entry types, 22 maintaining
frame forwarding rule, 29 Ethernet interface, 16
learning limit setting set, 28 Ethernet link aggregation, 63
learning priority assignment, 29 Ethernet subinterface, 16
MAC address learning disable, 26 interface, 19
MAC address move suppression, 31 L2PT, 281
manual entries, 22 MVRP, 212
move notification, 31 spanning tree, 132
multiport unicast entry, 25 VLAN, 161
SNMP notification enable, 34 management address
static source check enable, 33 LLDP encoding format, 266
MAC addressing manual
Ethernet aggregate interface, 53 voice VLAN assignment mode, 195
Ethernet interface MAC address (Layer 3), 16 voice VLAN assignment mode configuration, 204
Ethernet subinterface MAC address (Layer voice VLAN port operation configuration, 199
3), 16 mapping
L2PT tunneled packet destination multicast 1:1 VLAN mapping, 233
MAC address, 281 1:2 VLAN mapping, 234
MAC-based VLAN assignment 2:2 VLAN mapping, 234
(dynamic), 155, 157
M:1 VLAN mapping, 233
MAC-based VLAN assignment
MSTP VLAN-to-instance mapping table, 96
(server-assigned), 156
master
MAC-based VLAN assignment
(static), 154, 157 MSTP master port, 97
MAC-based VLAN configuration, 154, 164 max age timer (STP), 90
MAC-based VLAN configuration maximum transmission unit. Use MTU
(server-assigned), 159 mCheck
VLAN frame encapsulation, 148 global performance, 119
MAC authentication interface view performance, 120
VLAN group configuration, 161 spanning tree, 119
MAC Information MDI mode (Ethernet interface), 14
change notification interval, 38 MDIX mode (Ethernet interface), 14
configuration, 37, 38 MED (LLDP-MED trapping), 270
configuration restrictions, 38 message
enable, 37 MRP JoinEmpty, 206
MRP JoinIn, 206
308
MRP Leave, 206 timers, 208
MRP LeaveAll, 206 MST
MRP New, 206 region max hops, 108
MRP timers, 208 MSTI
MIB calculation, 99
LLDP basic configuration, 261, 272 MRP, 206
LLDP configuration, 254, 260, 272 MST instance, 96
mode MSTP, 81, See also STP
Ethernet interface Auto MDIX (Layer 2), 14 basic concepts, 95
Ethernet interface link, 4 CIST, 97
Ethernet interface MDI (Layer 2), 14 CIST calculation, 99
Ethernet interface MDIX (Layer 2), 14 common root bridge, 97
Ethernet link aggregation dynamic, 43, 44 configuration, 105, 133
Ethernet link aggregation LACP operation CST, 96
active, 45 device implementation, 99
Ethernet link aggregation LACP operation feature enable, 118
passive, 45 features, 93
Ethernet link aggregation load sharing, 48 how it works, 98
Ethernet link aggregation static, 43, 43 IST, 97
LLDP customer bridge, 261 mode set, 106
LLDP disable, 259, 261 MST region, 96
LLDP Rx, 259, 261 MST region configuration, 106
LLDP service bridge, 261 MSTI, 96
LLDP Tx, 259, 261 MSTI calculation, 99
LLDP TxRx, 259, 261 port roles, 97
MAC Information syslog, 37 port states, 98
MAC Information trap, 37 protocol frames, 94
MVRP registration, 210 protocols and standards, 102
MVRP registration fixed, 209 rapid transition, 99
MVRP registration forbidden, 209 regional root, 97
MVRP registration normal, 209 relationships, 93
spanning tree mCheck, 119 spanning tree max age timer, 109
spanning tree MSTP, 106 spanning tree port mode configuration, 117
spanning tree PVST, 106 VLAN-to-instance mapping table, 96
spanning tree RSTP, 106 MTU
spanning tree STP, 106 Ethernet subinterface MTU setting (Layer 3), 16
voice VLAN assignment automatic, 194 Layer 3 Ethernet aggregate interface, 54
voice VLAN assignment manual, 195 multicast
voice VLAN port operation normal, 196 L2PT tunneled packet destination multicast MAC
voice VLAN port operation security, 196 address, 281
modifying multiple
MAC address table blackhole entry, 25 Multiple Registration Protocol. Use MRP
MAC address table entry (global), 24 VLAN registration protocol. Use MVRP
MAC address table entry (on interface), 25 Multiple Spanning Tree Protocol. Use MSTP
MAC address table multiport unicast entry, 25 multiport unicast entry (MAC address table), 22, 25
moving MVRP
MAC address table move notification, 31 configuration, 206, 209, 212
MRP configuration restrictions, 209
implementation, 206 display, 212
messages, 206 enable, 210
MVRP configuration, 206, 209, 212
309
GVRP compatibility, 212 Ethernet link aggregation (Layer 3 dynamic), 73
maintain, 212 Ethernet link aggregation (Layer 3 static), 71
MRP implementation, 206 Ethernet link aggregation (static mode), 43
protocols and standards, 209 Ethernet link aggregation configuration types, 42
registration mode setting, 210 Ethernet link aggregation edge aggregate
registration modes, 209 interface, 48
timer set, 211 Ethernet link aggregation LACP, 45
Ethernet link aggregation load sharing (Layer
N
2), 68
network Ethernet link aggregation load sharing (Layer
1:1 VLAN mapping configuration, 238, 245 3), 74
1:2 VLAN mapping configuration, 244, 251 Ethernet link aggregation member port
2:2 VLAN mapping configuration, 245, 251 state, 43, 46
conversational remote MAC learning, 34 Ethernet link aggregation modes, 43
Ethernet aggregate interface (Layer 3 Ethernet link aggregation operational key, 42
edge), 76 Ethernet link aggregation reference port, 46
Ethernet interface basic settings, 3 Ethernet link aggregation reference port
Ethernet interface bridging enable (Layer choice, 43
2), 15 Ethernet subinterface basic settings, 3
Ethernet interface cable connection (Layer Ethernet subinterface configuration (Layer 3), 16
2), 14 Ethernet subinterface MAC address (Layer 3), 16
Ethernet interface common settings Ethernet subinterface MTU setting (Layer 3), 16
configuration, 1 interface auto power-down, 9
Ethernet interface configuration (Layer 2), 11 interface configuration (inloopback), 19
Ethernet interface configuration (Layer 3), 16 interface configuration (loopback), 18
Ethernet interface connection distance (Layer interface configuration (null), 18
2), 15
IP subnet-based VLAN configuration, 159, 166
Ethernet interface EEE, 9
L2PT for LACP configuration, 283
Ethernet interface energy-saving features, 8
L2PT for STP configuration, 282
Ethernet interface fiber port (Layer 2), 12
L2PT tunneled packet destination multicast MAC
Ethernet interface generic flow control, 7 address, 281
Ethernet interface jumbo frame support, 5 Layer 2 forwarding configuration
Ethernet interface link mode, 4 (cut-through), 287
Ethernet interface loopback testing, 6 LLDP basic configuration, 261, 272
Ethernet interface MAC address (Layer 3), 16 LLDP configuration (CDP-compatible), 276
Ethernet interface MDIX mode (Layer 2), 14 loop detection enable, 143
Ethernet interface MTU setting (Layer 3), 16 loop detection interval, 142, 144
Ethernet interface PFC, 7 loop detection protection action setting, 144
Ethernet interface physical state change loop protection actions, 142
suppression, 5 M:1 VLAN mapping configuration, 239, 245
Ethernet interface split (40-GE), 2 M:1 VLAN mapping configuration (dynamic IP
Ethernet interface statistics polling interval, 9 address assignment), 239
Ethernet interface storm control (Layer 2), 11 M:1 VLAN mapping configuration (static IP
Ethernet interface storm suppression, 10 address assignment), 242
Ethernet interfaces combine (10-GE > M:1 VLAN mapping customer-side port (dynamic
40-GE), 2 IP address assignment), 240
Ethernet link aggregate interface (Layer 2 M:1 VLAN mapping customer-side port (static IP
edge), 70 address assignment), 242
Ethernet link aggregation (dynamic mode), 44 M:1 VLAN mapping network-side port (dynamic
Ethernet link aggregation (Layer 2 IP address assignment), 241
dynamic), 66 M:1 VLAN mapping network-side port (static IP
Ethernet link aggregation (Layer 2 static), 64 address assignment), 243
310
MAC address move suppression, 31 QinQ VLAN transparent transmission
MAC address table address configuration, 231
synchronization, 30 RSTP basic concepts, 91
MAC address table ARP fast update, 32 RSTP network convergence, 90
MAC address table blackhole entry, 25 RSTP port role, 91
MAC address table dynamic aging timer, 28 RSTP port state, 91
MAC address table entry configuration, 24 secondary VLAN Layer 3 communication
MAC address table entry types, 22 configuration, 189
MAC address table learning limit, 28 service loopback group configuration, 289
MAC address table learning priority, 29 spanning tree BPDU drop, 129
MAC address table move notification, 31 spanning tree BPDU guard, 126
MAC address table multiport unicast entry, 25 spanning tree BPDU transmission rate, 111
MAC address table SNMP notification, 34 spanning tree BPDU transparent transmission (on
MAC address table static source check, 33 port), 131
MAC Information configuration, 38 spanning tree Digest Snooping, 120, 121
MAC-based VLAN assignment (dynamic), 157 spanning tree dispute guard, 130
MAC-based VLAN assignment spanning tree edge port, 112
(server-assigned), 156 spanning tree inconsistent PVID protection
MAC-based VLAN assignment (static), 157 disable, 120
MAC-based VLAN configuration, 154, 164 spanning tree loop guard, 127
MAC-based VLAN configuration spanning tree mode set, 106
(server-assigned), 159 spanning tree No Agreement Check, 122, 124
management Ethernet interface spanning tree port link type, 116
configuration, 1 spanning tree port mode, 117
MRP timers, 208 spanning tree port path cost, 112, 115
MST region configuration, 106 spanning tree port priority, 116
MSTP basic concepts, 95 spanning tree port role restriction, 128
MSTP configuration, 133 spanning tree port state transition, 118
MVRP enable, 210 spanning tree priority, 108
MVRP timer set, 211 spanning tree protection, 126
port isolation group assignment (multiple spanning tree root bridge, 107
ports), 78 spanning tree root bridge (device), 107
port-based VLAN assignment (access spanning tree root guard, 127
port), 152 spanning tree secondary root bridge (device), 108
port-based VLAN assignment (hybrid spanning tree SNMP notification (new-root
port), 153 election, topology change events), 132
port-based VLAN assignment (trunk port), 153 spanning tree switched network diameter, 109
port-based VLAN configuration, 151 spanning tree TC BPDU event logging (PVST
private VLAN promiscuous port mode), 131
configuration, 179 spanning tree TC Snooping, 124
private VLAN trunk promiscuous port spanning tree TC-BPDU guard, 129
configuration, 182
spanning tree TC-BPDU transmission
private VLAN trunk promiscuous+secondary restriction, 128
port configuration, 185
STP algorithm calculation, 84
protocol-based VLAN configuration, 160, 167
STP basic concepts, 83
PVST basic concepts, 93
STP path cost, 84
PVST BPDU guard, 130
super VLAN configuration, 171, 173
PVST configuration, 137
super VLAN interface configuration, 172
QinQ basic configuration, 229
super VLAN sub-VLAN creation, 171
QinQ VLAN tag TPID value, 226
VLAN basic configuration, 149
QinQ VLAN transparent transmission, 225
VLAN group configuration, 161
311
VLAN interface, 150 service loopback group configuration, 288
VLAN mapping 1:1 implementation, 236 spanning tree configuration, 81, 102, 133
VLAN mapping 1:2 implementation, 237 super VLAN configuration, 171
VLAN mapping 2:2 implementation, 237 VLAN configuration, 148, 162
VLAN mapping M:1 implementation, 236 VLAN mapping configuration, 233, 238, 245
VLAN port-based configuration, 162 voice VLAN configuration, 192, 196
voice VLAN advertisement (CDP), 201 No Agreement Check (spanning tree), 122, 124
voice VLAN advertisement (LLDP), 200 no-learning action (loop detection), 142
voice VLAN assignment mode, 194 normal
voice VLAN assignment mode configuration voice VLAN operation mode, 196
(automatic), 202 notifying
voice VLAN assignment mode configuration MAC address table move notification, 31
(manual), 204 MAC address table SNMP notification, 34
voice VLAN configuration, 202 MAC Information change notification interval, 38
voice VLAN host+IP phone connection (in null interface
series), 193
configuration, 18, 18
voice VLAN information advertisement to IP
display, 19
phones, 193
maintain, 19
voice VLAN IP phone access method, 193
voice VLAN IP phone identification O
(LLDP), 193 operational key (Ethernet link aggregation), 42
voice VLAN IP phone identification (OUI organization-specific LLDPDU TLV types, 256
address), 192
OUI
voice VLAN IP phone+device connection, 194
voice VLAN IP phone identification (OUI
voice VLAN LLDP automatic IP phone address), 192
discovery enable, 200
voice VLAN IP phone identification method, 192
voice VLAN port operation configuration
(automatic assignment), 198 outputting
voice VLAN port operation configuration spanning tree port state transition
information, 118
(manual assignment), 199
voice VLAN port operation mode, 196 P
voice VLAN traffic QoS priority settings, 197 P/A transition (STP), 100
network management packet
Ethernet interface configuration, 1 1:1 VLAN mapping configuration, 238, 245
Ethernet link aggregation basic concepts, 41 1:2 VLAN mapping configuration, 244, 251
Ethernet link aggregation 2:2 VLAN mapping configuration, 245, 251
configuration, 41, 48, 64
Ethernet link aggregation group BFD, 56
interface bulk configuration, 20, 20
Ethernet link aggregation packet type-based load
interface configuration (inloopback), 18 sharing, 48
interface configuration (loopback), 18 L2PT configuration, 278, 280, 282
interface configuration (null), 18 L2PT for LACP configuration, 283
L2PT configuration, 278, 280, 282 L2PT for STP configuration, 282
LLDP basic concepts, 254 L2PT tunneled packet destination multicast MAC
LLDP configuration, 254, 260, 272 address, 281
loop detection, 141 LLDP CDP compatibility, 269
loop detection configuration, 143, 145 M:1 VLAN mapping configuration, 239, 245
MAC address table configuration, 22, 23, 35 M:1 VLAN mapping configuration (dynamic IP
MAC Information configuration, 37 address assignment), 239
MVRP, 206, 209, 212 M:1 VLAN mapping configuration (static IP
port isolation configuration, 78, 79 address assignment), 242
private VLAN configuration, 176, 177, 179 service loopback group configuration, 288, 289
QinQ configuration, 223, 229 VLAN mapping configuration, 233, 238, 245
312
parameter Ethernet link aggregation group (Layer 2
spanning tree timeout factor, 111 static), 49, 50
PE Ethernet link aggregation group (Layer 2), 49
L2PT configuration, 278, 280, 282 Ethernet link aggregation group (Layer 3
L2PT for LACP configuration, 283 dynamic), 51
L2PT for STP configuration, 282 Ethernet link aggregation group (Layer 3
static), 51
per-flow load sharing, 48
Ethernet link aggregation group (Layer 3), 51
performing
Ethernet link aggregation group load sharing, 58
spanning tree mCheck, 119
Ethernet link aggregation LACP, 45
spanning tree mCheck globally, 119
Ethernet link aggregation LACP port priority, 45
spanning tree mCheck in interface view, 120
Ethernet link aggregation load sharing (Layer
per-packet load sharing, 48
2), 68
Per-VLAN Spanning Tree Protocol. Use PVST
Ethernet link aggregation load sharing (Layer
PFC (Ethernet interface), 7 3), 74
physical Ethernet link aggregation load sharing algorithm
Ethernet interface physical state change settings, 59
suppression, 5 Ethernet link aggregation load sharing mode, 48
polling Ethernet link aggregation local-first load
Ethernet interface statistics polling interval, 9 sharing, 59
LLDP enable, 262 Ethernet link aggregation member port, 41
port Ethernet link aggregation member port
aggregate interface (MAC address), 53 state, 41, 43, 46
Ethernet aggregate interface, 52 Ethernet link aggregation modes, 43
Ethernet aggregate interface (description), 52 Ethernet link aggregation operational key, 42
Ethernet aggregate interface (Layer 3 Ethernet link aggregation reference port, 46
edge), 76 Ethernet link aggregation reference port
Ethernet interface fiber port (Layer 2), 12 choice, 43
Ethernet link aggregate group Selected ports Ethernet link aggregation traffic redirection, 60
min/max, 54 isolation. See port isolation
Ethernet link aggregate interface (expected Layer 2 aggregate interface (ignored VLAN), 53
bandwidth), 55 Layer 3 aggregate interface configuration
Ethernet link aggregate interface (Layer 2 (MTU), 54
edge), 70 link aggregation management subnet, 62
Ethernet link aggregate interface default link aggregation management
settings, 57 VLAN+management port, 61
Ethernet link aggregate interface LLDP basic configuration, 261, 272
shutdown, 57
LLDP configuration, 254, 260, 272
Ethernet link aggregation (dynamic mode), 44
LLDP disable operating mode, 259
Ethernet link aggregation (Layer 2
LLDP enable, 261
dynamic), 66
LLDP frame encapsulation format, 268
Ethernet link aggregation (Layer 2 static), 64
LLDP frame reception, 260
Ethernet link aggregation (Layer 3
dynamic), 73 LLDP frame transmission, 259
Ethernet link aggregation (Layer 3 static), 71 LLDP operating mode, 261
Ethernet link aggregation (static mode), 43 LLDP polling, 262
Ethernet link aggregation LLDP reinitialization delay, 262
configuration, 41, 48, 64 LLDP Rx operating mode, 259
Ethernet link aggregation configuration LLDP Tx operating mode, 259
types, 42 LLDP TxRx operating mode, 259
Ethernet link aggregation edge aggregate loop detection configuration, 141, 143, 145
interface, 48, 55 loop detection enable (port-specific), 143
Ethernet link aggregation group, 49 loop detection interval, 142, 144
313
loop detection protection action setting, 144 STP rapid transition, 99
loop detection protection actions, 142 STP root port, 83
loop detection status auto recovery, 142 STP root port rapid transition, 100
M:1 VLAN mapping customer-side port VLAN port link type, 151
(dynamic IP address assignment), 240 voice VLAN port operation configuration
M:1 VLAN mapping customer-side port (static (automatic assignment), 198
IP address assignment), 242 voice VLAN port operation configuration (manual
M:1 VLAN mapping network-side port assignment), 199
(dynamic IP address assignment), 241 voice VLAN port operation mode, 196
M:1 VLAN mapping network-side port (static port isolation
IP address assignment), 243 configuration, 78, 79
MAC address learning, 22 display, 78
MAC address table blackhole entry, 25 group assignment (multiple ports), 78
MAC address table configuration, 22, 23, 35 port-based VLAN
MAC address table entry configuration, 24 assignment (access port), 152
MAC address table multiport unicast entry, 25 assignment (hybrid port), 153
MAC Information configuration, 37, 38 assignment (trunk port), 153
MST port roles, 97 configuration, 151, 162
MST port states, 98 port frame handling, 152
MVRP application, 206, 209, 212 port link type, 151
MVRP timer set, 211 PVID, 151
PVST BPDU guard, 130 power
QinQ implementation, 224 Ethernet interface auto power-down, 9
RSTP network convergence, 90 Ethernet interface EEE, 9
service loopback group Ethernet interface energy-saving features, 8
configuration, 288, 289
priority
spanning tree BPDU drop, 129
Ethernet link aggregation LACP, 45
spanning tree BPDU guard, 126
Ethernet link aggregation LACP port priority, 45
spanning tree BPDU transmission rate, 111
Ethernet link aggregation LACP system
spanning tree BPDU transparent transmission priority, 45
(on port), 131
MAC address table learning priority, 29
spanning tree dispute guard, 130
priority-based flow control. Use PFC
spanning tree edge port configuration, 112
QinQ SVLAN tag 802.1p priority, 227
spanning tree forward delay timer, 109
spanning tree device priority, 108
spanning tree loop guard, 127
spanning tree port priority configuration, 116
spanning tree mCheck, 119
private VLAN
spanning tree path cost calculation
configuration, 176, 177, 179
standard, 113
configuration restrictions, 177
spanning tree path cost
configuration, 112, 115 display, 179
spanning tree port link type configuration, 116 promiscuous port configuration, 179
spanning tree port mode configuration, 117 secondary VLAN Layer 3 communication
configuration, 189
spanning tree port priority configuration, 116
trunk promiscuous port configuration, 182
spanning tree port role restriction, 128
trunk promiscuous+secondary port
spanning tree port state transition output, 118
configuration, 185
spanning tree root guard, 127
procedure
spanning tree TC-BPDU guard, 129
adding MAC address table blackhole entry, 25
spanning tree TC-BPDU transmission
adding MAC address table entry (global), 24
restriction, 128
adding MAC address table entry (on interface), 25
STP designated port, 83
adding MAC address table multiport unicast
STP edge port rapid transition, 99
entry, 25
STP port state, 83
314
assigning MAC address table learning priority configuring Ethernet link aggregation (Layer 3
to interface, 29 static), 71
assigning port isolation group (multiple configuring Ethernet link aggregation edge
ports), 78 aggregate interface, 55
assigning port-based VLAN access port, 152 configuring Ethernet link aggregation group, 49
assigning port-based VLAN access port configuring Ethernet link aggregation group
(interface view), 153 (Layer 2 dynamic), 50
assigning port-based VLAN access port configuring Ethernet link aggregation group
(VLAN view), 152 (Layer 2 static), 49
assigning port-based VLAN hybrid port, 153 configuring Ethernet link aggregation group
assigning port-based VLAN trunk port, 153 (Layer 3 dynamic), 51
bulk configuring interfaces, 20, 20 configuring Ethernet link aggregation group
combining Ethernet interfaces (10-GE > (Layer 3 static), 51
40-GE), 2 configuring Ethernet link aggregation group
configuring 1:1 VLAN mapping, 238, 245 BFD, 56
configuring 1:2 VLAN mapping, 244, 251 configuring Ethernet link aggregation group load
sharing, 58
configuring 2:2 VLAN mapping, 245, 251
configuring Ethernet link aggregation load sharing
configuring Ethernet aggregate interface, 52
(Layer 2), 68
configuring Ethernet aggregate interface
configuring Ethernet link aggregation load sharing
(description), 52
(Layer 3), 74
configuring Ethernet aggregate interface
configuring Ethernet link aggregation load sharing
(Layer 3 edge), 76
algorithm settings, 59
configuring Ethernet interface (Layer 2), 11
configuring Ethernet subinterface (Layer 3), 16
configuring Ethernet interface (Layer 3), 16
configuring Ethernet subinterface basic
configuring Ethernet interface auto settings, 3
power-down, 9
configuring interface (inloopback), 19
configuring Ethernet interface basic settings, 3
configuring interface (loopback), 18
configuring Ethernet interface common
configuring interface (null), 18
settings, 1
configuring IP subnet-based VLAN, 159, 166
configuring Ethernet interface EEE, 9
configuring L2PT, 280
configuring Ethernet interface energy-saving
features, 8 configuring L2PT for LACP, 283
configuring Ethernet interface generic flow configuring L2PT for STP, 282
control, 7 configuring LAN switching QinQ VLAN tag TPID
configuring Ethernet interface jumbo frame value, 226
support, 5 configuring Layer 2 forwarding (cut-through), 287
configuring Ethernet interface link mode, 4 configuring LLDP, 260
configuring Ethernet interface PFC, 7 configuring LLDP (CDP-compatible), 276
configuring Ethernet interface physical state configuring LLDP advertisable TLVs, 263
change suppression, 5 configuring LLDP basics, 261, 272
configuring Ethernet interface storm control configuring LLDP CDP compatibility, 269
(Layer 2), 11 configuring LLDP management address, 266
configuring Ethernet interface storm configuring LLDP management address encoding
suppression, 10 format, 266
configuring Ethernet link aggregate interface configuring LLDP trapping, 270
(Layer 2 edge), 70 configuring LLDP-MED trapping, 270
configuring Ethernet link aggregation, 48 configuring loop detection, 143, 145
configuring Ethernet link aggregation (Layer 2 configuring M:1 VLAN mapping, 239, 245
dynamic), 66
configuring M:1 VLAN mapping (dynamic IP
configuring Ethernet link aggregation (Layer 2 address assignment), 239
static), 64
configuring M:1 VLAN mapping (static IP address
configuring Ethernet link aggregation (Layer 3 assignment), 242
dynamic), 73
315
configuring M:1 VLAN mapping customer-side configuring spanning tree BPDU transmission
port (dynamic IP address assignment), 240 rate, 111
configuring M:1 VLAN mapping customer-side configuring spanning tree device priority, 108
port (static IP address assignment), 242 configuring spanning tree Digest
configuring M:1 VLAN mapping network-side Snooping, 120, 121
port (dynamic IP address assignment), 241 configuring spanning tree edge port, 112
configuring M:1 VLAN mapping network-side configuring spanning tree No Agreement
port (static IP address assignment), 243 Check, 122, 124
configuring MAC address move configuring spanning tree port link type, 116
suppression, 31 configuring spanning tree port mode for MSTP
configuring MAC address table, 23, 35 frames, 117
configuring MAC address table frame configuring spanning tree port path cost, 112, 115
forwarding rule, 29 configuring spanning tree port priority, 116
configuring MAC address table multiport configuring spanning tree port role restriction, 128
unicast entry (global), 26
configuring spanning tree protection, 126
configuring MAC address table multiport
configuring spanning tree root bridge, 107
unicast entry (on interface), 26
configuring spanning tree root bridge
configuring MAC Information, 38
(device), 107
configuring MAC Information mode, 37
configuring spanning tree secondary root
configuring MAC-based VLAN, 154, 164 bridge, 107
configuring MAC-based VLAN configuring spanning tree secondary root bridge
(server-assigned), 159 (device), 108
configuring MAC-based VLAN assignment configuring spanning tree switched network
(dynamic), 157 diameter, 109
configuring MAC-based VLAN assignment configuring spanning tree TC Snooping, 124
(static), 157
configuring spanning tree TC-BPDU transmission
configuring management Ethernet interface, 1 restriction, 128
configuring MST region, 106 configuring spanning tree timeout factor, 111
configuring MST region max hops, 108 configuring spanning tree timer, 109
configuring MSTP, 105, 133 configuring STP, 103
configuring MVRP, 209, 212 configuring super VLAN, 171, 171, 173
configuring port-based VLAN, 151, 162 configuring super VLAN interface, 172
configuring private VLAN, 176, 177 configuring VLAN basic settings, 149
configuring private VLAN promiscuous configuring VLAN group, 161
port, 179
configuring VLAN interface, 150
configuring private VLAN trunk promiscuous
configuring VLAN mapping, 238
port, 182
configuring voice VLAN, 196
configuring private VLAN trunk
promiscuous+secondary port, 185 configuring voice VLAN advertisement
(CDP), 201
configuring protocol-based VLAN, 160, 167
configuring voice VLAN advertisement
configuring PVST, 104, 137
(LLDP), 200
configuring QinQ basics, 229
configuring voice VLAN assignment mode
configuring QinQ CVLAN tag TPID value, 227 (automatic), 202
configuring QinQ SVLAN tag TPID value, 227 configuring voice VLAN assignment mode
configuring QinQ VLAN transparent (manual), 204
transmission, 225, 231 configuring voice VLAN port operation (automatic
configuring RSTP, 103 assignment), 198
configuring secondary VLAN Layer 3 configuring voice VLAN port operation (manual
communication, 189 assignment), 199
configuring service loopback group, 288, 289 configuring voice VLAN traffic QoS priority
configuring spanning tree, 102 settings, 197
configuring spanning tree BPDU guard, 126 creating super VLAN sub-VLAN, 171
disabling LLDP PVID inconsistency check, 269
316
disabling MAC address learning (global), 27 enabling MAC address table ARP fast update, 32
disabling MAC address learning (on enabling MAC address table move notification, 31
interface), 27 enabling MAC address table SNMP
disabling MAC address learning (on notification, 34
VLAN), 27 enabling MAC Information, 37
disabling MAC address table static source enabling MVRP, 210
check, 33 enabling MVRP GVRP compatibility, 212
disabling spanning tree inconsistent PVID enabling PVST BPDU guard, 130
protection, 120
enabling QinQ, 225
displaying bulk interface configuration, 21
enabling spanning tree BPDU drop, 129
displaying Ethernet interface, 16
enabling spanning tree BPDU guard (global), 126
displaying Ethernet link aggregation, 63
enabling spanning tree BPDU guard (on
displaying Ethernet subinterface, 16 interface), 126
displaying interface, 19 enabling spanning tree BPDU transparent
displaying L2PT, 281 transmission (on port), 131
displaying LLDP, 271 enabling spanning tree dispute guard, 130
displaying loop detection, 145 enabling spanning tree feature, 118
displaying MAC address table, 35 enabling spanning tree loop guard, 127
displaying MVRP, 212 enabling spanning tree port state transition
displaying port isolation, 78 information output, 118
displaying private VLAN, 179 enabling spanning tree root guard, 127
displaying QinQ, 228 enabling spanning tree SNMP notification
displaying service loopback group, 289 (new-root election, topology change events), 132
displaying spanning tree, 132 enabling spanning tree TC BPDU event logging
displaying super VLAN, 172 (PVST mode), 131
displaying VLAN, 161 enabling spanning tree TC-BPDU guard, 129
displaying VLAN mapping, 245 enabling voice VLAN LLDP automatic IP phone
discovery, 200
displaying voice VLAN, 202
forcing Ethernet interface fiber port (Layer 2), 12
enable Ethernet interface bridging (Layer
2), 15 maintaining Ethernet interface, 16
enabling conversational remote MAC maintaining Ethernet link aggregation, 63
learning, 34 maintaining Ethernet subinterface, 16
enabling Ethernet interface loopback maintaining interface, 19
testing, 6 maintaining L2PT, 281
enabling Ethernet link aggregation local-first maintaining MVRP, 212
load sharing, 59 maintaining spanning tree, 132
enabling Ethernet link aggregation traffic maintaining VLAN, 161
redirection, 60 modifying MAC address table blackhole entry, 25
enabling L2PT, 280 modifying MAC address table entry (global), 24
enabling L2PT (for protocol), 280 modifying MAC address table entry (on
enabling LLDP, 261 interface), 25
enabling LLDP polling, 262 modifying MAC address table multiport unicast
enabling loop detection (global), 143 entry, 25
enabling loop detection (port-specific), 143 performing spanning tree mCheck, 119
enabling M:1 VLAN mapping ARP detection performing spanning tree mCheck globally, 119
(dynamic IP address assignment), 240 performing spanning tree mCheck in interface
enabling M:1 VLAN mapping ARP snooping view, 120
(static IP address assignment), 242 restoring Ethernet link aggregate interface default
enabling M:1 VLAN mapping DHCP snooping settings, 57
(dynamic IP address assignment), 240 setting Ethernet aggregate interface (MAC
enabling MAC address synchronization, 30 address), 53
317
setting Ethernet interface connection distance specifying link aggregation management
(Layer 2), 15 subnet, 62, 62
setting Ethernet interface MAC address specifying link aggregation management
(Layer 3), 16 VLAN+management port, 61, 61
setting Ethernet interface MDIX mode (Layer specifying spanning tree port path cost calculation
2), 14 standard, 113
setting Ethernet interface MTU (Layer 3), 16 splitting Ethernet interface (40-GE), 2
setting Ethernet interface statistics polling testing Ethernet interface cable connection (Layer
interval, 9 2), 14
setting Ethernet link aggregate group promiscuous
Selected ports min/max, 54 private VLAN promiscuous port configuration, 179
setting Ethernet link aggregate interface private VLAN trunk promiscuous port
(expected bandwidth), 55 configuration, 182
setting Ethernet link aggregation load sharing private VLAN trunk promiscuous+secondary port
mode (global), 58 configuration, 185
setting Ethernet link aggregation load sharing protecting
mode (group-specific), 58 loop detection protection action setting, 144
setting Ethernet link aggregation load sharing spanning tree protection, 126
mode for MAC-in-MAC traffic (global), 60
spanning tree SNMP notification (new-root
setting Ethernet subinterface MAC address election, topology change events), 132
(Layer 3), 16
protocol-based VLAN
setting Ethernet subinterface MTU (Layer
configuration, 160, 167
3), 16
protocols and standards
setting L2PT tunneled packet destination
multicast MAC address, 281 Ethernet link aggregation protocol
configuration, 42
setting Layer 3 aggregate interface (MTU), 54
LLDP, 260
setting LLDP bridge mode, 261
MSTP, 102
setting LLDP frame encapsulation format, 268
MSTP protocol frames, 94
setting LLDP operating mode, 261
MVRP, 209
setting LLDP parameters, 267
PVST protocol frames, 92
setting LLDP reinitialization delay, 262
QinQ, 225
setting loop detection interval, 144
RSTP protocol frames, 90
setting loop detection protection action
(global), 144 STP protocol frames, 81
setting loop detection protection action (Layer VLAN, 149
2 aggregate interface), 144 PVID
setting loop detection protection action (Layer spanning tree inconsistent PVID protection
2 Ethernet interface), 144 disable, 120
setting MAC address table dynamic aging PVID (port-based VLAN), 151
timer, 28 PVST, 81, See also STP
setting MAC address table learning limit, 28 basic concepts, 93
setting MAC Information change notification configuration, 104, 137
interval, 38 feature enable, 119
setting MAC Information queue length, 38 how it works, 93
setting MVRP registration mode, 210 mode set, 106
setting MVRP timer, 211 port links, 92
setting QinQ SVLAN tag 802.1p priority, 227 protocol frames, 92
setting spanning tree mode, 106 rapid transition, 99
shutting down Ethernet link aggregate spanning tree TC BPDU event logging (PVST
interface, 57 mode), 131
specifying Layer 2 aggregate interface
(ignored VLAN), 53 Q
QinQ
318
basic configuration, 229 Ethernet interface storm suppression, 10
configuration, 223, 229 Ethernet link aggregation BFD configuration, 56
configuration restrictions, 225 Ethernet link aggregation group, 49
CVLAN tag, 223 Ethernet link aggregation traffic redirection, 61
display, 228 L2PT enable, 280
enable, 225 Layer 2 Ethernet interface fiber port, 13
how it works, 223 Layer 2 Ethernet interface storm control
implementation, 224 configuration, 11
loop detection configuration, 141, 143, 145 M:1 VLAN mapping configuration (dynamic IP
protocols and standards, 225 address assignment), 239
SVLAN tag, 223 M:1 VLAN mapping configuration (static IP
address assignment), 242
SVLAN tag 802.1p priority, 227
MAC Information configuration, 38
VLAN tag TPID value, 226
MAC-based VLAN assignment configuration
VLAN transparent transmission, 225
(dynamic), 157
VLAN transparent transmission
MVRP configuration, 209
configuration, 231
private VLAN configuration, 177
QoS
QinQ configuration, 225
QinQ SVLAN tag 802.1p priority, 227
spanning tree port role restriction, 128
voice VLAN traffic QoS priority settings, 197
spanning tree TC-BPDU transmission
queuing
restriction, 128
MAC Information queue length, 38
STP Digest Snooping configuration, 121
R STP edge port configuration, 112
Rapid Spanning Tree Protocol. Use RSTP STP mCheck configuration, 119
rate STP port link type configuration, 116
spanning tree BPDU transmission rate, 111 STP TC Snooping configuration, 125
receiving STP timer configuration, 110
LLDP frames, 260 VLAN configuration, 157
recovering voice VLAN LLDP automatic IP phone discovery
loop detection port status auto recovery, 142 enable, 200
redirecting voice VLAN port operation configuration
(automatic assignment), 198
Ethernet link aggregation traffic redirection, 60
voice VLAN port operation configuration
reference port (Ethernet link aggregation), 43, 46 restrictions (manual assignment), 199
region root
MST, 96 MST common root bridge, 97
MST region configuration, 106 MST regional root, 97
MST region max hops, 108 MST root port role, 97
MST regional root, 97 spanning tree root bridge, 107
registering spanning tree root bridge (device), 107
MVRP registration fixed mode, 209 spanning tree root guard, 127
MVRP registration forbidden mode, 209 spanning tree secondary root bridge (device), 108
MVRP registration mode, 210 STP algorithm calculation, 84
MVRP registration normal mode, 209 STP edge port rapid transition, 100
reinitialization delay (LLDP), 262
STP root bridge, 83
restoring
STP root port, 83
Ethernet link aggregate interface default
routing
settings, 57
IP subnet-based VLAN configuration, 159, 166
restrictions
MAC-based VLAN assignment (dynamic), 157
bulk interface configuration, 20
MAC-based VLAN assignment (static), 157
Ethernet interface loopback test, 6
MAC-based VLAN configuration, 154, 164
Ethernet interface PFC configuration, 8
319
MAC-based VLAN configuration Ethernet link aggregate group Selected ports
(server-assigned), 159 min/max, 54
protocol-based VLAN configuration, 160, 167 Ethernet link aggregate interface (expected
voice VLAN configuration, 192, 196, 202 bandwidth), 55
voice VLAN IP phone access method, 193 Ethernet link aggregation load sharing mode
RSTP, 81, See also STP (global), 58
basic concepts, 91 Ethernet link aggregation load sharing mode
(group-specific), 58
BPDU processing, 92
Ethernet link aggregation load sharing mode for
configuration, 103
MAC-in-MAC traffic (global), 60
feature enable, 118
Ethernet link aggregation member port
how it works, 91 state, 43, 46
mode set, 106 Ethernet subinterface MAC address (Layer 3), 16
MSTP device implementation, 99 Ethernet subinterface MTU (Layer 3), 16
network convergence, 90 L2PT tunneled packet destination multicast MAC
port role, 91 address, 281
port state, 91 Layer 3 aggregate interface (MTU), 54
protocol frames, 90 LLDP bridge mode, 261
rapid transition, 99 LLDP frame encapsulation format, 268
rule LLDP operating mode, 261
MAC address table frame forwarding rule, 29 LLDP parameters, 267
S LLDP reinitialization delay, 262
loop detection interval, 144
security
loop detection protection action (global), 144
voice VLAN operation mode, 196
loop detection protection action (Layer 2
selecting aggregate interface), 144
Ethernet link aggregation Selected ports loop detection protection action (Layer 2 Ethernet
min/max, 54
interface), 144
Ethernet link aggregation selected state, 41
MAC address table dynamic aging timer, 28
Ethernet link aggregation unselected state, 41
MAC address table learning limit, 28
series
MAC Information change notification interval, 38
voice VLAN host+IP phone connection (in
MAC Information queue length, 38
series), 193
MVRP registration mode, 210
server
MVRP timer, 211
MAC-based VLAN assignment
(server-assigned), 156 QinQ SVLAN tag 802.1p priority, 227
MAC-based VLAN configuration spanning tree mode, 106
(server-assigned), 159 shutting down
service Ethernet link aggregate interface, 57
LLDP service bridge mode, 261 loop detection shutdown action, 142
service loopback group SNAP
configuration, 288, 289 LLDP frame encapsulation, 255
display, 289 LLDP frame encapsulation format, 268
setting SNMP
Ethernet aggregate interface (MAC MAC address table SNMP notification, 34
address), 53 MAC Information configuration, 37, 38
Ethernet interface connection distance (Layer snooping
2), 15 spanning tree Digest Snooping, 120, 121
Ethernet interface MAC address (Layer 3), 16 spanning tree TC Snooping, 124
Ethernet interface MDIX mode (Layer 2), 14 source
Ethernet interface MTU (Layer 3), 16 MAC address table static source check, 33
Ethernet interface statistics polling interval, 9 spanning tree, 81, See also STP, RSTP, PVST, MSTP
BPDU drop, 129
320
BPDU guard configuration, 126 Ethernet interface state change suppression, 5
BPDU transmission rate configuration, 111 Ethernet link aggregation member port
BPDU transparent transmission (on port), 131 state, 41, 43, 46
configuration, 81, 102, 133 static
device priority configuration, 108 Ethernet link aggregation (Layer 2), 64
Digest Snooping, 120, 121 Ethernet link aggregation (Layer 3), 71
display, 132 Ethernet link aggregation (static mode), 43
dispute guard enable, 130 Ethernet link aggregation group, 49, 51
edge port configuration, 112 Ethernet link aggregation group BFD, 56
feature enable, 118 Ethernet link aggregation mode, 43
inconsistent PVID protection disable, 120 Layer 2 Ethernet link aggregation group, 49
loop guard enable, 127 Layer 3 Ethernet link aggregation group, 51
maintain, 132 MAC address table entry, 22
mCheck, 119 MAC address table entry configuration
mode set, 106 (global), 24
MST region max hops, 108 MAC address table entry configuration (on
interface), 25
No Agreement Check, 122, 124
MAC address table static source check, 33
port link type configuration, 116
MAC-based VLAN assignment, 154, 157
port mode configuration, 117
statistics
port path cost calculation standard, 113
Ethernet interface statistics polling interval, 9
port path cost configuration, 112, 115
storm
port priority configuration, 116
Ethernet interface storm control (Layer 2), 11
port role restriction, 128
Ethernet interface storm suppression, 10
port state transition output, 118
STP
protection configuration, 126
algorithm calculation, 84
PVST BPDU guard, 130
basic concepts, 83
root bridge configuration, 107
BPDU forwarding, 89
root bridge configuration (device), 107
configuration, 103
root guard enable, 127
configuration BPDUs, 81
secondary root bridge configuration
(device), 108 designated bridge, 83
SNMP notification enable (new-root election, designated port, 83
topology change events), 132 Digest Snooping configuration restrictions, 121
switched network diameter, 109 edge port configuration restrictions, 112
TC BPDU event logging (PVST mode), 131 feature enable, 118
TC Snooping, 124 L2PT for STP configuration, 282
TC-BPDU guard, 129 loop detection, 81
TC-BPDU transmission restriction, 128 mCheck configuration restrictions, 119
timeout factor configuration, 111 mode set, 106
timer configuration, 109 MSTP device implementation, 99
specifying P/A transition, 100
Layer 2 aggregate interface (ignored path cost, 84
VLAN), 53 port link type configuration restrictions, 116
link aggregation management subnet, 62 port state, 83
link aggregation management protocol frames, 81
VLAN+management port, 61 root bridge, 83
spanning tree port path cost calculation root port, 83
standard, 113 TC Snooping configuration restrictions, 125
splitting TCN BPDUs, 82
Ethernet interface (40-GE), 2 timer configuration restrictions, 110
state timers, 90
321
subinterface, 1, See also Ethernet subinterface M:1 VLAN mapping configuration (dynamic IP
subnetting address assignment), 239
IP subnet-based VLAN M:1 VLAN mapping configuration (static IP
configuration, 159, 166 address assignment), 242
sub-VLAN QinQ CVLAN, 223
creation, 171 QinQ SVLAN, 223
super VLAN QinQ SVLAN tag 802.1p priority, 227
configuration, 171, 171, 173 QinQ VLAN tag TPID value, 226
display, 172 VLAN mapping configuration, 233, 238, 245
interface configuration, 172 TC Snooping (spanning tree), 124
sub-VLAN creation, 171 TC-BPDU
suppressing spanning tree TC-BPDU guard, 129
Ethernet interface physical state change, 5 spanning tree TC-BPDU transmission
Ethernet interface storm control configuration restriction, 128
(Layer 2), 11 testing
Ethernet interface storm suppression, 10 Ethernet interface cable connection (Layer 2), 14
suppression time
MAC address move, 31 Ethernet link aggregation LACP timeout
SVLAN interval, 45
QinQ basic configuration, 229 timeout
QinQ configuration, 223, 229 Ethernet link aggregation LACP long timeout
interval, 45
QinQ SVLAN tag 802.1p priority, 227
Ethernet link aggregation LACP short timeout
QinQ VLAN transparent transmission
interval, 45
configuration, 231
spanning tree timeout factor, 111
VLAN mapping application scenario, 233
timer
VLAN mapping configuration, 233, 238, 245
LLDP reinitialization delay, 262
VLAN mapping implementation, 235
MAC address table dynamic aging, 28
switching
MRP Join, 208
Ethernet interface configuration, 1
MRP Leave, 208
interface configuration (inloopback), 18, 19
MRP LeaveAll, 208
interface configuration (loopback), 18, 18
MRP Periodic, 208
interface configuration (null), 18, 18
MVRP set, 211
spanning tree switched network diameter, 109
spanning tree forward delay, 109
synchronizing
spanning tree hello, 109
MAC addresses, 30
spanning tree max age, 109
syslog
STP forward delay, 90
MAC Information configuration, 37, 38
STP hello, 90
MAC Information mode configuration, 37
STP max age, 90
system
TLV
interface bulk configuration, 20, 20
LLDP advertisable TLV configuration, 263
T LLDP management address configuration, 266
table LLDP management address encoding
MAC address, 22, 23, 35 format, 266
MAC address table learning limit, 28 LLDP parameters, 267
MSTP VLAN-to-instance mapping table, 96 LLDPDU basic management types, 256
tag LLDPDU LLDP-MED types, 256
1:1 VLAN mapping configuration, 238, 245 LLDPDU management address TLV, 259
1:2 VLAN mapping configuration, 244, 251 LLDPDU organization-specific types, 256
2:2 VLAN mapping configuration, 245, 251 topology
M:1 VLAN mapping configuration, 239, 245 PVST BPDU protocol frames, 92
322
STP TCN BPDU protocol frames, 81 L2PT for STP configuration, 282
traffic Layer 2 Ethernet aggregate interface (ignored
Ethernet link aggregation traffic redirection, 60 VLAN), 53
private VLAN configuration, 177, 179 link aggregation management subnet, 62
voice VLAN traffic QoS priority settings, 197 link aggregation management
transmitting VLAN+management port, 61
LLDP frames, 259 LLDP CDP compatibility, 269
QinQ VLAN transparent LLDP configuration (CDP-compatible), 276
transmission, 225, 231 loop detection configuration, 141, 143, 145
spanning tree TC-BPDU transmission MAC address learning disable, 27
restriction, 128 MAC-based assignment (dynamic), 157
transparent transmission (QinQ for MAC-based assignment (static), 157
VLAN), 225, 231 MAC-based configuration, 164
trapping MAC-based VLAN configuration, 154
LLDP configuration, 270 MAC-based VLAN configuration
LLDP-MED configuration, 270 (server-assigned), 159
MAC Information configuration, 37, 38 maintain, 161
MAC Information mode configuration, 37 mapping. See VLAN mapping
trunk port MRP implementation, 206
port-based VLAN assignment (trunk port), 153 MSTP VLAN-to-instance mapping table, 96
private VLAN trunk promiscuous port MVRP configuration, 206, 209, 212
configuration, 182 MVRP GVRP compatibility, 212
private VLAN trunk promiscuous+secondary port isolation configuration, 78, 79
port configuration, 185 port link type, 151
tunneling port-based configuration, 151, 162
L2PT configuration, 278, 280, 282 port-based VLAN assignment (access port), 152
L2PT enable, 280 port-based VLAN assignment (hybrid port), 153
L2PT for LACP configuration, 283 port-based VLAN assignment (trunk port), 153
L2PT for STP configuration, 282 port-based VLAN frame handling, 152
L2PT tunneled packet destination multicast private VLAN configuration, 176, 177
MAC address, 281
private VLAN configuration restrictions, 177
U protocol-based VLAN configuration, 160, 167
unicast protocols and standards, 149
MAC address table configuration, 22, 23, 35 PVID, 151
MAC address table multiport unicast entry, 22 PVST, 92
QinQ basic configuration, 229
V
QinQ configuration, 223, 229
virtual QinQ CVLAN tag, 223
Virtual Local Area Network. Use VLAN QinQ implementation, 224
VLAN QinQ SVLAN tag, 223
basic configuration, 149 QinQ SVLAN tag 802.1p priority, 227
configuration, 148, 162 QinQ transparent transmission, 225
configuration restrictions, 157 QinQ VLAN tag TPID value, 226
display, 161 QinQ VLAN transparent transmission
frame encapsulation, 148 configuration, 231
group configuration, 161 spanning tree inconsistent PVID protection
interface configuration, 150 disable, 120
IP subnet-based VLAN super VLAN configuration, 171, 171, 173
configuration, 159, 166 super VLAN interface configuration, 172
L2PT configuration, 278, 280, 282 termination. See VLAN termination
L2PT for LACP configuration, 283 voice VLAN advertisement (CDP), 201
323
voice VLAN advertisement (LLDP), 200 assignment mode+IP phone cooperation, 195
voice VLAN assignment mode configuration configuration, 192, 196, 202
(automatic), 202 display, 202
voice VLAN assignment mode configuration host+IP phone connection (in series), 193
(manual), 204 information advertisement to IP phone, 193
voice VLAN configuration, 192, 196, 202 IP phone access method, 193
voice VLAN host+IP phone connection (in IP phone identification (LLDP), 193
series), 193
IP phone identification (OUI address), 192
voice VLAN IP phone access method, 193
IP phone identification method, 192
voice VLAN IP phone+device connection, 194
IP phone+device connection, 194
voice VLAN LLDP automatic IP phone
LLDP automatic IP phone discovery enable, 200
discovery enable, 200
LLDP automatic IP phone discovery enable
voice VLAN port operation configuration
restrictions, 200
(automatic assignment), 198
port operation configuration (automatic
voice VLAN port operation configuration
assignment), 198
(manual assignment), 199
port operation configuration (manual
voice VLAN port operation configuration
assignment), 199
restrictions (automatic assignment), 198
port operation configuration restrictions
voice VLAN port operation configuration
(automatic assignment), 198
restrictions (manual assignment), 199
port operation configuration restrictions (manual
voice VLAN port operation mode, 196
assignment), 199
voice VLAN traffic QoS priority settings, 197
port operation mode, 196
VLAN mapping
traffic QoS priority setting configuration, 197
1:1 application scenario, 233, 233
VoIP
1:1 configuration, 238, 245
voice VLAN configuration, 192, 196, 202
1:1 implementation, 235, 236
voice VLAN information advertisement to IP
1:2 application scenario, 233, 234 phones, 193
1:2 configuration, 244, 251 voice VLAN IP phone access method, 193
1:2 implementation, 235, 237 voice VLAN IP phone identification (LLDP), 193
2:2 application scenario, 233, 234 voice VLAN IP phone identification (OUI
2:2 configuration, 245, 251 address), 192
2:2 implementation, 235, 237 VPN
configuration, 233, 238, 245 QinQ basic configuration, 229
display, 245 QinQ configuration, 223, 229
M:1 application scenario, 233, 233 QinQ VLAN transparent transmission
M:1 configuration, 239, 245 configuration, 231
M:1 configuration (dynamic IP address
assignment), 239
M:1 configuration (static IP address
assignment), 242
M:1 implementation, 235, 236
voice traffic
LLDP CDP compatibility, 269
LLDP configuration (CDP-compatible), 276
voice VLAN
advertisement configuration (CDP), 201
advertisement configuration (LLDP), 200
assignment mode (automatic), 194
assignment mode (manual), 195
assignment mode configuration
(automatic), 202
assignment mode configuration (manual), 204
324