03 Layer 2 - LAN Switching Configuration Guide-Book
03 Layer 2 - LAN Switching Configuration Guide-Book
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H3Care, , IRF, NetPilot, Netflow, SecEngine,
SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of Hangzhou H3C
Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S5830V2 & S5820V2 documentation set describes the software features for the H3C
S5830V2 & S5820V2 Switch Series and guide you through the software configuration procedures.
These guides also provide configuration examples to help you apply software features to different
network scenarios.
The Layer 2—LAN Switching Configuration Guide describes features and tasks that help you get
started with the device, including:
• Flow control and load sharing.
• User isolation in the same VLAN and VLAN configuration.
• Layer 2 loop elimination.
• Transmission of customer network packets over the service provider network.
• VLAN tag manipulations.
This preface includes the following topics about the documentation:
• Audience.
• Conventions.
• About the H3C S5830V2 & S5820V2 documentation set
• Obtaining documentation.
• Technical support.
• Documentation feedback.
Audience
This documentation is intended for:
• Network planners.
• Field technical support and servicing engineers.
• Network administrators working with the H3C S5830V2 & S5820V2 switch series.
Conventions
This section describes the conventions used in the documentation.
Port numbering in examples
The port numbers in the documentation are for illustration only and might be unavailable on your
device.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
[ x | y | ... ] Square brackets enclose a set of optional syntax choices separated by vertical bars,
Convention Description
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
{ x | y | ... } *
bars, from which you select at least one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
[ x | y | ... ] *
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
&<1-n>
can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in Boldface. For
Boldface
example, the New User window appears; click OK.
Multi-level menus are separated by angle brackets. For example, File > Create >
>
Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed
WARNING! can result in personal injury.
An alert that calls attention to important information that if not understood or followed
CAUTION: can result in data loss, data corruption, or damage to hardware or software.
Convention Description
T Wireless terminator.
Represents omnidirectional signals.
Represents a security card, such as a firewall, load balancing, NetStream, SSL VPN,
IPS, or ACG card.
Operations and MIB Companion Describes the MIBs for the software release.
Category Documents Purposes
maintenance Provide information about the product release,
including the version history, hardware and
Release notes software compatibility matrix, version upgrade
information, technical support information, and
software upgrading.
Obtaining documentation
Access the most up-to-date H3C product documentation on the World Wide Web
at http://www.h3c.com.
Click the following links to obtain different categories of product documentation:
[Technical Documents]—Provides hardware installation, software upgrading, and software feature
configuration and maintenance documentation.
[Products & Solutions]—Provides information about products and technologies, as well as solutions.
[Software Download]—Provides the documentation released with the software version.
Technical support
[email protected]
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to [email protected].
We appreciate your comments.
Contents
Configuring Ethernet interfaces ······································································ 1
Configuring a management Ethernet interface ·································································································· 1
Ethernet interface naming conventions ·············································································································· 1
Configuring common Ethernet interface settings ······························································································· 1
Splitting a 40-GE interface and combining 10-GE breakout interfaces ······················································ 2
Configuring basic settings of an Ethernet interface···················································································· 3
Configuring the link mode of an Ethernet interface ···················································································· 4
Configuring jumbo frame support ··············································································································· 4
Configuring physical state change suppression on an Ethernet interface ················································· 4
Performing a loopback test on an Ethernet interface ················································································· 5
Configuring generic flow control on an Ethernet interface ········································································· 6
Configuring PFC on an Ethernet interface ································································································· 7
Enabling energy saving features on an Ethernet interface ········································································ 8
Setting the statistics polling interval ··········································································································· 9
Forcibly bringing up a fiber port·················································································································· 9
Configuring storm suppression ················································································································ 10
Configuring a Layer 2 Ethernet interface ········································································································· 11
Configuring storm control on an Ethernet interface·················································································· 11
Setting the MDIX mode of an Ethernet interface······················································································ 13
Testing the cable connection of an Ethernet interface ············································································· 13
Changing a Layer 2 Ethernet interface to an FC interface ······································································· 14
Enabling bridging on an Ethernet interface ······························································································ 14
Configuring a Layer 3 Ethernet interface or subinterface ················································································ 15
Setting the MTU for an Ethernet interface or subinterface ······································································· 15
Displaying and maintaining an Ethernet interface ···························································································· 15
Configuring loopback, null, and inloopback interfaces ·································· 17
Configuring a loopback interface ····················································································································· 17
Configuring a null interface ······························································································································ 17
Configuring an inloopback interface ················································································································· 18
Displaying and maintaining loopback, null, and inloopback interfaces ···························································· 18
Bulk configuring interfaces ············································································ 19
Configuration restrictions and guidelines ········································································································· 19
Configuration procedure ·································································································································· 19
Displaying and maintaining bulk interface configuration ·················································································· 20
Configuring the MAC address table ······························································ 21
Overview ·························································································································································· 21
How a MAC address entry is created······································································································· 21
Types of MAC address entries ················································································································· 21
MAC address table configuration task list ········································································································ 22
Configuring MAC address entries ···················································································································· 23
Configuration guidelines··························································································································· 23
Adding or modifying a static or dynamic MAC address entry globally ····················································· 23
Adding or modifying a static or dynamic MAC address entry on an interface ·········································· 23
Adding or modifying a blackhole MAC address entry ·············································································· 24
Adding or modifying a multiport unicast MAC address entry ··································································· 24
Disabling MAC address learning ······················································································································ 26
Disabling global MAC address learning ··································································································· 26
Disabling MAC address learning on an interface ····················································································· 26
Disabling MAC address learning on a VLAN ··························································································· 27
Setting the aging timer for dynamic MAC address entries ··············································································· 27
Setting the MAC learning limit on an interface ································································································· 27
Configuring the device to forward unknown frames after the MAC learning limit on an interface is reached ·· 28
Assigning MAC learning priority to an interface ······························································································· 28
Enabling MAC address synchronization ·········································································································· 29
i
Enable MAC address move notifications ········································································································· 30
Enabling ARP fast update for MAC address moves ························································································ 32
Disabling static source check ··························································································································· 32
Enabling SNMP notifications for the MAC address table ················································································· 33
Displaying and maintaining the MAC address table ························································································ 33
MAC address table configuration example ······································································································ 34
Network requirements ······························································································································ 34
Configuration procedure··························································································································· 34
Verifying the configuration························································································································ 35
Configuring MAC Information ········································································ 36
Enabling MAC Information ······························································································································· 36
Configuring the MAC Information mode ··········································································································· 36
Configuring the MAC change notification interval ···························································································· 37
Configuring the MAC Information queue length ······························································································· 37
MAC Information configuration example ·········································································································· 37
Network requirements ······························································································································ 37
Configuration restrictions and guidelines ································································································· 38
Configuration procedure··························································································································· 38
Configuring Ethernet link aggregation ··························································· 40
Basic concepts ················································································································································· 40
Aggregation group, member port, and aggregate interface ····································································· 40
Aggregation states of member ports in an aggregation group ································································· 41
Operational key ········································································································································ 41
Configuration types ·································································································································· 41
Link aggregation modes ··························································································································· 42
Aggregating links in static mode ······················································································································ 42
Choosing a reference port························································································································ 42
Setting the aggregation state of each member port ················································································· 42
Aggregating links in dynamic mode ················································································································· 43
LACP ························································································································································ 43
How dynamic link aggregation works ······································································································· 44
Edge aggregate interface ································································································································· 47
Load sharing modes for link aggregation groups ····························································································· 47
Ethernet link aggregation configuration task list ······························································································ 47
Configuring an aggregation group ··················································································································· 48
Configuration restrictions and guidelines ································································································· 48
Configuring a static aggregation group ···································································································· 49
Configuring a dynamic aggregation group ······························································································· 50
Configuring an aggregate interface ·················································································································· 53
Setting the description for an aggregate interface ··················································································· 53
Specifying ignored VLANs for a Layer 2 aggregate interface ·································································· 54
Setting the MTU for a Layer 3 aggregate interface ·················································································· 54
Setting the minimum and maximum numbers of Selected ports for an aggregation group ····················· 55
Setting the expected bandwidth for an aggregate interface ····································································· 56
Configuring an edge aggregate interface ································································································· 57
Enabling BFD for an aggregation group··································································································· 57
Shutting down an aggregate interface ····································································································· 58
Restoring the default settings for an aggregate interface ········································································ 58
Specifying link aggregation management VLANs and management port ················································ 59
Configuring load sharing for link aggregation groups ······················································································ 59
Configuring load sharing modes for link aggregation groups ··································································· 59
Enabling local-first load sharing for link aggregation················································································ 60
Configuring per-flow load sharing algorithm settings for Ethernet link aggregation ································· 61
Setting the global load sharing mode for MAC-in-MAC traffic·································································· 62
Enabling link-aggregation traffic redirection ····································································································· 62
Configuration restrictions and guidelines ································································································· 62
Configuration procedure··························································································································· 63
Displaying and maintaining Ethernet link aggregation ····················································································· 63
Ethernet link aggregation configuration examples ··························································································· 64
Layer 2 static aggregation configuration example···················································································· 64
ii
Layer 2 dynamic aggregation configuration example··············································································· 66
Layer 2 aggregation load sharing configuration example ········································································ 68
Layer 2 edge aggregate interface configuration example ········································································ 71
Layer 3 static aggregation configuration example···················································································· 72
Layer 3 dynamic aggregation configuration example··············································································· 73
Layer 3 edge aggregate interface configuration example ········································································ 74
Configuring port isolation ·············································································· 77
Assigning a port to an isolation group ·············································································································· 77
Displaying and maintaining port isolation ········································································································· 77
Port isolation configuration example ················································································································ 78
Network requirements ······························································································································ 78
Configuration procedure··························································································································· 78
Verifying the configuration························································································································ 78
Configuring spanning tree protocols ····························································· 80
STP ·································································································································································· 80
STP protocol packets ······························································································································· 80
Basic concepts in STP ····························································································································· 80
Calculation process of the STP algorithm ································································································ 81
RSTP ······························································································································································· 87
PVST ································································································································································ 87
MSTP ······························································································································································· 87
MSTP features ········································································································································· 88
MSTP basic concepts ······························································································································ 88
How MSTP works····································································································································· 91
MSTP implementation on devices············································································································ 92
Protocols and standards ·································································································································· 92
Spanning tree configuration task lists ·············································································································· 92
STP configuration task list························································································································ 93
RSTP configuration task list ····················································································································· 94
PVST configuration task list ····················································································································· 94
MSTP configuration task list····················································································································· 95
Setting the spanning tree mode ······················································································································· 96
Configuring an MST region ······························································································································ 97
Configuring the root bridge or a secondary root bridge ··················································································· 97
Configuring the current device as the root bridge of a specific spanning tree ········································· 98
Configuring the current device as a secondary root bridge of a specific spanning tree ··························· 98
Configuring the device priority ························································································································· 99
Configuring the maximum hops of an MST region ··························································································· 99
Configuring the network diameter of a switched network ·············································································· 100
Configuring spanning tree timers ··················································································································· 100
Configuration restrictions and guidelines ······························································································· 101
Configuration procedure························································································································· 101
Configuring the timeout factor ························································································································ 101
Configuring the BPDU transmission rate ······································································································· 102
Configuring edge ports ··································································································································· 102
Configuration restrictions and guidelines ······························································································· 102
Configuration procedure························································································································· 103
Configuring path costs of ports ······················································································································ 103
Specifying a standard for the device to use when it calculates the default path cost ···························· 103
Configuring path costs of ports ·············································································································· 105
Configuration example ··························································································································· 106
Configuring the port priority ···························································································································· 106
Configuring the port link type ························································································································· 107
Configuration restrictions and guidelines ······························································································· 107
Configuration procedure························································································································· 107
Configuring the mode a port uses to recognize and send MSTP packets ····················································· 107
Enabling outputting port state transition information ······················································································ 108
Enabling the spanning tree feature ················································································································ 108
Enabling the spanning tree feature in STP/RSTP/MSTP mode ····························································· 109
Enabling the spanning tree feature in PVST mode ················································································ 109
iii
Performing mCheck ······································································································································· 109
Configuration restrictions and guidelines ······························································································· 110
Configuration procedure························································································································· 110
Configuring Digest Snooping ························································································································· 110
Configuration restrictions and guidelines ······························································································· 111
Configuration procedure························································································································· 111
Digest Snooping configuration example································································································· 111
Configuring No Agreement Check ················································································································· 112
Configuration prerequisites ···················································································································· 113
Configuration procedure························································································································· 114
No Agreement Check configuration example························································································· 114
Configuring TC Snooping ······························································································································· 114
Configuration restrictions and guidelines ······························································································· 115
Configuration procedure························································································································· 115
Configuring protection functions ···················································································································· 115
Enabling BPDU guard ···························································································································· 116
Enabling root guard ································································································································ 117
Enabling loop guard ······························································································································· 117
Configuring port role restriction ·············································································································· 118
Configuring TC-BPDU transmission restriction ······················································································ 118
Enabling TC-BPDU guard ······················································································································ 119
Enabling BPDU drop ······························································································································ 119
Disabling the device to reactivate the shutdown edge ports ·········································································· 120
Enabling SNMP notifications for new-root election and topology change events ·········································· 120
Displaying and maintaining the spanning tree ······························································································· 121
Spanning tree configuration example ············································································································ 121
MSTP configuration example ················································································································· 121
PVST configuration example·················································································································· 125
Configuring loop detection ·········································································· 129
Overview ························································································································································ 129
Loop detection mechanism ···················································································································· 129
Loop detection interval ··························································································································· 130
Loop protection actions ·························································································································· 130
Port status auto recovery ······················································································································· 130
Loop detection configuration task list ············································································································· 131
Enabling loop detection ·································································································································· 131
Enabling loop detection globally············································································································· 131
Enabling loop detection on a port··········································································································· 131
Configuring the loop protection action ··········································································································· 132
Configuring the global loop protection action ························································································· 132
Configuring the loop protection action on a Layer 2 Ethernet interface ················································· 132
Configuring the loop protection action on a Layer 2 aggregate interface··············································· 132
Setting the loop detection interval ·················································································································· 132
Displaying and maintaining loop detection ····································································································· 133
Loop detection configuration example ··········································································································· 133
Network requirements ···························································································································· 133
Configuration procedure························································································································· 133
Verifying the configuration······················································································································ 134
Configuring VLANs ····················································································· 136
Overview ························································································································································ 136
VLAN frame encapsulation ···················································································································· 136
Protocols and standards ························································································································ 137
Configuring basic VLAN settings ··················································································································· 137
Configuring basic settings of a VLAN interface ······························································································ 138
Configuring port-based VLANs ······················································································································ 139
Introduction ············································································································································ 139
Assigning an access port to a VLAN ······································································································ 140
Assigning a trunk port to a VLAN ··········································································································· 141
Assigning a hybrid port to a VLAN ········································································································· 142
Configuring MAC-based VLANs ···················································································································· 143
iv
Introduction ············································································································································ 143
Configuration restrictions and guidelines ······························································································· 146
Configuring static MAC-based VLAN assignment·················································································· 146
Configuring dynamic MAC-based VLAN assignment············································································· 147
Configuring server-assigned MAC-based VLAN ···················································································· 147
Configuring IP subnet-based VLANs ············································································································· 148
Configuring protocol-based VLANs ················································································································ 149
Configuring a VLAN group ····························································································································· 150
Displaying and maintaining VLANs ················································································································ 150
VLAN configuration examples ························································································································ 151
Port-based VLAN configuration example ······························································································· 151
MAC-based VLAN configuration example······························································································ 152
IP subnet-based VLAN configuration example ······················································································ 154
Protocol-based VLAN configuration example ························································································ 156
Configuring super VLANs ··········································································· 160
Super VLAN configuration task list ················································································································ 160
Creating a sub-VLAN ····································································································································· 160
Configuring a super VLAN ····························································································································· 160
Configuring a super VLAN interface ·············································································································· 161
Displaying and maintaining super VLANs ······································································································ 161
Super VLAN configuration example ··············································································································· 162
Network requirements ···························································································································· 162
Configuration procedure························································································································· 162
Verifying the configuration······················································································································ 163
Configuring the private VLAN ····································································· 165
Configuration task list ····································································································································· 165
Configuration restrictions and guidelines ······································································································· 166
Configuration procedure ································································································································ 166
Displaying and maintaining the private VLAN ································································································ 168
Private VLAN configuration examples ··········································································································· 168
Promiscuous port configuration example ······························································································· 168
Trunk promiscuous port configuration example ····················································································· 171
Trunk promiscuous and trunk secondary port configuration example···················································· 174
Secondary VLAN Layer 3 communication configuration example ························································· 179
Configuring voice VLANs ············································································ 182
Overview ························································································································································ 182
Methods of identifying IP phones ··················································································································· 182
Identifying IP phones through OUI addresses ······················································································· 182
Automatically identifying IP phones through LLDP ················································································ 183
Advertising the voice VLAN information to IP phones ··················································································· 183
IP phone access methods ······························································································································ 184
Connecting the host and the IP phone in series ···················································································· 184
Connecting the IP phone to the device ·································································································· 184
Configuring a voice VLAN on a port ··············································································································· 184
Voice VLAN assignment modes············································································································· 184
Security mode and normal mode of voice VLANs·················································································· 186
Configuration prerequisites ···················································································································· 187
Configuring the QoS priority settings for voice traffic ············································································· 187
Configuring a port to operate in automatic voice VLAN assignment mode ············································ 188
Configuring a port to operate in manual voice VLAN assignment mode················································ 189
Enabling LLDP for automatic IP phone discovery ·························································································· 190
Configuration prerequisites ···················································································································· 190
Configuration restrictions and guidelines ······························································································· 190
Configuration procedure························································································································· 190
Configuring LLDP or CDP to advertise a voice VLAN ··················································································· 190
Dynamically advertising an authorization VLAN through LLDP or CDP ························································ 191
Displaying and maintaining voice VLANs ······································································································ 191
Voice VLAN configuration examples ·············································································································· 192
Automatic voice VLAN assignment mode configuration example ·························································· 192
v
Manual voice VLAN assignment mode configuration example ······························································ 194
Configuring MVRP ······················································································ 196
MRP ······························································································································································· 196
MRP implementation ······························································································································ 196
MRP messages ······································································································································ 196
MRP timers ············································································································································ 198
MVRP registration modes ······························································································································ 199
Protocols and standards ································································································································ 199
MVRP configuration task list ·························································································································· 199
Configuration restrictions and guidelines ······································································································· 199
Configuration prerequisites ···························································································································· 200
Enabling MVRP ·············································································································································· 200
Configuring an MVRP registration mode ······································································································· 201
Configuring MRP timers ································································································································· 201
Enabling GVRP compatibility ························································································································· 202
Displaying and maintaining MVRP ················································································································· 202
MVRP configuration example ························································································································ 202
Network requirements ···························································································································· 202
Configuration procedure························································································································· 203
Verifying the configuration······················································································································ 206
Configuring QinQ ························································································ 213
Overview ························································································································································ 213
How QinQ works ···································································································································· 213
QinQ implementations···························································································································· 214
Protocols and standards ························································································································ 214
Restrictions and guidelines ···························································································································· 215
Enabling QinQ ················································································································································ 215
Configuring transparent transmission for VLANs ··························································································· 215
Configuring the TPID in VLAN tags ··············································································································· 216
Configuring the CVLAN TPID················································································································· 217
Configuring the SVLAN TPID ················································································································· 217
Setting the 802.1p priority in SVLAN tags ······································································································ 217
Displaying and maintaining QinQ ··················································································································· 219
QinQ configuration examples ························································································································· 219
Basic QinQ configuration example ········································································································· 219
VLAN transparent transmission configuration example ········································································· 221
Configuring VLAN mapping ········································································ 223
Overview ························································································································································ 223
Application scenario of one-to-one and many-to-one VLAN mapping ··················································· 223
Application scenario of one-to-two and two-to-two VLAN mapping ······················································· 225
VLAN mapping implementations ············································································································ 225
General configuration restrictions and guidelines ·························································································· 228
VLAN mapping configuration task list ············································································································ 228
Configuring one-to-one VLAN mapping ········································································································· 229
Configuring many-to-one VLAN mapping ······································································································ 229
Configuring many-to-one VLAN mapping in a network with dynamic IP address assignment··············· 230
Configuring many-to-one VLAN mapping in a network with static IP address assignment···················· 232
Configuring one-to-two VLAN mapping ········································································································· 234
Configuring two-to-two VLAN mapping ·········································································································· 234
Displaying and maintaining VLAN mapping ··································································································· 235
VLAN mapping configuration examples ········································································································· 235
One-to-one and many-to-one VLAN mapping configuration example ··················································· 235
One-to-two and two-to-two VLAN mapping configuration example ······················································· 240
Configuring PBB ························································································· 243
Overview ························································································································································ 243
PBB network model································································································································ 243
Terminology ··········································································································································· 244
PBB frame format··································································································································· 244
vi
PBB frame forwarding ···························································································································· 246
Protocols and standards ························································································································ 246
PBB configuration task list ····························································································································· 246
Enabling L2VPN ············································································································································· 247
Creating a PBB VSI ······································································································································· 247
Configuring a B-VLAN for a PBB VSI ············································································································ 247
Configuring an uplink port ······························································································································ 247
Configuring a downlink port ··························································································································· 248
Configuring the data encapsulation type ········································································································ 249
Displaying and maintaining PBB ···················································································································· 250
PBB configuration example ···························································································································· 250
Network requirements ···························································································································· 250
Configuration procedures ······················································································································· 250
Verifying the configuration······················································································································ 251
Troubleshooting ············································································································································· 252
Symptom ················································································································································ 252
Analysis ·················································································································································· 252
Solution ·················································································································································· 252
Configuring LLDP ························································································ 253
Overview ························································································································································ 253
Basic concepts ······································································································································· 253
Working mechanism······························································································································· 258
Protocols and standards ························································································································ 259
LLDP configuration task list ··························································································································· 259
Performing basic LLDP configurations ··········································································································· 259
Enabling LLDP ······································································································································· 259
Configuring the LLDP bridge mode ········································································································ 260
Setting the LLDP operating mode ·········································································································· 261
Setting the LLDP reinitialization delay···································································································· 261
Enabling LLDP polling ···························································································································· 262
Configuring the advertisable TLVs ········································································································· 262
Configuring the management address and its encoding format····························································· 264
Setting other LLDP parameters·············································································································· 265
Setting an encapsulation format for LLDP frames ················································································· 265
Disabling LLDP PVID inconsistency check ···························································································· 266
Configuring CDP compatibility ······················································································································· 266
Configuration prerequisites ···················································································································· 267
Configuration procedure························································································································· 267
Configuring DCBX ·········································································································································· 268
DCBX configuration task list··················································································································· 269
Enabling LLDP and DCBX TLV advertising ··························································································· 269
Configuring APP parameters ················································································································· 270
Configuring ETS parameters·················································································································· 271
Configuring PFC parameters ················································································································· 273
Configuring the DCBX version ··············································································································· 273
Configuring LLDP trapping and LLDP-MED trapping ···················································································· 274
Displaying and maintaining LLDP ·················································································································· 274
LLDP configuration examples ························································································································ 275
Basic LLDP configuration example ········································································································ 275
CDP-compatible LLDP configuration example ······················································································· 279
DCBX configuration example ························································································································· 281
Configuring service loopback groups ·························································· 287
Configuration procedure ································································································································ 287
Displaying and maintaining service loopback groups ···················································································· 288
Service loopback group configuration example ····························································································· 288
Network requirements ···························································································································· 288
Configuration procedure························································································································· 288
Configuring cut-through Layer 2 forwarding ················································ 289
Index ··········································································································· 290
vii
Configuring Ethernet interfaces
The switch series supports Ethernet interfaces, management Ethernet interfaces, Console
interfaces, and USB interfaces. For the interface types and the number of interfaces supported by a
switch model, see the installation guide.
This document describes how to configure management Ethernet interfaces and Ethernet interfaces.
1
Splitting a 40-GE interface and combining 10-GE breakout
interfaces
Splitting a 40-GE QSFP+ interface into four 10-GE breakout interfaces
You can use a 40-GE QSFP+ interface as a single interface. To improve port density, reduce costs,
and improve network flexibility, you can also split a 40-GE QSFP+ interface into four 10-GE breakout
interfaces.
After the using tengige command is successfully configured, the system prompts you to reboot your
device. You must reboot the device and then the system deletes the 40-GE interface and creates
four 10-GE breakout interfaces.
A 40-GE interface split into four 10-GE breakout interfaces must use a dedicated 1-to-4 cable. For
more information about the cable, see the installation guides.
To split a 40-GE interface into four 10-GE breakout interfaces:
2
Configuring basic settings of an Ethernet interface
Configuring an Ethernet interface
3
Configuring the link mode of an Ethernet interface
CAUTION:
After you change the link mode of an Ethernet interface, all commands (except the shutdown
command) on the Ethernet interface are restored to their defaults in the new link mode.
The interfaces on this switch series can operate either as Layer 2 or Layer 3 Ethernet interfaces.
You can set the link mode to bridge or route.
To change the link mode of an Ethernet interface:
4
The physical link state of an Ethernet interface is either up or down. Each time the physical link of a
port comes up or goes down, the interface immediately reports the change to the CPU. The CPU
then performs the following operations:
• Notifies the upper-layer protocol modules (such as routing and forwarding modules) of the
change for guiding packet forwarding.
• Automatically generates traps and logs, informing the user to take the correct actions.
To prevent frequent physical link flapping from affecting system performance, configure physical
state change suppression to suppress the reporting of physical link state changes. The system
reports physical layer changes only when the suppression interval expires.
When the link-delay delay-time command is configured:
• The link-down event is not reported to the CPU unless the interface is still down when the
suppression interval (delay-time) expires.
• The link-up event is immediately reported.
When the link-delay delay-time mode up command is configured:
• The link-up event is not reported to the CPU unless the interface is still up when the
suppression interval (delay-time) expires.
• The link-down event is immediately reported.
When the link-delay delay-time mode updown command is configured:
• The link-down event is not reported to the CPU unless the interface is still down when the
suppression interval (delay-time) expires.
• The link-up event is not reported to the CPU unless the interface is still up when the
suppression interval (delay-time) expires.
To configure physical state change suppression on an Ethernet interface:
5
Configuration restrictions and guidelines
• On an administratively shut down Ethernet interface (displayed as in ADM or Administratively
DOWN state), you cannot perform an internal or external loopback test.
• The speed, duplex, mdix-mode, and shutdown commands are not available during a
loopback test.
• During a loopback test, the Ethernet interface operates in full duplex mode. When a loopback
test is complete, the port returns to its duplex setting.
Configuration procedure
To perform a loopback test on an Ethernet interface:
To avoid packet drops on a link, you can enable generic flow control at both ends of the link. When
traffic congestion occurs at the receiving end, the receiving end sends a flow control (Pause) frame
to ask the sending end to suspend sending packets.
• With TxRx mode generic flow control enabled, an interface can both send and receive flow
control frames. When congestion occurs, the interface sends a flow control frame to its peer.
When the interface receives a flow control frame from the peer, it suspends sending packets.
• With Rx flow mode generic control enabled, an interface can receive flow control frames, but it
cannot send flow control frames. When the interface receives a flow control frame from its peer,
it suspends sending packets to the peer. When congestion occurs, the interface cannot send
flow control frames to the peer.
To handle unidirectional traffic congestion on a link, configure the flow-control receive enable
command at one end and the flow-control command at the other end. To enable both ends of a link
to handle traffic congestion, configure the flow-control command at both ends.
To enable generic flow control on an Ethernet interface:
6
Step Command Remarks
enable
4. Enable PFC for 802.1p priority-flow-control no-drop By default, PFC is disabled for all
priorities. dot1p dot1p-list 802.1p priorities.
priority-flo priority-flow-cont
flow-control w-control rol no-drop Remarks
enable dot1p
You cannot enable flow control by using the
Unconfigurable Configured Configured flow-control command on a port where PFC is
enabled and PFC is enabled for the specified
7
priority-flo priority-flow-cont
flow-control w-control rol no-drop Remarks
enable dot1p
802.1p priority values.
• On a port configured with the flow-control
command, you can enable PFC, but you
cannot enable PFC for specific 802.1p
priorities.
• Enabling both generic flow control and PFC
Configured Configurable Unconfigurable
on a port disables the port from sending
common or PFC pause frames to inform the
peer of congestion conditions. However, the
port can still handle common and PFC
pause frames from the peer.
IMPORTANT:
Fiber ports do not support this feature.
When the auto power-down feature is enabled on an interface and the interface has been down for a
certain period of time, both of the following events occur:
• The switch automatically stops supplying power to the interface.
• The interface enters the power save mode.
The time period depends on the chip specifications and is not configurable.
When the interface comes up, both of the following events occur:
• The switch automatically restores power supply to the interface.
• The interface enters its normal state.
This feature is applicable only to S5820V2-54QS-GE switches.
To enable auto power-down on an Ethernet interface:
IMPORTANT:
Fiber ports do not support this feature.
With the Energy Efficient Ethernet (EEE) energy saving feature, a link-up port enters the low power
state if it has not received any packet for a certain period of time. The time period depends on the
chip specifications and is not configurable. When a packet arrives later, the switch automatically
restores power supply to the interface and the port enters the normal state.
8
For the 10-GE copper ports of S5820V2-52Q switches, this feature is available only when the ports
operate at 10 Gbps.
To enable EEE energy saving:
To display the interface statistics collected in the last polling interval, use the display interface
command.
To clear interface statistics, use the reset counters interface command.
IMPORTANT:
Copper ports do not support this feature.
As shown inFigure 1, a fiber port typically uses separate fibers for transmitting and receiving packets.
The physical state of the fiber port is up only when both transmit and receive fibers are physically
connected. If one of the fibers is disconnected, the fiber port does not work.
To enable a fiber port to forward traffic over a single link, you can use the port up-mode command.
This command brings up a fiber port by force, even when no fiber links or optical modules are
present. If one fiber link is present and up, the fiber port can forward packets over the link
unidirectionally.
9
Figure 1 Forcibly bring up a fiber port
When Ethernet
Correct fiber interfaces cannot When Ethernet interfaces
connection be or are not are forcibly brought up
forcibly brought up
Device A Device A Device A
The fiber is
Fiber port Tx end Rx end Fiber link
disconnected.
The interface is
Packets
down.
10
Any of the storm-constrain, broadcast-suppression, multicast-suppression, and
unicast-suppression commands can suppress storm on an interface. The
broadcast-suppression, multicast-suppression, and unicast-suppression commands use the
chip to suppress traffic. They have less impact on the device performance than the storm-constrain
command, which uses software to suppress traffic.
Configuration restrictions and guidelines
When you configure storm suppression, follow these restrictions and guidelines:
• For the traffic suppression result to be determined, do not configure storm control together with
storm suppression for the same type of traffic on an interface. For more information about storm
control, see "Configuring storm control on an Ethernet interface."
• When you configure the suppression threshold in kbps, the actual suppression threshold might
be different from the configured one as follows:
{ If the configured value is smaller than 64, the value of 64 takes effect.
{ If the configured value is greater than 64 but not an integer multiple of 64, the integer
multiple of 64 that is greater than and closest to the configured value takes effect.
For the suppression threshold that takes effect, see the prompt on the device.
Configuration procedure
To set storm suppression thresholds on an Ethernet interface:
11
Depending on your configuration, when a particular type of traffic exceeds its upper threshold, the
interface does either of the following:
• Blocks this type of traffic, while forwarding other types of traffic—Even though the
interface does not forward the blocked traffic, it still counts the traffic. When the blocked traffic
drops below the lower threshold, the port begins to forward the traffic.
• Goes down automatically—The interface goes down automatically and stops forwarding any
traffic. When the blocked traffic is detected dropping below the lower threshold, the port does
not forward the traffic. To bring up the interface, use the undo shutdown command or disable
the storm control feature.
Any of the storm-constrain, broadcast-suppression, multicast-suppression, and
unicast-suppression commands can suppress storm on a port. The broadcast-suppression,
multicast-suppression, and unicast-suppression commands suppress traffic in hardware, and
have less impact on device performance than the storm-constrain command, which performs
suppression in software.
Storm control uses a complete polling cycle to collect traffic data, and analyzes the data in the next
cycle. An interface takes one to two polling intervals to take a storm control action.
Configuration guidelines
For the same type of traffic, do not configure the storm constrain command together with any of the
broadcast-suppression, multicast-suppression, and unicast-suppression commands.
Otherwise, the traffic suppression result is not determined. For more information about the
broadcast-suppression, multicast-suppression, and unicast-suppression commands, see
"Configuring storm suppression."
Configuration procedure
To configure storm control on an Ethernet interface:
12
Step Command Remarks
from the upper threshold.
A physical Ethernet interface contains eight pins, each of which plays a dedicated role. For example,
pins 1 and 2 transmit signals, and pins 3 and 6 receive signals. You can use both crossover and
straight-through Ethernet cables to connect copper Ethernet interfaces. To accommodate these
types of cables, a copper Ethernet interface can operate in one of the following Medium Dependent
Interface-Crossover (MDIX) modes:
• MDIX mode—Pins 1 and 2 are receive pins and pins 3 and 6 are transmit pins.
• MDI mode—Pins 1 and 2 are transmit pins and pins 3 and 6 are receive pins.
• AutoMDIX mode—The interface negotiates pin roles with its peer.
To enable the interface to communicate with its peer, set the MDIX mode of the interface mode by
using the following guidelines:
• Typically, set the MDIX mode of the interface to AutoMDIX. Set the MDIX mode of the interface
to MDI or MDIX only when the switch cannot determine the cable type.
• When a straight-through cable is used, set the interface to operate in the MDIX mode different
than its peer.
• When a crossover cable is used, perform either of the following tasks:
{ Set the interface to operate in the same MDIX mode as its peer.
{ Set either end to operate in AutoMDIX mode.
To set the MDIX mode of an Ethernet interface:
This feature tests the cable connection of an Ethernet interface and displays cable test results within
5 seconds. The test results include the cable's status and some physical parameters. If any fault is
detected, the test results include the length of the faulty cable segment.
13
To test the cable connection of an Ethernet interface:
Step Command
1. Enter system view. system-view
2. Enter Ethernet interface view. interface interface-type interface-number
3. Test the cable connected to the Ethernet
interface. virtual-cable-test
14
Setting the interface connection distance
When two directly connected interfaces communicate, they use the buffer area to buffer the received
data. A longer interface connection distance requires a greater buffer area.
Perform this task to modify the buffer area size by setting the interface connection distance.
To set the interface connection distance:
Task Command
display counters { inbound | outbound } interface
Display interface traffic statistics. [ interface-type [ interface-number |
interface-number.subnumber ] ]
display counters rate { inbound | outbound } interface
Display traffic rate statistics of interfaces
[ interface-type [ interface-number |
in up state over the last sampling interval.
interface-number.subnumber ] ]
Display the operational and status
display interface [ interface-type [ interface-number |
information of the specified interface or
interface-number.subnumber ] ]
all interfaces.
15
Task Command
Display summary information about the display interface [ interface-type [ interface-number |
specified interface or all interfaces. interface-number.subnumber ] ] brief [ description ]
Display information about dropped
display packet-drop { interface [ interface-type
packets on the specified interface or all
[ interface-number ] ] | summary }
interfaces.
Display PFC information and frame
display priority-flow-control interface [ interface-type
statistics on the specified interfaces or
[ interface-number ] ]
all interfaces.
Display information about storm control
display storm-constrain [ broadcast | multicast | unicast ]
on the specified interface or all
[ interface interface-type interface-number ]
interfaces.
Display the Ethernet statistics. display ethernet statistics slot slot-number
reset counters interface [ interface-type [ interface-number |
Clear the interface statistics.
interface-number.subnumber ] ]
Clear the statistics of dropped packets reset packet-drop interface [ interface-type
on the specified interfaces. [ interface-number ] ]
Clear the Ethernet statistics. reset ethernet statistics
16
Configuring loopback, null, and
inloopback interfaces
This chapter describes how to configure a loopback interface, a null interface, and an inloopback
interface.
17
applying an ACL. For example, if you specify a null interface as the next hop of a static route to a
network segment, any packets routed to the network segment are dropped.
To configure a null interface:
Task Command
display interface [ loopback [ interface-number ] ]
Display information about the specified or all [ brief [ description ] ]
loopback interfaces.
display interface [ loopback ] [ brief [ down ] ]
Display information about the null interface. display interface [ null [ 0 ] ] [ brief [ description ] ]
Display information about the inloopback display interface [ inloopback [ 0 ] ] [ brief
interface. [ description ] ]
Clear the statistics on the specified or all loopback reset counters interface loopback
interfaces. [ interface-number ]
Clear the statistics on the null interface. reset counters interface [ null [ 0 ] ]
18
Bulk configuring interfaces
You can enter interface range view to bulk configure multiple interfaces with the same feature instead
of configuring them one by one. For example, you can execute the shutdown command in interface
range view to shut down a range of interfaces.
Configuration procedure
To bulk configure interfaces:
19
Step Command Remarks
• interface range
{ interface-type
interface-number [ to
interface-type By using the interface range name
2. Enter interface range interface-number ] } &<1-24> command, you assign a name to an
view. interface range and can specify this
• interface range name name
name rather than the interface range
[ interface { interface-type
to enter the interface range view.
interface-number [ to
interface-type
interface-number ] } &<1-24> ]
3. (Optional.) Display
commands available for Enter a question mark (?) at the
the first interface in the N/A
interface range prompt.
interface range.
4. Use available
commands to configure Available commands vary by
N/A
the interfaces. interface.
Task Command
Display information about the interface ranges that
are configured by using the interface range name display interface range [ name name ]
command.
20
Configuring the MAC address table
Overview
An Ethernet device uses a MAC address table to forward frames. A MAC address entry includes a
destination MAC address, an outgoing interface, and a VLAN ID. When the device receives a frame,
it uses the destination MAC address of the frame to look for a match in the MAC address table.
• The device forwards the frame out of the outgoing interface in the matching entry if a match is
found.
• The device floods the frame in the VLAN of the frame if no match is found.
21
• Static entries—A static entry is manually added to forward frames with a specific destination
MAC address out of the associated interface, and it never ages out. A static entry has higher
priority than a dynamically learned one.
• Dynamic entries—A dynamic entry can be manually configured or dynamically learned to
forward frames with a specific destination MAC address out of the associated interface. A
dynamic entry might age out. A manually configured dynamic entry has the same priority as a
dynamically learned one.
• Blackhole entries—A blackhole entry is manually configured and never ages out. A blackhole
entry is configured for filtering out frames with a specific source or destination MAC address.
For example, for security purposes, to block all frames destined for or sourced from a user, you
can configure the user's MAC address as a blackhole MAC address entry.
• Multiport unicast entries—A multiport unicast entry is manually added to send frames with a
specific unicast destination MAC address out of multiple ports, and it never ages out. A multiport
unicast entry has higher priority than a dynamically learned one.
A static, blackhole, or multiport unicast MAC address entry can overwrite a dynamic MAC address
entry, but not vice versa.
Tasks at a glance
(Optional.) Configuring MAC address entries
• Adding or modifying a static or dynamic MAC address entry globally
• Adding or modifying a static or dynamic MAC address entry on an interface
• Adding or modifying a blackhole MAC address entry
• Adding or modifying a multiport unicast MAC address entry
(Optional.) Disabling MAC address learning
(Optional.) Setting the aging timer for dynamic MAC address entries
(Optional.) Setting the MAC learning limit on an interface
(Optional.) Configuring the device to forward unknown frames after the MAC learning limit on an interface is
reached
(Optional.) Assigning MAC learning priority to an interface
(Optional.) Enabling MAC address synchronization
(Optional.) Enable MAC address move notifications
(Optional.) Enabling ARP fast update for MAC address moves
(Optional.) Disabling static source check
(Optional.) Enabling SNMP notifications for the MAC address table
22
Configuring MAC address entries
Configuration guidelines
• You cannot add a dynamic MAC address entry if a learned entry already exists with a different
outgoing interface for the MAC address.
• The manually configured static, blackhole, and multiport unicast MAC address entries cannot
survive a reboot if you do not save the configuration. The manually configured dynamic MAC
address entries are lost upon reboot whether or not you save the configuration.
A frame whose source MAC address matches different types of MAC address entries is processed
differently.
Type Description
• Discards the frame received on a different interface from that in the entry.
Static MAC address entry
• Forwards the frame received on the same interface with that in the entry.
Learns the MAC address (for example, MAC A) of the frame, generates a
Multiport unicast MAC dynamic MAC address entry for MAC A, and forwards the frame. However, the
address entry generated dynamic MAC address entry does not take effect. Frames destined
for MAC A are forwarded based on the multiport unicast MAC address entry.
• Learns the MAC address of the frames received on a different interface
Dynamic MAC address from that in the entry and overwrites the original entry.
entry • Forwards the frame received on the same interface as that in the entry
and updates the aging timer for the entry.
23
Step Command Remarks
interface
bridge-aggregation
interface-number
• Enter S-channel interface
view:
interface s-channel
interface-number.channel-id
• Enter S-channel aggregate
interface view:
interface
schannel-aggregation
interface-number:channel-id
By default, no MAC address entry
is configured on an interface.
3. Add or modify a static or mac-address { dynamic | static }
dynamic MAC address entry. mac-address vlan vlan-id Make sure you have created the
VLAN and assigned the interface
to the VLAN.
24
Figure 2 NLB cluster
Device
NLB cluster
Do not configure an interface as the output interface of a multiport unicast MAC address entry if the
interface receives frames destined for the multiport unicast MAC address. Otherwise, the frames are
flooded on the VLAN to which they belong.
You can configure a multiport unicast MAC address entry globally or on an interface.
Configuring a multiport unicast MAC address entry globally
25
Disabling MAC address learning
MAC address learning is enabled by default. To prevent the MAC address table from being saturated
when the device is experiencing attacks, disable MAC address learning. For example, you can
disable MAC address learning to prevent the device from being attacked by a large amount of frames
with different source MAC addresses.
When MAC address learning is disabled, the device immediately deletes the existing dynamic MAC
address entries.
Disabling global MAC address learning disables MAC address learning on all interfaces.
The global MAC address learning configuration does not take effect in a TRILL network, in a VPLS
VSI, or for an S-channel. For information about TRILL, see TRILL Configuration Guide. For
information about VSIs, see MPLS Configuration Guide. For information about S-channels, see EVB
Configuration Guide.
26
Disabling MAC address learning on a VLAN
When global MAC address learning is enabled, you can disable MAC address learning on a
per-VLAN basis.
To disable MAC address learning on a VLAN:
27
To set the MAC learning limit on an interface:
The MAC learning priority mechanism assigns either low priority or high priority to an interface. An
interface with high priority can learn MAC addresses as usual. However, an interface with low priority
is not allowed to learn MAC addresses already learned on a high-priority interface.
The MAC learning priority mechanism can help defend your network against MAC address spoofing
attacks. In a network that performs MAC-based forwarding, an upper layer device MAC address
28
might be learned by a downlink interface because of a loop or attack to the downlink interface. To
avoid this problem, perform the following tasks:
• Assign high MAC learning priority to an uplink interface.
• Assign low MAC learning priority to a downlink interface.
To assign MAC learning priority to an interface:
29
When Client A roams to AP D, Device B learns a MAC address entry for Client A. Device B
advertises it to Device A to ensure service continuity for Client A, as shown in Figure 4.
Figure 4 MAC address tables of devices when Client A roams to AP D
30
Step Command Remarks
1. Enter system view. system-view N/A
31
Enabling ARP fast update for MAC address
moves
ARP fast update for MAC address moves allows the device to update an ARP entry immediately after
the outgoing interface for a MAC address changes. This feature ensures data connection without
interruption.
As shown in Figure 5, a mobile user Laptop accesses the network by connecting to AP 1 or AP 2.
When the AP to which the user connects changes, the switch updates the ARP entry for the user
immediately after it detects a MAC address move.
Figure 5 ARP fast update application scenario
32
Step Command Remarks
interface-number
• Enter Layer 2 aggregate interface view:
interface bridge-aggregation
interface-number
• Enter Layer 3 Ethernet
interface/subinterface view:
interface interface-type
{ interface-number |
interface-number.subnumber }
• Enter Layer 3 aggregate
interface/subinterface view:
interface route-aggregation
{ interface-number |
interface-number.subnumber }
3. Disable the static
source check undo mac-address static source-check By default, the static source
feature. enable check feature is enabled.
2. Enable SNMP
notifications for By default, SNMP notifications
snmp-agent trap enable mac-address
the MAC address are disabled for the MAC address
[ mac-move ]
table. table.
Task Command
display mac-address [ mac-address [ vlan vlan-id ] | [ [ dynamic |
Display MAC address table
static ] [ interface interface-type interface-number ] | blackhole |
information.
multiport ] [ vlan vlan-id ] [ count ] ]
33
Task Command
Display the MAC address information
of the egress RB specified by its display mac-address nickname nickname
nickname (see Figure 6).
Display the aging timer for dynamic
display mac-address aging-time
MAC address entries.
Display the system or interface MAC display mac-address mac-learning [ interface interface-type
address learning state. interface-number ]
Display MAC address statistics. display mac-address statistics
Display the MAC address move
display mac-address mac-move [ slot slot-number ]
records.
Configuration procedure
# Add a static MAC address entry for MAC address 000f-e235-dc71 on Ten-GigabitEthernet 1/0/1
that belongs to VLAN 1.
<Device> system-view
34
[Device] mac-address static 000f-e235-dc71 interface ten-gigabitethernet 1/0/1 vlan 1
# Add a blackhole MAC address entry for MAC address 000f-e235-abcd that belongs to VLAN 1.
[Device] mac-address blackhole 000f-e235-abcd vlan 1
# Set the aging timer to 500 seconds for dynamic MAC address entries.
[Device] mac-address timer aging 500
35
Configuring MAC Information
The MAC Information feature can generate syslog messages or SNMP notifications when MAC
address entries are learned or deleted. You can use these messages to monitor users leaving or
joining the network and analyze network traffic.
The MAC Information feature buffers the MAC change syslog messages or SNMP notifications in a
queue. The device overwrites the oldest MAC address change written into the queue with the most
recent MAC address change when the following conditions exist:
• The MAC change notification interval does not expire.
• The queue has been exhausted.
To send a syslog message or SNMP notification immediately after it is created, set the queue length
to zero.
The device writes information and sends messages only for the following MAC addresses:
• Dynamic MAC addresses.
• MAC addresses that pass MAC authentication.
• MAC addresses that pass 802.1X authentication.
• Secure MAC addresses.
The device does not write information or send messages for blackhole MAC addresses, static MAC
addresses, multiport unicast MAC addresses, multicast MAC addresses, and local MAC addresses.
For more information about MAC authentication, 802.1X, and secure MAC addresses, see Security
Configuration Guide.
37
Figure 7 Network diagram
Configuration procedure
1. Configure Device to send syslog messages to Host B:
# Enable the information center.
<Device> system-view
[Device] info-center enable
# Specify the log host 192.168.1.2/24 and specify local4 as the logging facility.
[Device] info-center loghost 192.168.1.2 facility local4
# Disable log output to the log host.
[Device] info-center source default loghost deny
To avoid output of unnecessary information, disable all modules from outputting logs to the
specified destination (loghost, in this example) before you configure an output rule.
# Configure an output rule to output to the log host MAC address logs that have a severity level
of at least informational.
[Device] info-center source mac loghost level informational
2. Configure the log host, Host B:
Configure Solaris as follows. Configure other UNIX operating systems in the same way Solaris
is configured.
a. Log in to the log host as a root user.
b. Create a subdirectory named Device in directory /var/log/.
# mkdir /var/log/Device
c. Create file info.log in the Device directory to save logs from Device.
# touch /var/log/Device/info.log
d. Edit the file syslog.conf in directory /etc/ and add the following contents:
38
# Device configuration messages
local4.info /var/log/Device/info.log
In this configuration, local4 is the name of the logging facility that the log host uses to
receive logs, and info is the informational level. The UNIX system records the log
information that has a severity level of at least informational to the file
/var/log/Device/info.log.
e. Display the process ID of syslogd, end the syslogd process, and then restart syslogd
using the –r option to make the new configuration take effect.
# ps -ae | grep syslogd
147
# kill -HUP 147
# syslogd -r &
The device can output MAC address logs to the log host, which stores the logs to the specified
file.
3. Enable MAC Information on Device:
# Enable MAC Information globally.
[Device] mac-address information enable
# Configure the MAC Information mode as syslog.
[Device] mac-address information mode syslog
# Enable MAC Information on interface Ten-GigabitEthernet 1/0/1 to enable
Ten-GigabitEthernet 1/0/1 to record MAC address change information when the interface
performs either of the following operations:
{ Learns a new MAC address.
{ Deletes an existing MAC address.
[Device] interface ten-gigabitethernet 1/0/1
[Device-Ten-GigabitEthernet1/0/1] mac-address information enable added
[Device-Ten-GigabitEthernet1/0/1] mac-address information enable deleted
[Device-Ten-GigabitEthernet1/0/1] quit
# Set the MAC Information queue length to 100.
[Device] mac-address information queue-length 100
# Set the MAC change notification interval to 20 seconds.
[Device] mac-address information interval 20
39
Configuring Ethernet link aggregation
Ethernet link aggregation bundles multiple physical Ethernet links into one logical link, called an
aggregate link. Link aggregation has the following benefits:
• Increased bandwidth beyond the limits of any single link. In an aggregate link, traffic is
distributed across the member ports.
• Improved link reliability. The member ports dynamically back up one another. When a member
port fails, its traffic is automatically switched to other member ports.
As shown in Figure 8, Device A and Device B are connected by three physical Ethernet links. These
physical Ethernet links are combined into an aggregate link called link aggregation 1. The bandwidth
of this aggregate link can reach up to the total bandwidth of the three physical Ethernet links. At the
same time, the three Ethernet links back up one another. When a physical Ethernet link fails, the
traffic previously carried on the failed link is switched to the other two links.
Figure 8 Ethernet link aggregation diagram
Basic concepts
Aggregation group, member port, and aggregate interface
Link bundling is implemented through interface bundling. An aggregation group is a group of
Ethernet interfaces bundled together, which are called member ports of the aggregation group. For
each aggregation group, a logical interface (called an aggregate interface), is created. When an
upper layer entity uses the link aggregation service, the following events occur:
• A link aggregation group appears the same as a single logical link.
• An aggregate interface transmits data traffic.
When you create an aggregate interface, the device automatically creates an aggregation group of
the same type and number as the aggregate interface. For example, when you create aggregate
interface 1, aggregation group 1 is created.
Aggregate interfaces include Layer 2 aggregate interfaces and Layer 3 aggregate interfaces.
You can assign Layer 2 Ethernet interfaces only to a Layer 2 aggregation group, and Layer 3
Ethernet interfaces only to a Layer 3 aggregation group.
NOTE:
You can use the port link-mode command to configure an Ethernet port as a Layer 2 or Layer 3
interface (see "Configuring Ethernet interfaces").
40
Aggregation states of member ports in an aggregation group
A member port in an aggregation group can be in any of the following aggregation states:
• Selected—A Selected port can forward traffic.
• Unselected—An Unselected port cannot forward traffic.
• Individual—An Individual port can forward traffic as a normal physical port. A port is placed in
the Individual state when the following conditions are met:
{ The corresponding aggregate interface is configured as an edge aggregate interface.
{ The port does not receive LACPDUs from its peer port.
Operational key
When aggregating ports, the system automatically assigns each port an operational key based on
port information, such as port rate and duplex mode. Any change to this information triggers a
recalculation of the operational key.
In an aggregation group, all Selected ports are assigned the same operational key.
Configuration types
Every configuration setting on a port might affect its aggregation state. Port configurations include
the following types:
• Attribute configurations—To become a Selected port, a member port must have the same
attribute configurations as the aggregate interface. Table 2 describes the attribute
configurations.
Attribute configurations made on an aggregate interface are automatically synchronized to all
member ports. These configurations are retained on the member ports even after the aggregate
interface is removed.
Any attribute configuration change might affect the aggregation state of link aggregation
member ports and running services. The system displays a warning message every time you
try to change an attribute configuration setting on a member port.
Table 2 Attribute configurations
Feature Considerations
Indicates whether the port has joined an isolation group and which isolation
Port isolation
group the port belongs to.
QinQ enable state (enabled/disabled), TPID for VLAN tags, and VLAN
QinQ
transparent transmission. For information about QinQ, see "Configuring QinQ."
Different types of VLAN mapping configured on the port. For more information
VLAN mapping
about VLAN mapping, see "Configuring VLAN mapping."
• Permitted VLAN IDs.
• PVID.
• Link type (trunk, hybrid, or access).
VLAN
• Operating mode (promiscuous, trunk promiscuous, host).
• VLAN tagging mode.
For information about VLAN, see "Configuring VLANs."
41
NOTE:
The protocol configuration for a member port is effective only when the member port leaves the
aggregation group.
42
Figure 9 Setting the aggregation state of a member port in a static aggregation group
For more information about configuring the maximum number of Selected ports in a static
aggregation group, see "Setting the minimum and maximum numbers of Selected ports for an
aggregation group."
Any operational key or attribute configuration change might affect the aggregation state of link
aggregation member ports.
LACP
LACP uses LACPDUs to exchange aggregation information between LACP-enabled devices.
Each member port in an LACP-enabled aggregation group exchanges information with its peer.
When a member port receives an LACPDU, it compares the received information with information
received on the other member ports. In this way, the two systems reach an agreement on which ports
are placed in the Selected state.
43
LACP functions
LACP offers basic LACP functions and extended LACP functions, as described in Table 3.
Table 3 Basic and extended LACP functions
Category Description
Implemented through the basic LACPDU fields, including the system LACP
Basic LACP functions
priority, system MAC address, port priority, port number, and operational key.
Implemented by extending the LACPDU with new TLV fields. This is how the
LACP MAD mechanism of the IRF feature is implemented.
Extended LACP
functions The switch series can participate in LACP MAD as either an IRF member device or
an intermediate device. For more information about IRF and the LACP MAD
mechanism, see IRF Configuration Guide.
Type Description
Used by two peer devices (or systems) to determine which one is superior in link
aggregation.
System LACP
priority In dynamic link aggregation, the system that has higher system LACP priority sets
the Selected state of member ports on its side. The system that has lower priority
sets port state accordingly.
Determines the likelihood of a member port to be selected on a system. A port with a
Port priority
higher port priority is more likely to become Selected.
44
The local system (the actor) and the remote system (the partner) negotiate a reference port by using
the following workflow:
1. The two systems compare their system IDs to determine the system with the smaller system ID.
A system ID contains the system LACP priority and the system MAC address.
a. The two systems compare their LACP priority values.
The lower the LACP priority, the smaller the system ID. If LACP priority values are the same,
the two systems proceed to step b.
b. The two systems compare their MAC addresses.
The lower the MAC address, the smaller the system ID.
2. The system with the smaller system ID chooses the port with the smallest port ID as the
reference port.
A port ID contains a port priority and a port number. The lower the port priority, the smaller the
port ID.
a. The system chooses the port with the lowest priority value as the reference port.
If ports have the same priority, the system proceeds to step b.
b. The system compares their port numbers.
The smaller the port number, the smaller the port ID.
The port with the smallest port number and the same attribute configurations as the
aggregate interface is chosen as the reference port.
Setting the aggregation state of each member port
After the reference port is chosen, the system with the smaller system ID sets the state of each
member port on its side.
45
Figure 10 Setting the state of a member port in a dynamic aggregation group
Meanwhile, the system with the higher system ID is aware of the aggregation state changes on the
remote system. The system sets the aggregation state of local member ports the same as their peer
ports.
When you aggregate interfaces in dynamic mode, follow these guidelines:
• A dynamic link aggregation group preferably sets full-duplex ports as the Selected ports. The
group will set only one half-duplex port as a Selected port when either of the following
conditions exist:
{ None of the full-duplex ports can be chosen as Selected ports.
{ Only half-duplex ports exist in the group.
• To ensure stable aggregation and service continuity, do not change the operational key or
attribute configurations on any member port.
46
• When the aggregation state of a local port changes in a dynamic aggregation group, the
aggregation state of the peer port also changes.
• After the Selected port limit is reached, a newly joining port becomes a Selected port if it is more
eligible than a current Selected port.
For more information about configuring the maximum number of Selected ports in a dynamic
aggregation group, see "Setting the minimum and maximum numbers of Selected ports for an
aggregation group."
47
Tasks at a glance
(Optional.) Configuring an aggregate interface:
• Setting the description for an aggregate interface
• Specifying ignored VLANs for a Layer 2 aggregate interface
• Setting the MTU for a Layer 3 aggregate interface
• Setting the minimum and maximum numbers of Selected ports for an aggregation group
• Setting the expected bandwidth for an aggregate interface
• Configuring an edge aggregate interface
• Enabling BFD for an aggregation group
• Shutting down an aggregate interface
• Restoring the default settings for an aggregate interface
• Specifying link aggregation management VLANs and management port
(Optional.) Configuring load balancing for link aggregation group:
• Configuring load sharing modes for link aggregation groups
• Enabling local-first load sharing for link aggregation
• Configuring per-flow load sharing algorithm settings for Ethernet link aggregation
• Setting the global load sharing mode for MAC-in-MAC traffic
Enabling link-aggregation traffic redirection
48
Configuring a static aggregation group
To guarantee a successful static aggregation, make sure that the ports at both ends of each link are
in the same aggregation state.
Avoid assigning ports to a static aggregation group that has reached the limit on Selected ports.
These ports will be placed in the Unselected state to avoid traffic interruption on the current Selected
ports. However, a device reboot can cause the aggregation state of member ports to change.
Configuring a Layer 2 static aggregation group
49
Step Command Remarks
2. Create a
Layer 3
aggregat
e
interface When you create a Layer 3
and aggregate interface, the system
interface route-aggregation
enter automatically creates a Layer 3
interface-number
Layer 3 static aggregation group
aggregat numbered the same.
e
interface
view.
3. Exit to
system quit N/A
view.
a. Enter Layer 3 Ethernet
interface view:
interface interface-type
interface-number
4. Assign b. Assign
an the
interface interface
to the to the Repeat these two sub-steps to
specified specified assign more Layer 3 Ethernet
Layer 3 Layer 3 interfaces to the aggregation
aggregat aggregat group.
ion ion
group. group:
port
link-agg
regation
group
number
50
Step Command Remarks
enter
Layer 2
aggregat
e
interface
view.
4. Configur
e the
aggregat
ion
group to By default, an aggregation group
operate link-aggregation mode dynamic operates in static aggregation
in mode.
dynamic
aggregat
ion
mode.
5. Exit to
system quit N/A
view.
a. Enter
Layer 2
Ethernet
interface
view:
interfac
e
interface
6. Assign -type
an interface
interface -number
to the Repeat these two sub-steps to
b. Assign assign more Layer 2 Ethernet
specified the
Layer 2 interfaces to the aggregation
interface group.
aggregat to the
ion specified
group. Layer 2
aggregat
ion
group:
port
link-agg
regation
group
number
51
Step Command Remarks
(3 timeout interval before performing
seconds) an ISSU. Otherwise, traffic
on the interruption will occur during the
interface ISSU. For more information about
. ISSU, see Fundamentals
Configuration Guide.
52
Step Command Remarks
regation
group
number
53
Step Command Remarks
w. interface-number.subnumber }
3. Set
the
des
cript
ion
for By default, the description of an
the description text interface is interface-name
agg Interface.
reg
ate
inte
rfac
e.
54
Step Command Remarks
aggregat interface-number.subnumber }
e
interface
or
subinterf
ace view.
3. Set the
MTU for
the
Layer 3
aggregat
e mtu size The default setting is 1500 bytes.
interface
or
subinterf
ace.
The bandwidth of an aggregate link increases as the number of Selected member ports increases.
To avoid congestion, you can set the minimum number of Selected ports required for bringing up an
aggregate interface.
This minimum threshold setting affects the aggregation state of both aggregation member ports and
the aggregate interface.
• When the number of member ports eligible to be Selected ports is smaller than the minimum
threshold:
{ All member ports are placed in the Unselected state.
{ The link of the aggregate interface goes down.
• When the minimum threshold is reached, the eligible member ports are placed in the Selected
state, and the link of the aggregate interface goes up.
The maximum number of Selected ports allowed in an aggregation group is limited by either the
configured maximum number or hardware capability, whichever value is smaller.
You can configure backup between two ports by performing the following tasks:
• Assign two ports to an aggregation group.
• Configure 1 as the maximum number of Selected ports allowed in the aggregation group.
Then, only one Selected port is allowed in the aggregation group at any point in time, and the
Unselected port acts as a backup port.
To set the minimum and maximum numbers of Selected ports for an aggregation group:
55
Step Command Remarks
• Enter Layer 2 aggregate
interface view:
interface
2. Enter bridge-aggregation
aggregat interface-number
e N/A
interface • Enter Layer 3 aggregate
view. interface view:
interface
route-aggregation
interface-number
3. Set the
minimum
number
of By default, the minimum number
Selected link-aggregation selected-port of Selected ports for the
ports for minimum number aggregation group is not
the specified.
aggregat
ion
group.
4. Set the
maximu
m
number
of By default, the maximum number
Selected link-aggregation selected-port
of Selected ports for an
ports for maximum number
aggregation group is 32.
the
aggregat
ion
group.
56
Configuring an edge aggregate interface
When you configure an edge aggregate interface, follow these restrictions and guidelines:
• This configuration takes effect only on the aggregate interface corresponding to a dynamic
aggregation group.
• Link-aggregation traffic redirection does not operate correctly on an edge aggregate interface.
For more information about link-aggregation traffic redirection, see "Enabling link-aggregation
traffic redirection."
To configure an edge aggregate interface:
57
Step Command Remarks
1. Enter system
view. system-view N/A
Step Command
1. Enter system view. system-view
Step Command
1. Enter system view. system-view
58
Step Command
3. Restore the
default settings for
the aggregate default
interface.
59
Configuring the global link-aggregation load sharing mode
60
Figure 11 Load sharing for multiswitch link aggregation in an IRF fabric
Yes
61
To configure per-flow load sharing algorithm settings for Ethernet link aggregation:
62
• To prevent traffic interruption, enable link-aggregation traffic redirection on devices at both ends
of the aggregate link.
• To prevent packet loss that might occur at a reboot, do not enable spanning tree together with
link-aggregation traffic redirection.
• Link-aggregation traffic redirection does not operate correctly on an edge aggregate interface.
• As a best practice, enable link-aggregation traffic redirection on aggregate interfaces. If you
enable this feature globally, communication with a third-party peer device might be affected if
the peer is not compatible with this feature.
Configuration procedure
To enable link-aggregation traffic redirection globally:
Task Command
display interface [ bridge-aggregation |
Display information for an aggregate interface route-aggregation ] [ brief [ down ] ]
or multiple aggregate interfaces.
display interface [ { bridge-aggregation |
63
Task Command
route-aggregation } [ interface-number ] ] [ brief
[ description ] ]
Display the local system ID. display lacp system-id
display link-aggregation load-sharing mode [ interface
Display the global or group-specific
[ { bridge-aggregation | route-aggregation }
link-aggregation load sharing modes.
interface-number ] ]
display link-aggregation load-sharing path interface
{ bridge-aggregation | route-aggregation }
interface-number ingress-port interface-type
interface-number [ route ] { { destination-ip ip-address |
Display forwarding information for the specified
destination-ipv6 ipv6-address } | { source-ip ip-address |
traffic flow.
source-ipv6 ipv6-address } | destination-mac
mac-address | destination-port port-id | ethernet-type
type-number | ip-protocol protocol-id | source-mac
mac-address | source-port port-id | vlan vlan-id }*
Display detailed link aggregation information
display link-aggregation member-port [ interface-list ]
for link aggregation member ports.
Display summary information about all
display link-aggregation summary
aggregation groups.
display link-aggregation verbose
Display detailed information about the
[ { bridge-aggregation | route-aggregation }
specified aggregation groups.
[ interface-number ] ]
Clear LACP statistics for the specified link
reset lacp statistics [ interface interface-list ]
aggregation member ports.
Clear statistics for the specified aggregate reset counters interface [ { bridge-aggregation |
interfaces. route-aggregation } [ interface-number ] ]
64
Figure 12 Network diagram
Configuration procedure
1. Configure Device A:
# Create VLAN 10, and assign port Ten-GigabitEthernet 1/0/4 to VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] port ten-gigabitethernet 1/0/4
[DeviceA-vlan10] quit
# Create VLAN 20, and assign port Ten-GigabitEthernet 1/0/5 to VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] port ten-gigabitethernet 1/0/5
[DeviceA-vlan20] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 1.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] quit
# Assign ports Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/3 to link aggregation
group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to
VLANs 10 and 20.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20
[DeviceA-Bridge-Aggregation1] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
65
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected
I -- Individual, * -- Management port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
66
Configuration procedure
1. Configure Device A:
# Create VLAN 10, and assign the port Ten-GigabitEthernet 1/0/4 to VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] port ten-gigabitethernet 1/0/4
[DeviceA-vlan10] quit
# Create VLAN 20, and assign the port Ten-GigabitEthernet 1/0/5 to VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] port ten-gigabitethernet 1/0/5
[DeviceA-vlan20] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 1, and set the link aggregation mode
to dynamic.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] link-aggregation mode dynamic
[DeviceA-Bridge-Aggregation1] quit
# Assign ports Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/3 to link aggregation
group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to
VLANs 10 and 20.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 10 20
[DeviceA-Bridge-Aggregation1] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected
I -- Individual, * -- Management port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
67
Management VLAN : None
System ID: 0x8000, 000f-e267-6c6a
Local:
Port Status Priority Oper-Key Flag
--------------------------------------------------------------------------------
XGE1/0/1 S 32768 1 {ACDEF}
XGE1/0/2 S 32768 1 {ACDEF}
XGE1/0/3 S 32768 1 {ACDEF}
Remote:
Actor Partner Priority Oper-Key SystemID Flag
--------------------------------------------------------------------------------
XGE1/0/1 1 32768 1 0x8000, 000f-e267-57ad {ACDEF}
XGE1/0/2 2 32768 1 0x8000, 000f-e267-57ad {ACDEF}
XGE1/0/3 3 32768 1 0x8000, 000f-e267-57ad {ACDEF}
68
Configuration procedure
1. Configure Device A:
# Create VLAN 10, and assign the port Ten-GigabitEthernet 1/0/5 to VLAN 10.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] port ten-gigabitethernet 1/0/5
[DeviceA-vlan10] quit
# Create VLAN 20, and assign the port Ten-GigabitEthernet 1/0/6 to VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] port ten-gigabitethernet 1/0/6
[DeviceA-vlan20] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 1.
[DeviceA] interface bridge-aggregation 1
# Configure Layer 2 aggregation group 1 to load share packets based on source MAC
addresses.
[DeviceA-Bridge-Aggregation1] link-aggregation load-sharing mode source-mac
[DeviceA-Bridge-Aggregation1] quit
# Assign ports Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to link aggregation
group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 1 as a trunk port and assign it to
VLAN 10.
[DeviceA] interface bridge-aggregation 1
[DeviceA-Bridge-Aggregation1] port link-type trunk
[DeviceA-Bridge-Aggregation1] port trunk permit vlan 10
[DeviceA-Bridge-Aggregation1] quit
# Create Layer 2 aggregate interface Bridge-Aggregation 2.
[DeviceA] interface bridge-aggregation 2
# Configure Layer 2 aggregation group 2 to load share packets based on destination MAC
addresses.
[DeviceA-Bridge-Aggregation2] link-aggregation load-sharing mode destination-mac
[DeviceA-Bridge-Aggregation2] quit
# Assign ports Ten-GigabitEthernet 1/0/3 and Ten-GigabitEthernet 1/0/4 to link aggregation
group 2.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 2
[DeviceA-Ten-GigabitEthernet1/0/3] quit
[DeviceA] interface ten-gigabitethernet 1/0/4
[DeviceA-Ten-GigabitEthernet1/0/4] port link-aggregation group 2
[DeviceA-Ten-GigabitEthernet1/0/4] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 2 as a trunk port and assign it to
VLAN 20.
[DeviceA] interface bridge-aggregation 2
69
[DeviceA-Bridge-Aggregation2] port link-type trunk
[DeviceA-Bridge-Aggregation2] port trunk permit vlan 20
[DeviceA-Bridge-Aggregation2] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected
I -- Individual, * -- Management port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
70
Layer 2 edge aggregate interface configuration example
Network requirements
As shown in Figure 15, a Layer 2 dynamic aggregation group is configured on the device. The server
is not configured with dynamic link aggregation.
Configure an edge aggregate interface so that both Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 can forward traffic to improve link reliability.
Figure 15 Network diagram
Configuration procedure
# Create Layer 2 aggregate interface Bridge-Aggregation 1, and set the link aggregation mode to
dynamic.
<Device> system-view
[Device] interface bridge-aggregation 1
[Device-Bridge-Aggregation1] link-aggregation mode dynamic
# Assign ports Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to link aggregation group 1.
[Device] interface ten-gigabitethernet 1/0/1
[Device-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[Device-Ten-GigabitEthernet1/0/1] quit
[Device] interface ten-gigabitethernet 1/0/2
[Device-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[Device-Ten-GigabitEthernet1/0/2] quit
71
Port Status Priority Oper-Key Flag
--------------------------------------------------------------------------------
XGE1/0/1 I 32768 1 {AG}
XGE1/0/2 I 32768 1 {AG}
Remote:
Actor Partner Priority Oper-Key SystemID Flag
--------------------------------------------------------------------------------
XGE1/0/1 0 32768 0 0x8000, 0000-0000-0000 {DEF}
XGE1/0/2 0 32768 0 0x8000, 0000-0000-0000 {DEF}
The output shows that Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 are in Individual
state when they do not receive LACPDUs from the server. Both Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 can forward traffic. When one port fails, its traffic is automatically switched
to the other port.
Configuration procedure
1. Configure Device A:
# Create Layer 3 aggregate interface Route-Aggregation 1, and configure an IP address and
subnet mask for the aggregate interface.
<DeviceA> system-view
[DeviceA] interface route-aggregation 1
[DeviceA-Route-Aggregation1] ip address 192.168.1.1 24
[DeviceA-Route-Aggregation1] quit
# Assign Layer 3 Ethernet interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet
1/0/3 to aggregation group 1.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
72
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected
I -- Individual, * -- Management port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
The output shows that link aggregation group 1 is a non-load-shared Layer 3 static aggregation
group that contains three Selected ports.
Configuration procedure
1. Configure Device A:
# Create Layer 3 aggregate interface Route-Aggregation 1.
<DeviceA> system-view
[DeviceA] interface route-aggregation 1
# Set the link aggregation mode to dynamic.
[DeviceA-Route-Aggregation1] link-aggregation mode dynamic
# Configure an IP address and subnet mask for Route-Aggregation 1.
[DeviceA-Route-Aggregation1] ip address 192.168.1.1 24
[DeviceA-Route-Aggregation1] quit
# Assign Layer 3 Ethernet interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet
1/0/3 to aggregation group 1.
73
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/2] quit
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-aggregation group 1
[DeviceA-Ten-GigabitEthernet1/0/3] quit
2. Configure Device B in the same way Device A is configured. (Details not shown.)
Verifying the configuration
# Display detailed information about all aggregation groups on Device A.
[DeviceA] display link-aggregation verbose
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected
I -- Individual, * -- Management port
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
74
Configure an edge aggregate interface so that both Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 can forward traffic to improve link reliability.
Figure 18 Network diagram
Configuration procedure
# Create Layer 3 aggregate interface Route-Aggregation 1, and set the link aggregation mode to
dynamic.
<Device> system-view
[Device] interface route-aggregation 1
[Device-Route-Aggregation1] link-aggregation mode dynamic
# Configure an IP address and subnet mask for Layer 3 aggregate interface Route-Aggregation 1.
[Device-Route-Aggregation1] ip address 192.168.1.1 24
75
XGE1/0/2 I 32768 1 {AG}
Remote:
Actor Partner Priority Oper-Key SystemID Flag
--------------------------------------------------------------------------------
XGE1/0/1 0 32768 0 0x8000, 0000-0000-0000 {DEF}
XGE1/0/2 0 32768 0 0x8000, 0000-0000-0000 {DEF}
The output shows that Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 are in Individual
state when they do not receive LACPDUs from the server. Both Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 can forward traffic. When one port fails, its traffic is automatically switched
to the other port.
76
Configuring port isolation
The port isolation feature isolates Layer 2 traffic for data privacy and security without using VLANs.
Ports in an isolation group cannot communicate with each other. However, they can communicate
with ports outside the isolation group.
Task Command
Display isolation group information. display port-isolate group [ group-number ]
77
Port isolation configuration example
Network requirements
As shown in Figure 19, configure port isolation on the device to meet the following requirements:
• The hosts can access the Internet.
• The hosts cannot communicate with each other at Layer 2.
Figure 19 Network diagram
Configuration procedure
# Create isolation group 2.
<Device> system-view
[Device] port-isolate group 2
78
Ten-GigabitEthernet1/0/1
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/3
The output shows that interfaces Ten-GigabitEthernet 1/0/1, Ten-GigabitEthernet 1/0/2, and
Ten-GigabitEthernet 1/0/3 are assigned to isolation group 2. As a result, Host A, Host B, and Host C
are isolated from each other at layer 2.
79
Configuring spanning tree protocols
Spanning tree protocols eliminate loops in a physical link-redundant network by selectively blocking
redundant links and putting them in a standby state.
The recent versions of STP include the Rapid Spanning Tree Protocol (RSTP), the Per-VLAN
Spanning Tree (PVST), and the Multiple Spanning Tree Protocol (MSTP).
STP
STP was developed based on the 802.1d standard of IEEE to eliminate loops at the data link layer in
a LAN. Networks often have redundant links as backups in case of failures, but loops are a very
serious problem. Devices running STP detect loops in the network by exchanging information with
one another. They eliminate loops by selectively blocking certain ports to prune the loop structure
into a loop-free tree structure. This avoids proliferation and infinite cycling of packets that would
occur in a loop network.
In a narrow sense, STP refers to IEEE 802.1d STP. In a broad sense, STP refers to the IEEE 802.1d
STP and various enhanced spanning tree protocols derived from that protocol.
80
Upon initialization of a network, each device generates and periodically sends configuration BPDUs,
with itself as the root bridge. After network convergence, only the root bridge generates and
periodically sends configuration BPDUs. The other devices only forward the BPDUs.
Root port
On a non-root bridge, the port nearest to the root bridge is the root port. The root port communicates
with the root bridge. Each non-root bridge has only one root port. The root bridge has no root port.
Designated bridge and designated port
As shown in Figure 20, Device B and Device C are directly connected to a LAN.
If Device A forwards BPDUs to Device B through port A1, the designated bridge and designated port
are as follows:
• The designated bridge for Device B is Device A.
• The designated port of Device B is port A1 on Device A.
If Device B forwards BPDUs to the LAN, the designated bridge and designated port are as follows:
• The designated bridge for the LAN is Device B.
• The designated port for the LAN is port B2 on Device B.
Figure 20 Designated bridges and designated ports
Device A
Port A1 Port A2
Device B Device C
Port B1 Port C1
Port B2 Port C2
LAN
Path cost
Path cost is a reference value used for link selection in STP. To prune the network into a loop-free
tree, STP calculates path costs to select the most robust links and block redundant links that are less
robust.
81
Calculation process
The STP algorithm uses the following calculation process:
1. Initialize the network.
Upon initialization of a device, each port generates a BPDU with the following contents:
{ The port as the designated port.
{ The device as the root bridge.
{ 0 as the root path cost.
{ The device ID as the designated bridge ID.
2. Select the root bridge.
Initially, each STP-enabled device on the network assumes itself to be the root bridge, with its
own device ID as the root bridge ID. By exchanging configuration BPDUs, the devices compare
their root bridge IDs to elect the device with the smallest root bridge ID as the root bridge.
3. Root port and designated ports selection on the non-root bridges.
Step Description
A non-root–bridge device regards the port on which it received the optimum configuration
1
BPDU as the root port. Table 5 describes how the optimum configuration BPDU is selected.
Based on the configuration BPDU and the path cost of the root port, the device calculates a
designated port configuration BPDU for each of the other ports.
• The root bridge ID is replaced with that of the configuration BPDU of the root port.
2 • The root path cost is replaced with that of the configuration BPDU of the root port plus the
path cost of the root port.
• The designated bridge ID is replaced with the ID of this device.
• The designated port ID is replaced with the ID of this port.
The device compares the calculated configuration BPDU with the configuration BPDU on the
port whose port role will be determined, and acts depending on the result of the comparison:
• If the calculated configuration BPDU is superior, the device performs the following tasks:
{ Considers this port as the designated port.
3 { Replaces the configuration BPDU on the port with the calculated configuration BPDU.
{ Periodically sends the calculated configuration BPDU.
• If the configuration BPDU on the port is superior, the device blocks this port without
updating its configuration BPDU. The blocked port can receive BPDUs, but cannot send
BPDUs or forward data traffic.
When the network topology is stable, only the root port and designated ports forward user traffic.
Other ports are all in the blocked state to receive BPDUs but not to forward BPDUs or user
traffic.
Table 5 Selecting the optimum configuration BPDU
Step Actions
Upon receiving a configuration BPDU on a port, the device compares the priority of the received
configuration BPDU with that of the configuration BPDU generated by the port.
• If the former priority is lower, the device discards the received configuration BPDU and
1
keeps the configuration BPDU the port generated.
• If the former priority is higher, the device replaces the content of the configuration BPDU
generated by the port with the content of the received configuration BPDU.
The device compares the configuration BPDUs of all the ports and chooses the optimum
2
configuration BPDU.
82
b. If configuration BPDUs have the same root bridge ID, their root path costs are compared.
For example, the root path cost in a configuration BPDU plus the path cost of a receiving
port is S. The configuration BPDU with the smallest S value has the highest priority.
c. If all configuration BPDUs have the same root bridge ID and S value, the following attributes
are compared in sequence:
− Designated bridge IDs.
− Designated port IDs.
− IDs of the receiving ports.
The configuration BPDU that contains a smaller designated bridge ID, designated port ID, or
receiving port ID is selected.
A tree-shape topology forms when the root bridge, root ports, and designated ports are selected.
Example of STP calculation
Figure 21 provides an example showing how the STP algorithm works.
Figure 21 The STP algorithm
Device A
Priority = 0
Port A1 Port A2
Port B1 Port C1
Port B2 Port C2
Path cost = 4
Device B Device C
Priority = 1 Priority = 2
As shown in Figure 21, the priority values of Device A, Device B, and Device C are 0, 1, and 2,
respectively. The path costs of links among the three devices are 5, 10, and 4.
1. Device state initialization.
In Table 6, each configuration BPDU contains the following fields: root bridge ID, root path cost,
designated bridge ID, and designated port ID.
Table 6 Initial state of each device
83
In Table 7, each configuration BPDU contains the following fields: root bridge ID, root path cost,
designated bridge ID, and designated port ID.
Table 7 Comparison process and result on each device
Configuration BPDU on
Device Comparison process
ports after comparison
Port A1 performs the following tasks:
5. Receives the configuration BPDU of Port B1 {1, 0, 1, Port
B1}.
6. Determines that its existing configuration BPDU {0, 0, 0,
Port A1} is superior to the received configuration BPDU.
7. Discards the received one.
Port A2 performs the following tasks: • Port A1: {0, 0, 0, Port
8. Receives the configuration BPDU of Port C1 {2, 0, 2, Port A1}
Device A C1}. • Port A2: {0, 0, 0, Port
9. Determines that its existing configuration BPDU {0, 0, 0, A2}
Port A2} is superior to the received configuration BPDU.
10. Discards the received one.
Device A determines that it is both the root bridge and
designated bridge in the configuration BPDUs of all its ports. It
considers itself as the root bridge. It does not change the
configuration BPDU of any port and starts to periodically send
configuration BPDUs.
Port B1 performs the following tasks:
11. Receives the configuration BPDU of Port A1 {0, 0, 0, Port
A1}.
12. Determines that the received configuration BPDU is
superior to its existing configuration BPDU {1, 0, 1, Port
B1}. • Port B1: {0, 0, 0, Port
A1}
13. Updates its configuration BPDU.
• Port B2: {1, 0, 1, Port
Port B2 performs the following tasks: B2}
14. Receives the configuration BPDU of Port C2 {2, 0, 2, Port
C2}.
15. Determines that its existing configuration BPDU {1, 0, 1,
Port B2} is superior to the received configuration BPDU.
16. Discards the received BPDU.
Device B
Device B performs the following tasks:
17. Compares the configuration BPDUs of all its ports.
18. Decides that the configuration BPDU of Port B1 is the
optimum.
19. Selects Port B1 as the root port with the configuration
BPDU unchanged. • Root port (Port B1): {0,
0, 0, Port A1}
Based on the configuration BPDU and path cost of the root
port, Device B calculates a designated port configuration • Designated port (Port
BPDU for Port B2 {0, 5, 1, Port B2}. Device B compares it with B2): {0, 5, 1, Port B2}
the existing configuration BPDU of Port B2 {1, 0, 1, Port B2}.
Device B determines that the calculated one is superior, and
determines that Port B2 is the designated port. It replaces the
configuration BPDU on Port B2 with the calculated one, and
periodically sends the calculated configuration BPDU.
Port C1 performs the following tasks:
20. Receives the configuration BPDU of Port A2 {0, 0, 0, Port • Port C1: {0, 0, 0, Port
A2}. A2}
Device C
21. Determines that the received configuration BPDU is • Port C2: {1, 0, 1, Port
superior to its existing configuration BPDU {2, 0, 2, Port B2}
C1}.
84
Configuration BPDU on
Device Comparison process
ports after comparison
22. Updates its configuration BPDU.
Port C2 performs the following tasks:
23. Receives the original configuration BPDU of Port B2 {1, 0,
1, Port B2}.
24. Determines that the received configuration BPDU is
superior to the existing configuration BPDU {2, 0, 2, Port
C2}.
25. Updates its configuration BPDU.
Device C performs the following tasks:
26. Compares the configuration BPDUs of all its ports.
27. Decides that the configuration BPDU of Port C1 is the
optimum.
28. Selects Port C1 as the root port with the configuration
BPDU unchanged. • Root port (Port C1): {0,
0, 0, Port A2}
Based on the configuration BPDU and path cost of the root
port, Device C calculates the configuration BPDU of Port C2 {0, • Designated port (Port
10, 2, Port C2}. Device C compares it with the existing C2): {0, 10, 2, Port C2}
configuration BPDU of Port C2 {1, 0, 1, Port B2}. Device C
determines that the calculated configuration BPDU is superior
to the existing one, selects Port C2 as the designated port, and
replaces the configuration BPDU of Port C2 with the calculated
one.
Port C2 performs the following tasks:
29. Receives the updated configuration BPDU of Port B2 {0,
5, 1, Port B2}.
30. Determines that the received configuration BPDU is
superior to its existing configuration BPDU {0, 10, 2, Port
C2}. • Port C1: {0, 0, 0, Port
A2}
31. Updates its configuration BPDU.
• Port C2: {0, 5, 1, Port
Port C1 performs the following tasks: B2}
32. Receives a periodic configuration BPDU {0, 0, 0, Port A2}
from Port A2.
33. Determines that it is the same as the existing
configuration BPDU.
34. Discards the received BPDU.
Device C determines that the root path cost of Port C1 (10)
(root path cost of the received configuration BPDU (0) plus
path cost of Port C1 (10)) is larger than that of Port C2 (9) (root
path cost of the received configuration BPDU (5) plus path cost
of Port C2 (4)). Device C determines that the configuration
BPDU of Port C2 is the optimum, and selects Port C2 as the
root port with the configuration BPDU unchanged.
Based on the configuration BPDU and path cost of the root
port, Device C performs the following tasks: • Blocked port (Port C1):
{0, 0, 0, Port A2}
35. Calculates a designated port configuration BPDU for Port
C1 {0, 9, 2, Port C1}. • Root port (Port C2): {0,
5, 1, Port B2}
36. Compares it with the existing configuration BPDU of Port
C1 {0, 0, 0, Port A2}.
37. Determines that the existing configuration BPDU is
superior to the calculated one and blocks Port C1 with the
configuration BPDU unchanged.
Port C1 does not forward data until a new event triggers a
spanning tree calculation process: for example, the link
between Device B and Device C is down.
85
After the comparison processes described in Table 7, a spanning tree with Device A as the root
bridge is established, as shown in Figure 22.
Figure 22 The final calculated spanning tree
86
• Max age
The device uses the max age to determine whether a stored configuration BPDU has expired
and discards it if the max age is exceeded.
RSTP
RSTP achieves rapid network convergence by allowing a newly elected root port or designated port
to enter the forwarding state much faster than STP.
A newly elected RSTP root port rapidly enters the forwarding state when the following conditions
exist:
• The old root port on the device has stopped forwarding data.
• The upstream designated port has started forwarding data.
A newly elected RSTP designated port rapidly enters the forwarding state if it is an edge port or it
connects to a point-to-point link.
• A port that directly connects to a user terminal can be configured as an edge port. Edge ports
directly enter the forwarding state.
• When a designated port connects to a point-to-point link, it enters the forwarding state
immediately after the device receives a handshake response from the directly connected
device.
PVST
In an STP- or RSTP-enabled LAN, all bridges share one spanning tree. Traffic from all VLANs is
forwarded along the spanning tree, and ports cannot be blocked on a per-VLAN basis to prune loops.
PVST allows every VLAN to have its own spanning tree, which increases utilization of links and
bandwidth. Because each VLAN runs STP or RSTP independently, a spanning tree only serves its
VLAN.
A PVST-enabled H3C device can communicate with a third-party device that is running Rapid PVST
or PVST. The PVST-enabled H3C device supports fast network convergence like RSTP when
connected to PVST-enabled H3C devices or third-party devices enabled with Rapid PVST.
A port's link type determines the type of BPDUs the port sends.
• An access port sends STP BPDUs.
• A trunk or hybrid port sends STP BPDUs in VLAN 1 and sends PVST BPDUs in other VLANs.
MSTP
MSTP overcomes the following STP, RSTP, and PVST limitations:
• STP limitations—STP does not support rapid state transition of ports. A newly elected port
must wait twice the forward delay time before it transits to the forwarding state.
• RSTP limitations—Although RSTP enables faster network convergence than STP, RSTP fails
to provide load balancing among VLANs. As with STP, all RSTP bridges in a LAN share one
spanning tree and forward packets from all VLANs along this spanning tree.
• PVST limitations—Because each VLAN has its spanning tree, the amount of PVST BPDUs is
proportional to the number of VLANs on a trunk or hybrid port. When the trunk or hybrid port
permits too many VLANs, both resources and calculations for maintaining the VLAN spanning
trees increase dramatically. If a status change occurs on the trunk or hybrid port that permits
multiple VLANs, the device CPU will be overburdened with recalculating the affected spanning
trees. As a result, network performance is degraded.
87
MSTP features
Developed based on IEEE 802.1s, MSTP overcomes the limitations of STP, RSTP, and PVST. In
addition to supporting rapid network convergence, it allows data flows of different VLANs to be
forwarded along separate paths. This provides a better load sharing mechanism for redundant links.
MSTP provides the following features:
• MSTP divides a switched network into multiple regions, each of which contains multiple
spanning trees that are independent of one another.
• MSTP supports mapping VLANs to spanning tree instances by means of a VLAN-to-instance
mapping table. MSTP can reduce communication overheads and resource usage by mapping
multiple VLANs to one instance.
• MSTP prunes a loop network into a loop-free tree, which avoids proliferation and endless
cycling of packets in a loop network. In addition, it supports load balancing of VLAN data by
providing multiple redundant paths for data forwarding.
• MSTP is compatible with STP and RSTP, and partially compatible with PVST.
88
Figure 24 Network diagram and topology of MST region 3
To MST region 2
MST region
A multiple spanning tree region (MST region) consists of multiple devices in a switched network and
the network segments among them. All these devices have the following characteristics:
• A spanning tree protocol enabled
• Same region name
• Same VLAN-to-instance mapping configuration
• Same MSTP revision level
• Physically linked together
Multiple MST regions can exist in a switched network. You can assign multiple devices to the same
MST region as shown in Figure 23.
• The switched network comprises four MST regions, MST region 1 through MST region 4.
• All devices in each MST region have the same MST region configuration.
MSTI
MSTP can generate multiple independent spanning trees in an MST region, and each spanning tree
is mapped to the specific VLANs. Each spanning tree is referred to as a multiple spanning tree
instance (MSTI).
In Figure 24, MST region 3 comprises three MSTIs, MSTI 1, MSTI 2, and MSTI 0.
VLAN-to-instance mapping table
As an attribute of an MST region, the VLAN-to-instance mapping table describes the mapping
relationships between VLANs and MSTIs.
In Figure 24, the VLAN-to-instance mapping table of MST region 3 is as follows:
• VLAN 1 to MSTI 1.
• VLAN 2 and VLAN 3 to MSTI 2.
• Other VLANs to MSTI 0.
MSTP achieves load balancing by means of the VLAN-to-instance mapping table.
CST
The common spanning tree (CST) is a single spanning tree that connects all MST regions in a
switched network. If you regard each MST region as a device, the CST is a spanning tree calculated
by these devices through STP or RSTP.
89
The blue lines in Figure 23 represent the CST.
IST
An internal spanning tree (IST) is a spanning tree that runs in an MST region. It is also called MSTI 0,
a special MSTI to which all VLANs are mapped by default.
In Figure 23, MSTI 0 is the IST in MST region 3.
CIST
The common and internal spanning tree (CIST) is a single spanning tree that connects all devices in
a switched network. It consists of the ISTs in all MST regions and the CST.
In Figure 23, the ISTs (MSTI 0) in all MST regions plus the inter-region CST constitute the CIST of the
entire network.
Regional root
The root bridge of the IST or an MSTI within an MST region is the regional root of the IST or MSTI.
Based on the topology, different spanning trees in an MST region might have different regional roots,
as shown in MST region 3 in Figure 24:
• The regional root of MSTI 1 is Device B.
• The regional root of MSTI 2 is Device C.
• The regional root of MSTI 0 (also known as the IST) is Device A.
Common root bridge
The common root bridge is the root bridge of the CIST.
In Figure 23, the common root bridge is a device in MST region 1.
Port roles
A port can play different roles in different MSTIs. As shown in Figure 25, an MST region comprises
Device A, Device B, Device C, and Device D. Port A1 and port A2 of Device A connect to the
common root bridge. Port B2 and Port B3 of Device B form a loop. Port C3 and Port C4 of Device C
connect to other MST regions. Port D3 of Device D directly connects to a host.
Figure 25 Port roles
90
MSTP calculation involves the following port roles:
• Root port—Forwards data for a non-root bridge to the root bridge. The root bridge does not
have any root port.
• Designated port—Forwards data to the downstream network segment or device.
• Alternate port—Acts as the backup port for a root port or master port. When the root port or
master port is blocked, the alternate port takes over.
• Backup port—Acts as the backup port of a designated port. When the designated port is
invalid, the backup port becomes the new designated port. A loop occurs when two ports of the
same spanning tree device are connected, so the device blocks one of the ports. The blocked
port acts as the backup.
• Edge port—Does not connect to any network device or network segment, but directly connects
to a user host.
• Master port—Acts as a port on the shortest path from the local MST region to the common root
bridge. The master port is not always located on the regional root. It is a root port on the IST or
CIST and still a master port on the other MSTIs.
• Boundary port—Connects an MST region to another MST region or to an STP/RSTP-running
device. In MSTP calculation, a boundary port's role on an MSTI is consistent with its role on the
CIST. However, that is not true with master ports. A master port on MSTIs is a root port on the
CIST.
Port states
In MSTP, a port can be in one of the following states:
• Forwarding—The port receives and sends BPDUs, learns MAC addresses, and forwards user
traffic.
• Learning—The port receives and sends BPDUs, learns MAC addresses, but does not forward
user traffic. Learning is an intermediate port state.
• Discarding—The port receives and sends BPDUs, but does not learn MAC addresses or
forward user traffic.
NOTE:
When in different MSTIs, a port can be in different states.
A port state is not exclusively associated with a port role. Table 8 lists the port states that each port
role supports. (A check mark [√] indicates that the port supports this state, while a dash [—] indicates
that the port does not support this state.)
Table 8 Port states that different port roles support
91
Like STP, MSTP uses configuration BPDUs to calculate spanning trees. An important difference is
that an MSTP BPDU carries the MSTP configuration of the bridge from which the BPDU is sent.
CIST calculation
During the CIST calculation, the following process takes place:
• The device with the highest priority is elected as the root bridge of the CIST.
• MSTP generates an IST within each MST region through calculation.
• MSTP regards each MST region as a single device and generates a CST among these MST
regions through calculation.
The CST and ISTs constitute the CIST of the entire network.
MSTI calculation
Within an MST region, MSTP generates different MSTIs for different VLANs based on the
VLAN-to-instance mappings. For each spanning tree, MSTP performs a separate calculation
process similar to spanning tree calculation in STP. For more information, see "Calculation process
of the STP algorithm."
In MSTP, a VLAN packet is forwarded along the following paths:
• Within an MST region, the packet is forwarded along the corresponding MSTI.
• Between two MST regions, the packet is forwarded along the CST.
92
• Determine the spanning tree protocol to be used (STP, RSTP, PVST, or MSTP).
• Plan the device roles (the root bridge or leaf node).
When you configure spanning tree protocols, follow these restrictions and guidelines:
• If both MVRP and a spanning tree protocol are enabled on a device, MVRP packets are
forwarded along MSTIs. To advertise a specific VLAN within the network through MVRP, make
sure this VLAN is mapped to an MSTI when you configure the VLAN-to-instance mapping table.
For more information about MVRP, see "Configuring MVRP."
• To connect a spanning tree network to a TRILL network, make sure the following requirements
are met:
{ The spanning tree protocol is disabled on the TRILL network.
{ An edge port is used to connect the spanning tree network to the TRILL network. The edge
port can quickly transit to the forwarding state. This prevents network topology changes
from influencing the TRILL network.
For more information about TRILL, see TRILL Configuration Guide.
• The spanning tree configurations are mutually exclusive with service loopback and Smart Link.
• Configurations made in system view take effect globally. Configurations made in Ethernet
interface view or WLAN mesh interface view take effect on the interface only. Configurations
made in Layer 2 aggregate interface view take effect only on the aggregate interface.
Configurations made on an aggregation member port can take effect only after the port is
removed from the aggregation group.
• After you enable a spanning tree protocol on a Layer 2 aggregate interface, the system
performs spanning tree calculation on the Layer 2 aggregate interface. It does not perform
spanning tree calculation on the aggregation member ports. The spanning tree protocol enable
state and forwarding state of each selected member port is consistent with those of the
corresponding Layer 2 aggregate interface.
• The member ports of an aggregation group do not participate in spanning tree calculation.
However, the ports still reserve their spanning tree configurations for participating in spanning
tree calculation after leaving the aggregation group.
93
Tasks at a glance
• (Required.) Enabling the spanning tree feature
(Optional.) Configuring TC Snooping
(Optional.) Configuring protection functions
(Optional.) Disabling the device to reactivate the shutdown edge ports
(Optional.) Enabling SNMP notifications for new-root election and topology change events
94
Tasks at a glance
• (Optional.) Configuring the root bridge or a secondary root bridge
• (Optional.) Configuring the device priority
• (Optional.) Configuring the network diameter of a switched network
• (Optional.) Configuring spanning tree timers
• (Optional.) Configuring the timeout factor
• (Optional.) Configuring the BPDU transmission rate
• (Optional.) Configuring edge ports
• (Optional.) Configuring the port link type
• (Optional.) Enabling outputting port state transition information
• (Required.) Enabling the spanning tree feature
Configuring the leaf nodes:
• (Required.) Setting the spanning tree mode
• (Optional.) Configuring the device priority
• (Optional.) Configuring the timeout factor
• (Optional.) Configuring the BPDU transmission rate
• (Optional.) Configuring edge ports
• (Optional.) Configuring path costs of ports
• (Optional.) Configuring the port priority
• (Optional.) Configuring the port link type
• (Optional.) Enabling outputting port state transition information
• (Required.) Enabling the spanning tree feature
(Optional.) Performing mCheck
(Optional.) Configuring protection functions
(Optional.) Disabling the device to reactivate the shutdown edge ports
(Optional.) Enabling SNMP notifications for new-root election and topology change events
95
Tasks at a glance
• (Optional.) Configuring the device priority
• (Optional.) Configuring the timeout factor
• (Optional.) Configuring the BPDU transmission rate
• (Optional.) Configuring edge ports
• (Optional.) Configuring path costs of ports
• (Optional.) Configuring the port priority
• (Optional.) Configuring the port link type
• (Optional.) Configuring the mode a port uses to recognize and send MSTP packets
• (Optional.) Enabling outputting port state transition information
• (Required.) Enabling the spanning tree feature
(Optional.) Performing mCheck
(Optional.) Configuring Digest Snooping
(Optional.) Configuring No Agreement Check
(Optional.) Configuring TC Snooping
(Optional.) Configuring protection functions
(Optional.) Disabling the device to reactivate the shutdown edge ports
(Optional.) Enabling SNMP notifications for new-root election and topology change events
96
Step Command Remarks
97
A device has independent roles in different spanning trees. It can act as the root bridge in one
spanning tree and as a secondary root bridge in another. However, one device cannot be the root
bridge and a secondary root bridge in the same spanning tree.
A spanning tree can have only one root bridge. If multiple devices can be selected as the root bridge
in a spanning tree, the device with the lowest MAC address is chosen.
When the root bridge of an instance fails or is shut down and no new root bridge is specified, the
following events occur:
• If you specify only one secondary root bridge for the instance, it becomes the root bridge.
• If you specify multiple secondary root bridges for the instance, the secondary root bridge with
the lowest MAC address is given priority.
• If you do not specify a secondary root bridge, a new root bridge is calculated.
You can specify one root bridge for each spanning tree, regardless of the device priority settings.
Once you specify a device as the root bridge or a secondary root bridge, you cannot change its
priority.
You can configure the current device as the root bridge by setting the device priority to 0. For the
device priority configuration, see "Configuring the device priority."
98
Configuring the device priority
Device priority is a factor in calculating the spanning tree. The priority of a device determines
whether the device can be elected as the root bridge of a spanning tree. A lower value indicates a
higher priority. You can set the priority of a device to a low value to specify the device as the root
bridge of the spanning tree. A spanning tree device can have different priorities in different spanning
trees.
During root bridge selection, if all devices in a spanning tree have the same priority, the one with the
lowest MAC address is selected. You cannot change the priority of a device after it is configured as
the root bridge or as a secondary root bridge.
To configure the priority of a device in a specified MSTI:
99
Configuring the network diameter of a switched
network
Any two terminal devices in a switched network can reach each other through a specific path, and
there are a series of devices on the path. The switched network diameter is the maximum number of
devices on the path for an edge device to reach another one in the switched network through the root
bridge. The network diameter indicates the network size. The bigger the diameter, the larger the
network size.
Based on the network diameter you configured, the system automatically sets an optimal hello time,
forward delay, and max age for the device.
In STP, RSTP, or MSTP mode, each MST region is considered a device. The configured network
diameter takes effect only on the CIST (or the common root bridge) but not on other MSTIs.
In PVST mode, the configured network diameter takes effect only on the root bridges of the specified
VLANs.
To configure the network diameter of a switched network:
100
Configuration restrictions and guidelines
• The length of the forward delay timer is related to the network diameter of the switched network.
The larger the network diameter is, the longer the forward delay time should be. If the forward
delay timer is too short, temporary redundant paths might occur. If the forward delay timer is too
long, network convergence might take a long time. As a best practice, use the automatically
calculated value.
• An appropriate hello time setting enables the device to promptly detect link failures on the
network without using excessive network resources. If the hello time is too long, the device
mistakes packet loss for a link failure and triggers a new spanning tree calculation process. If
the hello time is too short, the device frequently sends the same configuration BPDUs, which
wastes device and network resources. As a best practice, use the automatically calculated
value.
• If the max age timer is too short, the device frequently begins spanning tree calculations and
might mistake network congestion as a link failure. If the max age timer is too long, the device
might fail to promptly detect link failures and quickly launch spanning tree calculations, reducing
the auto-sensing capability of the network. As a best practice, use the automatically calculated
value.
Configuration procedure
To configure the spanning tree timers:
101
On a stable network, you can prevent undesired spanning tree calculations by setting the timeout
factor to 5, 6, or 7.
To configure the timeout factor:
102
Configuration procedure
To configure a port as an edge port:
You can specify a standard for the device to use in automatic calculation for the default path cost.
The device supports the following standards:
• dot1d-1998—The device calculates the default path cost for ports based on IEEE 802.1d-1998.
• dot1t—The device calculates the default path cost for ports based on IEEE 802.1t.
• legacy—The device calculates the default path cost for ports based on a private standard.
When you specify a standard for the device to use when it calculates the default path cost, follow
these guidelines:
• When it calculates the path cost for an aggregate interface, IEEE 802.1t takes into account the
number of Selected ports in its aggregation group. However, IEEE 802.1d-1998 does not take
into account the number of Selected ports. The calculation formula of IEEE 802.1t is: Path cost
= 200,000,000/link speed (in 100 kbps), where link speed is the sum of the link speed values of
the Selected ports in the aggregation group.
• IEEE 802.1d-1998 or the private standard always assigns the smallest possible value to a
single port or an aggregate interface when the link speed of the port or interface exceeds 10
Gbps. The forwarding path selected based on this criterion might not be the best one. To solve
this problem, perform one of the following tasks:
{ Use dot1t as the standard for default path cost calculation.
{ Manually set the path cost for the port (see "Configuring path costs of ports").
To specify a standard for the device to use when it calculates the default path cost:
103
Step Command Remarks
1. Enter system view. system-view N/A
2. Specify a standard for the
device to use when it stp pathcost-standard
calculates the default path The default setting is legacy.
{ dot1d-1998 | dot1t | legacy }
costs of its ports.
Table 9 Mappings between the link speed and the path cost
Path cost
Link speed Port type IEEE Private
IEEE 802.1t
802.1d-1998 standard
0 N/A 65535 200000000 200000
Single port 2000000 2000
Aggregate interface
containing two Selected 1000000 1800
ports
104
Path cost
Link speed Port type IEEE Private
IEEE 802.1t
802.1d-1998 standard
Aggregate interface
containing four Selected 500 1
ports
Single port 1000 1
Aggregate interface
containing two Selected 500 1
ports
105
Step Command Remarks
the ports. stp cost cost automatically calculates
• In PVST mode: the path cost of each port.
stp vlan vlan-id-list cost cost
• In MSTP mode:
stp [ instance instance-list ] cost
cost
Configuration example
# In MSTP mode, perform the following tasks:
• Configure the device to calculate the default path costs of its ports by using IEEE 802.1d-1998.
• Set the path cost of Ten-GigabitEthernet 1/0/3 to 200 on MSTI 2.
<Sysname> system-view
[Sysname] stp pathcost-standard dot1d-1998
Cost of every port will be reset and automatically re-calculated after you change the
current pathcost standard. Continue?[Y/N]:y
Cost of every port has been re-calculated.
[Sysname] interface ten-gigabitethernet 1/0/3
[Sysname-Ten-GigabitEthernet1/0/3] stp instance 2 cost 200
106
Step Command Remarks
aggregate interface view.
• In STP/RSTP mode:
stp port priority priority
• In PVST mode:
3. Configure the port priority.
stp vlan vlan-id-list port priority The default setting is 128
priority for all ports.
• In MSTP mode:
stp [ instance instance-list ] port
priority priority
Configuration procedure
To configure the link type of a port:
107
You can configure the MSTP packet format on a port. Then, the port sends only MSTP packets of the
configured format to communicate with devices that send packets of the same format.
By default, a port in auto mode sends 802.1s MSTP packets. When the port receives an MSTP
packet of a legacy format, the port starts to send packets only of the legacy format. This prevents the
port from frequently changing the format of sent packets. To configure the port to send 802.1s MSTP
packets, shut down and then bring up the port.
When the number of existing MSTIs exceeds 48, the port can send only 802.1s MSTP packets.
To configure the MSTP packet format to be supported on a port:
108
Enabling the spanning tree feature in STP/RSTP/MSTP
mode
Step Command Remarks
1. Enter system view. system-view N/A
• If the device starts up with the initial
settings, the spanning tree feature is
disabled globally by default.
• If the device starts up with the factory
2. Enable the spanning tree
stp global enable defaults, the spanning tree feature is
feature.
enabled globally by default.
For more information about the startup
configuration, see Fundamentals
Configuration Guide.
3. Enter Layer 2 Ethernet or interface interface-type
aggregate interface view. N/A
interface-number
4. (Optional.) Enable the
spanning tree feature for the By default, the spanning tree feature is
stp enable
port. enabled on all ports.
Performing mCheck
The mCheck feature enables user intervention in the port status transition process.
When a port on an MSTP, RSTP, or PVST device connects to an STP device and receives STP
BPDUs, the port automatically transits to the STP mode. However, the port cannot automatically
transit back to the original mode when the following conditions exist:
• The peer STP device is shut down or removed.
109
• The port cannot detect the change.
To forcibly transit the port to operate in the original mode, you can perform an mCheck operation.
For example, Device A, Device B, and Device C are connected in sequence. Device A runs STP,
Device B does not run any spanning tree protocol, and Device C runs RSTP, PVST, or MSTP. In this
case, when Device C receives an STP BPDU transparently transmitted by Device B, the receiving
port transits to the STP mode. If you configure Device B to run RSTP, PVST, or MSTP with Device C,
you must perform mCheck operations on the ports interconnecting Device B and Device C.
Configuration procedure
Performing mCheck globally
Step Command
1. Enter system view. system-view
Step Command
1. Enter system view. system-view
2. Enter Layer 2 Ethernet or aggregate interface
view. interface interface-type interface-number
As defined in IEEE 802.1s, connected devices are in the same region only when they have the same
MST region-related configurations, including:
• Region name.
• Revision level.
• VLAN-to-instance mappings.
110
A spanning tree device identifies devices in the same MST region by determining the configuration
ID in BPDU packets. The configuration ID includes the region name, revision level, and configuration
digest. It is 16-byte long and is the result calculated through the HMAC-MD5 algorithm based on
VLAN-to-instance mappings.
Because spanning tree implementations vary by vendor, the configuration digests calculated through
private keys are different. The devices of different vendors in the same MST region cannot
communicate with each other.
To enable communication between an H3C device and a third-party device in the same MST region,
enable Digest Snooping on the H3C device port connecting them.
Configuration procedure
You can enable Digest Snooping only on the H3C device that is connected to a third-party device that
uses its private key to calculate the configuration digest.
To configure Digest Snooping:
111
Enable Digest Snooping on the ports of Device A and Device B that connect to Device C, so that the
three devices can communicate with one another.
Figure 26 Network diagram
Designated port
Blocked port
Normal link
XGE1/0/1 XGE1/0/1
Blocked link
XGE1/0/2 XGE1/0/2
Device A Device B
Configuration procedure
# Enable Digest Snooping on Ten-GigabitEthernet 1/0/1 of Device A and enable global Digest
Snooping on Device A.
<DeviceA> system-view
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] stp config-digest-snooping
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] stp global config-digest-snooping
# Enable Digest Snooping on Ten-GigabitEthernet 1/0/1 of Device B and enable global Digest
Snooping on Device B.
<DeviceB> system-view
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] stp config-digest-snooping
[DeviceB-Ten-GigabitEthernet1/0/1] quit
[DeviceB] stp global config-digest-snooping
112
Figure 27 Rapid state transition of an MSTP designated port
If the upstream device is a third-party device, the rapid state transition implementation might be
limited as follows:
• The upstream device uses a rapid transition mechanism similar to that of RSTP.
• The downstream device adopts MSTP and does not operate in RSTP mode.
In this case, the following occurs:
1. The root port on the downstream device receives no agreement packet from the upstream
device.
2. It sends no agreement packets to the upstream device.
As a result, the designated port of the upstream device can transit to the forwarding state only after a
period twice the Forward Delay.
You can enable the No Agreement Check feature on the downstream device's port to enable the
designated port of the upstream device to transit its state rapidly.
Configuration prerequisites
Before you configure the No Agreement Check function, complete the following tasks:
• Connect a device to a third-party upstream device that supports spanning tree protocols
through a point-to-point link.
• Configure the same region name, revision level, and VLAN-to-instance mappings on the two
devices.
113
Configuration procedure
Enable the No Agreement Check feature on the root port.
To configure No Agreement Check:
Configuration procedure
# Enable No Agreement Check on Ten-GigabitEthernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] stp no-agreement-check
Configuring TC Snooping
As shown in Figure 30, an IRF fabric connects to two user networks through double links.
• Device A and Device B form an IRF fabric.
• The spanning tree feature is disabled on Device A and Device B and enabled on all devices in
user network 1 and user network 2.
• The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.
When the network topology changes, it takes time for the IRF fabric to update its MAC address table
and ARP table. During this period, traffic in the network might be interrupted.
114
Figure 30 TC Snooping application scenario
To avoid traffic interruption, you can enable TC Snooping on the IRF fabric. After receiving a
TC-BPDU through a port, the IRF fabric updates MAC address table and ARP table entries
associated with the port's VLAN. In this way, TC Snooping prevents topology change from
interrupting traffic forwarding in the network. For more information about the MAC address table and
the ARP table, see "Configuring the MAC address table" and Layer 3—IP Services Configuration
Guide.
Configuration procedure
To enable TC Snooping:
115
• BPDU guard
• Root guard
• Loop guard
• Port role restriction
• TC-BPDU transmission restriction
• TC-BPDU guard
• BPDU drop
116
Step Command Remarks
By default, BPDU guard is not
configured on a per-edge port
Configure BPDU guard. stp port bpdu-protection
3. basis. The status of BPDU guard
{ enable | disable }
on an interface is the same as the
global BPDU status.
117
Do not enable loop guard on a port that connects user terminals. Otherwise, the port stays in the
discarding state in all MSTIs because it cannot receive BPDUs.
On a port, the loop guard function is mutually exclusive with the root guard function or the edge port
setting.
Configure loop guard on the root port and alternate ports of a device.
To enable loop guard:
The change to the bridge ID of a device in the user access network might cause a change to the
spanning tree topology in the core network. To avoid this problem, you can enable port role
restriction on a port. With this feature enabled, when the port receives a superior BPDU, it becomes
an alternate port rather than a root port.
Make this configuration on the port that connects to the user access network.
To configure port role restriction:
The topology change to the user access network might cause the forwarding address changes to the
core network. When the user access network topology is unstable, the user access network might
affect the core network. To avoid this problem, you can enable TC-BPDU transmission restriction on
a port. With this feature enabled, when the port receives a TC-BPDU, it does not forward the
TC-BPDU to other ports.
Make this configuration on the port that connects to the user access network.
To configure TC-BPDU transmission restriction:
118
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2 Ethernet or interface interface-type
aggregate interface view. N/A
interface-number
119
Step Command Remarks
3. Enable BPDU drop on the By default, BPDU drop is
current interface. bpdu-drop any
disabled.
120
Step Command Remarks
• snmp-agent trap enable • In MSTP mode, SNMP
stp notifications are enabled in
MSTI 0 and disabled in other
In PVST mode, execute either of MSTIs for spanning tree
the following commands: topology changes.
3. Enable SNMP notifications
for spanning tree topology • snmp-agent trap enable • In PVST mode, SNMP
changes. stp tc notifications are disabled for
• snmp-agent trap enable spanning tree topology
stp changes in all VLANs.
4. Enable the device to By default, the device does not
generate a log when it generate a log when it detects or
detects or receives a TCN stp log enable tc
receives a TCN BPDU in PVST
BPDU in PVST mode. mode.
Task Command
Display information about ports blocked by spanning
display stp abnormal-port
tree protection functions.
display stp bpdu-statistics [ interface
Display BPDU statistics on ports. interface-type interface-number [ instance
instance-list ] ]
Display information about ports shut down by spanning
display stp down-port
tree protection functions.
Display the historical information of port role calculation display stp [ instance instance-list | vlan
for the specified MSTI or all MSTIs. vlan-id-list ] history [ slot slot-number ]
Display the statistics of TC/TCN BPDUs sent and display stp [ instance instance-list | vlan
received by all ports in the specified MSTI or all MSTIs. vlan-id-list ] tc [ slot slot-number ]
display stp [ instance instance-list | vlan
Display the spanning tree status and statistics. vlan-id-list ] [ interface interface-list | slot
slot-number ] [ brief ]
Display the MST region configuration information that
display stp region-configuration
has taken effect.
Display the root bridge information of all MSTIs. display stp root
Clear the spanning tree statistics. reset stp [ interface interface-list ]
121
• VLAN 10 packets are forwarded along MSTI 1.
• VLAN 30 packets are forwarded along MSTI 3.
• VLAN 40 packets are forwarded along MSTI 4.
• VLAN 20 packets are forwarded along MSTI 0.
VLAN 10 and VLAN 30 are terminated on the distribution layer devices, and VLAN 40 is terminated
on the access layer devices. The root bridges of MSTI 1 and MSTI 3 are Device A and Device B,
respectively, and the root bridge of MSTI 4 is Device C.
Figure 31 Network diagram
1
XG
/0/
E1
E1
XG
/0/
1
XG
1
/0/
E1
E1
/0/
XG
Configuration procedure
1. Configure VLANs and VLAN member ports. (Details not shown.)
{ Create VLAN 10, VLAN 20, and VLAN 30 on both Device A and Device B.
{ Create VLAN 10, VLAN 20, and VLAN 40 on Device C.
{ Create VLAN 20, VLAN 30, and VLAN 40 on Device D.
{ Configure the ports on these devices as trunk ports and assign them to related VLANs.
2. Configure Device A:
# Enter MST region view, and configure the MST region name as example.
<DeviceA> system-view
[DeviceA] stp region-configuration
[DeviceA-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceA-mst-region] instance 1 vlan 10
[DeviceA-mst-region] instance 3 vlan 30
[DeviceA-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceA-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceA-mst-region] active region-configuration
[DeviceA-mst-region] quit
# Specify the device as the root bridge of MSTI 1.
[DeviceA] stp instance 1 root primary
122
# Enable the spanning tree feature globally.
[DeviceA] stp global enable
3. Configure Device B:
# Enter MST region view, and configure the MST region name as example.
<DeviceB> system-view
[DeviceB] stp region-configuration
[DeviceB-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceB-mst-region] instance 1 vlan 10
[DeviceB-mst-region] instance 3 vlan 30
[DeviceB-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceB-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceB-mst-region] active region-configuration
[DeviceB-mst-region] quit
# Specify the device as the root bridge of MSTI 3.
[DeviceB] stp instance 3 root primary
# Enable the spanning tree feature globally.
[DeviceB] stp global enable
4. Configure Device C:
# Enter MST region view, and configure the MST region name as example.
<DeviceC> system-view
[DeviceC] stp region-configuration
[DeviceC-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceC-mst-region] instance 1 vlan 10
[DeviceC-mst-region] instance 3 vlan 30
[DeviceC-mst-region] instance 4 vlan 40
# Configure the revision level of the MST region as 0.
[DeviceC-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceC-mst-region] active region-configuration
[DeviceC-mst-region] quit
# Specify the device as the root bridge of MSTI 4.
[DeviceC] stp instance 4 root primary
# Enable the spanning tree feature globally.
[DeviceC] stp global enable
5. Configure Device D:
# Enter MST region view, and configure the MST region name as example.
<DeviceD> system-view
[DeviceD] stp region-configuration
[DeviceD-mst-region] region-name example
# Map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3, and MSTI 4, respectively.
[DeviceD-mst-region] instance 1 vlan 10
[DeviceD-mst-region] instance 3 vlan 30
[DeviceD-mst-region] instance 4 vlan 40
123
# Configure the revision level of the MST region as 0.
[DeviceD-mst-region] revision-level 0
# Activate MST region configuration.
[DeviceD-mst-region] active region-configuration
[DeviceD-mst-region] quit
# Enable the spanning tree feature globally.
[DeviceD] stp global enable
124
0 Ten-GigabitEthernet1/0/3 ALTE DISCARDING NONE
3 Ten-GigabitEthernet1/0/1 ROOT FORWARDING NONE
3 Ten-GigabitEthernet1/0/2 ALTE DISCARDING NONE
4 Ten-GigabitEthernet1/0/3 ROOT FORWARDING NONE
Based on the output, you can draw each MSTI mapped to each VLAN, as shown in Figure 32.
Figure 32 MSTIs mapped to different VLANs
A B A B
C C D
A B
D C D
125
Figure 33 Network diagram
/1
XG
/0
E1
E1
XG
/0
/1
XG
1
/0/
E1
E1
/0/
XG
1
Configuration procedure
1. Configure VLANs and VLAN member ports. (Details not shown.)
{ Create VLAN 10, VLAN 20, and VLAN 30 on both Device A and Device B.
{ Create VLAN 10, VLAN 20, and VLAN 40 on Device C.
{ Create VLAN 20, VLAN 30, and VLAN 40 on Device D.
{ Configure the ports on these devices as trunk ports and assign them to related VLANs.
2. Configure Device A:
# Set the spanning tree mode to PVST.
<DeviceA> system-view
[DeviceA] stp mode pvst
# Configure the device as the root bridge of VLAN 10 and VLAN 20.
[DeviceA] stp vlan 10 20 root primary
# Enable the spanning tree feature globally and in VLAN 10, VLAN 20, and VLAN 30.
[DeviceA] stp global enable
[DeviceA] stp vlan 10 20 30 enable
3. Configure Device B:
# Set the spanning tree mode to PVST.
<DeviceB> system-view
[DeviceB] stp mode pvst
# Configure the device as the root bridge of VLAN 30.
[DeviceB] stp vlan 30 root primary
# Enable the spanning tree feature globally and in VLAN 10, VLAN 20, and VLAN 30.
[DeviceB] stp global enable
[DeviceB] stp vlan 10 20 30 enable
4. Configure Device C:
# Set the spanning tree mode to PVST.
<DeviceC> system-view
[DeviceC] stp mode pvst
# Configure the device as the root bridge of VLAN 40.
[DeviceC] stp vlan 40 root primary
# Enable the spanning tree feature globally and in VLAN 10, VLAN 20, and VLAN 40.
[DeviceC] stp global enable
126
[DeviceC] stp vlan 10 20 40 enable
5. Configure Device D:
# Set the spanning tree mode to PVST.
<DeviceD> system-view
[DeviceD] stp mode pvst
# Enable the spanning tree feature globally and in VLAN 20, VLAN 30, and VLAN 40.
[DeviceD] stp global enable
[DeviceD] stp vlan 20 30 40 enable
127
30 Ten-GigabitEthernet1/0/2 ALTE DISCARDING NONE
40 Ten-GigabitEthernet1/0/3 ROOT FORWARDING NONE
Based on the output, you can draw a topology for each VLAN spanning tree, as shown in Figure 34.
Figure 34 VLAN spanning tree topologies
128
Configuring loop detection
Overview
Incorrect network connections or configurations can create Layer 2 loops, which results in repeated
transmission of broadcasts, multicasts, or unknown unicasts. The repeated transmission can waste
network resources and can sometimes paralyze networks. The loop detection mechanism
immediately generates a log when a loop occurs so that you are promptly notified to adjust network
connections and configurations. You can configure loop detection to shut down the looped port. Logs
are maintained in the information center. For more information, see Network Management and
Monitoring Configuration Guide.
The Ethernet frame header for loop detection contains the following fields:
• DMAC—Destination MAC address of the frame, which is the multicast MAC address
010F-E200-0007. When a loop detection-enabled device receives a frame with this destination
MAC address, it sends the frame to the CPU and floods the frame in the VLAN from which the
frame was originally received.
• SMAC—Source MAC address of the frame, which is the bridge MAC address of the sending
device.
• TPID—Type of the VLAN tag, with the value of 0x8100.
• TCI—Information of the VLAN tag, including the priority and VLAN ID.
• Type—Protocol type, with the value of 0x8918.
Figure 36 Inner frame header for loop detection
The inner frame header for loop detection contains the following fields:
129
• Code—Protocol sub-type, which is 0x0001, indicating the loop detection protocol.
• Version—Protocol version, which is always 0x0000.
• Length—Length of the frame. The value includes the inner header, but excludes the Ethernet
header.
• Reserved—This field is reserved.
Frames for loop detection are encapsulated as TLV triplets.
Table 10 TLVs supported by loop detection
130
2. The device automatically sets the port to the forwarding state after the detection timer
configured by using the shutdown-interval command expires. For more information about the
shutdown-interval command, see Fundamentals Command Reference.
3. The device shuts down the port again if a loop is still detected on the port when the detection
timer expires.
This process is repeated until the loop is removed.
NOTE:
Incorrect recovery can occur when loop detection frames are discarded to reduce the load. To avoid
this problem, use the shutdown action or manually remove the loop.
131
Configuring the loop protection action
You can configure the loop protection action globally or on a per-port basis. The global configuration
applies to all ports. The per-port configuration applies to the individual ports. The per-port
configuration takes precedence over the global configuration.
132
Step Command Remarks
1. Enter system view. system-view N/A
2. Set the loop detection loopback-detection
interval. The default setting is 30 seconds.
interval-time interval
Task Command
Display the loop detection configuration and status. display loopback-detection
Device A
XGE1/0/1 XGE1/0/2
Device B Device C
VLAN 100
Configuration procedure
1. Configure Device A:
# Create VLAN 100, and globally enable loop detection for the VLAN.
<DeviceA> system-view
[DeviceA] vlan 100
[DeviceA-vlan100] quit
[DeviceA] loopback-detection global enable vlan 100
133
# Configure Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 as trunk ports, and
assign them to VLAN 100.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[DeviceA-Ten-GigabitEthernet1/0/1] quit
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Configure the global loop protection action as shutdown.
[DeviceA] loopback-detection global action shutdown
# Set the loop detection interval to 35 seconds.
[DeviceA] loopback-detection interval-time 35
2. Configure Device B:
# Create VLAN 100.
<DeviceB> system-view
[DeviceB] vlan 100
[DeviceB–vlan100] quit
# Configure Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 as trunk ports, and
assign them to VLAN 100.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[DeviceB-Ten-GigabitEthernet1/0/1] quit
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[DeviceB-Ten-GigabitEthernet1/0/2] quit
3. Configure Device C:
# Create VLAN 100.
<DeviceC> system-view
[DeviceC] vlan 100
[DeviceC–vlan100] quit
# Configure Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 as trunk ports, and
assign them to VLAN 100.
[DeviceC] interface ten-gigabitethernet 1/0/1
[DeviceC-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[DeviceC-Ten-GigabitEthernet1/0/1] quit
[DeviceC] interface ten-gigabitethernet 1/0/2
[DeviceC-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[DeviceC-Ten-GigabitEthernet1/0/2] quit
134
[DeviceA]
%Feb 24 15:04:29:663 2013 DeviceA LPDT/4/LPDT_LOOPED: Loopback exists on
Ten-GigabitEthernet1/0/1.
%Feb 24 15:04:29:667 2013 DeviceA LPDT/4/LPDT_LOOPED: Loopback exists on
Ten-GigabitEthernet1/0/2.
%Feb 24 15:04:44:243 2013 DeviceA LPDT/5/LPDT_RECOVERED: Loopback on
Ten-GigabitEthernet1/0/1 recovered.
%Feb 24 15:04:44:248 2013 DeviceA LPDT/5/LPDT_RECOVERED: Loopback on
Ten-GigabitEthernet1/0/2 recovered.
The output shows that the device has removed the loops from Ten-GigabitEthernet 1/0/1 and
Ten-GigabitEthernet 1/0/2 according to the shutdown action.
# Display the status of Ten-GigabitEthernet 1/0/1 on devices, for example, Device A.
[DeviceA] display interface ten-gigabitethernet 1/0/1
Ten-GigabitEthernet1/0/1 current state: DOWN (Loop detection down)
...
The output shows that Ten-GigabitEthernet 1/0/1 is already shut down by the loop detection module.
# Display the status of Ten-GigabitEthernet 1/0/2 on Device A.
[DeviceA] display interface ten-gigabitethernet 1/0/2
Ten-GigabitEthernet1/0/2 current state: DOWN (Loop detection down)
...
The output shows that Ten-GigabitEthernet 1/0/2 is already shut down by the loop detection module.
135
Configuring VLANs
Overview
Ethernet is a family of shared-media LAN technologies based on the CSMA/CD mechanism. An
Ethernet LAN is both a collision domain and a broadcast domain. Because the medium is shared,
collisions and broadcasts are common in an Ethernet LAN. Typically, bridges and Layer 2 switches
can reduce collisions in an Ethernet LAN. To confine broadcasts, a Layer 2 switch must use the
Virtual Local Area Network (VLAN) technology.
VLANs enable a Layer 2 switch to break a LAN down into smaller broadcast domains, as shown
in Figure 38.
Figure 38 A VLAN diagram
VLAN 2
Switch A Switch B
Router
VLAN 5
A VLAN is logically divided on an organizational basis rather than on a physical basis. For example,
you can assign all workstations and servers used by a particular workgroup to the same VLAN,
regardless of their physical locations. Hosts in the same VLAN can directly communicate with one
another. You need a router or a Layer 3 switch for hosts in different VLANs to communicate with one
another.
All these VLAN features reduce bandwidth waste, improve LAN security, and enable flexible virtual
group creation.
136
different values. For compatibility with a neighbor device, configure the TPID value on the
device to be the same as the neighbor device.
• Priority—3-bit long, identifies the 802.1p priority of the frame. For more information, see ACL
and QoS Configuration Guide.
• CFI—1-bit long canonical format indicator that indicates whether the MAC addresses are
encapsulated in the standard format when packets are transmitted across different media.
Available values include:
{ 0 (default)—The MAC addresses are encapsulated in the standard format.
{ 1—The MAC addresses are encapsulated in a nonstandard format.
This field is always set to 0 for Ethernet.
• VLAN ID—12-bit long, identifies the VLAN to which the frame belongs. The VLAN ID range is 0
to 4095. VLAN IDs 0 and 4095 are reserved, and VLAN IDs 1 to 4094 are user configurable.
The way a network device handles an incoming frame depends on whether the frame has a
VLAN-tag and the value of the VLAN tag (if any). For more information, see "Introduction."
Ethernet supports encapsulation formats Ethernet II, 802.3/802.2 LLC, 802.3/802.2 SNAP, and
802.3 raw. The Ethernet II encapsulation format is used here. For information about the VLAN tag
fields in other frame encapsulation formats, see related protocols and standards.
For a frame with multiple VLAN tags, the device handles it according to its outer-most VLAN tag and
transmits its inner VLAN tags as the payload.
NOTE:
• As the system default VLAN, VLAN 1 cannot be created or deleted.
• Before you delete a dynamic VLAN, a VLAN configured with the QoS policy, or a VLAN locked by
an application, you must first remove the configuration from the VLAN.
137
Configuring basic settings of a VLAN interface
For hosts of different VLANs to communicate at Layer 3, you can use VLAN interfaces. VLAN
interfaces are virtual interfaces used for Layer 3 communication between different VLANs. They do
not exist as physical entities on devices. For each VLAN, you can create one VLAN interface and
assign an IP address to it. The VLAN interface acts as the gateway of the VLAN to forward packets
destined for another IP subnet.
When you configure a VLAN interface, follow these restrictions and guidelines:
• Before you create a VLAN interface for a VLAN, create the VLAN first.
• You cannot create a VLAN interface for a sub-VLAN. For more information about sub-VLANs,
see "Configuring super VLANs."
• You cannot create VLAN interfaces for secondary VLANs that have the following
characteristics:
{ Associated with the same primary VLAN.
{ Enabled with Layer 3 communication in VLAN interface view of the primary VLAN interface.
For more information about secondary VLANs, see "Configuring the private VLAN."
To configure basic settings of a VLAN interface:
138
Configuring port-based VLANs
Introduction
Port-based VLANs group VLAN members by port. A port forwards packets from a VLAN only after it
is assigned to the VLAN.
Port link type
You can configure the link type of a port as access, trunk, or hybrid. The link types use the following
VLAN tag handling methods:
• Access—An access port can forward packets from only one VLAN and send these packets
untagged. An access port can connect a terminal device that does not support VLAN packets or
is used in scenarios that do not distinguish VLANs.
• Trunk—A trunk port can forward packets from multiple VLANs. Except packets from the port
VLAN ID (PVID), packets sent out of a trunk port are VLAN-tagged. Ports connecting network
devices are typically configured as trunk ports.
• Hybrid—A hybrid port can forward packets from multiple VLANs. The tagging status of the
packets forwarded by a hybrid port depends on the port configuration. Hybrid ports are typically
used in one-to-two VLAN mapping to remove SVLAN tags for downlink traffic. For more
information about one-to-two VLAN mapping, see "Configuring VLAN mapping."
PVID
The PVID identifies the default VLAN of a port.
When configuring the PVID on a port, follow these restrictions and guidelines:
• An access port can join only one VLAN. The VLAN to which the access port belongs is the PVID
of the port.
• A trunk or hybrid port supports multiple VLANs and the PVID configuration.
• When you use the undo vlan command to delete the PVID of a port, either of the following
events occurs depending on the port link type:
{ For an access port, the PVID of the port changes to VLAN 1.
{ For a hybrid or trunk port, the PVID setting on the port does not change.
You can use a nonexistent VLAN as the PVID for a hybrid or trunk port, but not for an access
port.
• As a best practice, set the same PVID for a local port and its peer.
• To prevent a port from dropping packets from its PVID and untagged packets, assign the port to
its PVID.
How ports of different link types handle frames
139
Actions Access Trunk Hybrid
PVID.
• Removes the tag and
sends the frame if the
frame carries the PVID
tag and the port belongs Sends the frame if its VLAN is
In the to the PVID. permitted on the port. The
Removes the VLAN tag
outbound tagging status of the frame
and sends the frame. • Sends the frame without
direction depends on the port hybrid
removing the tag if its vlan command configuration.
VLAN is carried on the
port but is different from
the PVID.
In a VLAN-aware network, the default processing order for untagged packets is as follows, in
descending order of priority:
• MAC-based VLANs.
• IP subnet-based VLANs.
• Protocol-based VLANs.
• Port-based VLANs.
140
Step Command Remarks
interface • The configuration made in
schannel-aggregation S-channel interface view or
interface-number:channel- S-channel aggregate interface
id view applies only to the
interface. For more information
about S-channel interfaces and
S-channel aggregate
interfaces, see EVB
Configuration Guide.
3. Configure the link type of the By default, all ports are access
port as access. port link-type access
ports.
4. (Optional.) Assign the By default, all access ports belong to
access port to a VLAN. port access vlan vlan-id
VLAN 1.
141
Step Command Remarks
port as trunk. ports.
4. Assign the trunk port to the port trunk permit vlan By default, a trunk port permits
specified VLANs. { vlan-id-list | all } only VLAN 1.
5. (Optional.) Configure the
PVID of the trunk port. port trunk pvid vlan vlan-id The default setting is VLAN 1.
142
Step Command Remarks
By default, the PVID of a hybrid
5. (Optional.) Configure the port is the ID of the VLAN to which
PVID of the hybrid port. port hybrid pvid vlan vlan-id
the port belongs when its link type
is access.
143
3. Enable dynamic MAC-based VLAN assignment on the port.
Dynamic MAC-based VLAN assignment uses the following workflow, as shown in Figure 40:
4. When a port receives a frame, it first determines whether the frame is tagged.
{ If the frame is tagged, the port reports the source MAC address of the frame.
{ If the frame is untagged, the port selects a VLAN for the frame by using the following
matching order:
− MAC-based VLAN.
− IP subnet-based VLAN.
− Protocol-based VLAN.
− Port-based VLAN.
After tagging the frame with the selected VLAN, the port reports the source MAC address of
the frame.
5. The port uses the source address and VLAN of the frame to match the MAC-to VLAN entries.
{ If the source MAC address of the frame exactly matches the MAC address in a
MAC-to-VLAN entry, the port checks whether the VLAN ID of the frame matches the VLAN
in the entry.
− If the two VLAN IDs match, the port joins the VLAN and forwards the frame.
− If the two VLAN IDs do not match, the port drops the frame.
{ If the source MAC address of the frame does not match any MAC addresses in
MAC-to-VLAN entries exactly, the port checks whether the VLAN ID of the frame is its PVID.
− If the VLAN ID of the frame is the PVID of the port, the port determines whether it allows
the PVID. If the PVID is allowed, the port forwards the frame within the PVID. If the PVID
is not allowed, the port drops the frame.
− If the VLAN ID of the frame is not the PVID of the port, the port matches the VLAN ID of
the frame by using other criteria, such as IP subnet or protocol, and forwards the frame.
If no VLAN is available, the port drops the frame.
144
Figure 40 Flowchart for processing a frame in dynamic MAC-based VLAN assignment
The port receives a
frame
No
Tagged frame ?
Yes
When you configure dynamic MAC-based VLAN assignment, follow these guidelines:
• When a port joins a VLAN specified in the MAC-to-VLAN entry, one of the following events
occurs depending on the port configuration:
{ If the port has not been configured to allow packets from the VLAN to pass through, the port
joins the VLAN as an untagged member.
{ If the port has been configured to allow packets from the VLAN to pass through, the port
configuration remains the same.
• If you configure both static and dynamic MAC-based VLAN assignments on a port, dynamic
MAC-based VLAN assignment takes effect.
• When a packet matches a MAC-to-VLAN entry, the device determines a forwarding policy for
the packet according to the 802.1p priority of the VLAN in the MAC-to-VLAN entry.
Server-assigned MAC-based VLAN
Use the server-assigned MAC-based VLAN feature with access authentication, such as MAC-based
802.1X authentication, to implement secure and flexible terminal access. In addition to configuring
the server-assigned MAC-based VLAN feature on the device, you must configure the
username-to-VLAN entries on the access authentication server.
When a user passes authentication of the access authentication server, the server issues the VLAN
ID for the user to the device. The device then performs the following operations:
1. Generates a MAC-to-VLAN entry by using the source MAC address of the user packet and the
received VLAN ID. The VLAN is a MAC-based VLAN.
2. Assigns the port that connects the user to the MAC-based VLAN.
When the user goes offline, the device automatically deletes the MAC-to-VLAN entry and removes
the port from the MAC-based VLAN. For more information about 802.1X and MAC authentication,
see Security Configuration Guide.
145
Configuration restrictions and guidelines
When you configure MAC-based VLANs, follow these restrictions and guideline:
• Do not configure a VLAN as both a super VLAN and a MAC-based VLAN.
• As a best practice, do not set the MAC learning limit or disable MAC address learning when you
enable dynamic MAC-based VLAN assignment.
When dynamic MAC-based VLAN assignment is enabled on a port, packets received on the
port are delivered to the CPU. Processing to these packets has the highest priority. The
configuration of MAC learning limit and disabling of MAC address learning cannot take effect.
• Do not use dynamic MAC-based VLAN assignment together with 802.1X or MAC
authentication.
• For successful dynamic MAC-based VLAN assignment, use static VLANs when you create
MAC-to-VLAN entries.
• The MAC-based VLAN feature is mainly configured on downlink ports of user access devices.
Do not enable this function with link aggregation.
• As a best practice, do not use dynamic MAC-based VLAN assignment together with MSTP. In
MSTP mode, if a port is blocked in the MSTI of the target VLAN, the port drops the received
packets instead of delivering them to the CPU. As a result, the receiving port will not be
dynamically assigned to the VLAN.
• As a best practice, do not use dynamic MAC-based VLAN assignment together with PVST. In
PVST mode, if the target VLAN is not permitted on a port, the port is placed in blocked state.
The received packets are dropped instead of being delivered to the CPU. As a result, the
receiving port will not be dynamically assigned to the VLAN.
• As a best practice, do not configure both dynamic MAC-based VLAN assignment and automatic
voice VLAN assignment mode on a port. If you have to configure both of them on a port,
configure dynamic MAC-based VLAN assignment first. If you configure them in a reverse order,
conflict will occur. When you remove one of the configurations, the operation of the other is
affected.
146
Configuring dynamic MAC-based VLAN assignment
Step Command Remarks
1. Enter system view. system-view N/A
The VLAN assignment for a port is
triggered only when the source
Create a MAC-to-VLAN mac-vlan mac-address
2. MAC address of its receiving
entry. mac-address vlan vlan-id [ dot1q
packet exactly matches the MAC
priority ]
address in the MAC-to-VLAN
entry.
3. Enter Layer 2 Ethernet interface interface-type
interface view. N/A
interface-number
4. Configure the link type of By default, all ports are access
the port as hybrid. port link-type hybrid
ports.
5. Enable the MAC-based By default, MAC-based VLAN is
VLAN feature. mac-vlan enable
disabled.
6. Enable dynamic
MAC-based VLAN By default, dynamic MAC-based
mac-vlan trigger enable
assignment. VLAN assignment is disabled.
147
Step Command Remarks
6. Configure 802.1X or MAC For more information, see Security
authentication. N/A
Command Reference.
148
Task Command Remarks
VLAN.
149
Step Command Remarks
interface aggregation member ports. If the
bridge-aggregation system fails to apply the
interface-number configurations to the aggregate
interface, it stops applying the
configurations to aggregation
member ports. If the system fails to
apply the configurations to an
aggregation member port, it skips
the port and moves to the next
member port.
6. Configure the port link
type as hybrid. port link-type hybrid By default, all ports are access ports.
Task Command
display interface vlan-interface [ brief [ description |
down ] ]
Display VLAN interface information.
display interface vlan-interface interface-number [ brief
[ description ] ]
display mac-vlan { all | dynamic | mac-address
Display MAC-to-VLAN entries.
mac-address [ mask mac-mask ] | static | vlan vlan-id }
Display all ports that are enabled with the
display mac-vlan interface
MAC-based VLAN feature.
Display information about IP subnet-based display ip-subnet-vlan interface { interface-type
VLANs that are associated with the specified interface-number1 [ to interface-type interface-number2 ] |
150
Task Command
ports. all }
Display information about IP subnet-based
display ip-subnet-vlan vlan { vlan-id1 [ to vlan-id2 ] | all }
VLANs.
Display information about protocol-based display protocol-vlan interface { interface-type
VLANs that are associated with the specified interface-number1 [ to interface-type interface-number2 ] |
ports. all }
Display information about protocol-based
display protocol-vlan vlan { vlan-id1 [ to vlan-id2 ] | all }
VLANs.
display vlan [ vlan-id1 [ to vlan-id2 ] | all | dynamic |
Display VLAN information.
reserved | static ]
Display brief VLAN information. display vlan brief
Display VLAN group information. display vlan-group [ group-name ]
Display hybrid ports or trunk ports on the
display port { hybrid | trunk }
device.
Configuration procedure
1. Configure Device A:
# Create VLAN 100, and assign Ten-GigabitEthernet 1/0/1 to VLAN 100.
<DeviceA> system-view
[DeviceA] vlan 100
[DeviceA-vlan100] port ten-gigabitethernet 1/0/1
[DeviceA-vlan100] quit
# Create VLAN 200, and assign Ten-GigabitEthernet 1/0/2 to VLAN 200.
151
[DeviceA] vlan 200
[DeviceA-vlan200] port ten-gigabitethernet 1/0/2
[DeviceA-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port to forward packets from VLANs 100 and
200 to Device B.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/3] port trunk permit vlan 100 200
Please wait... Done.
2. Configure Device B in the same way Device A is configured. (Details not shown.)
3. Configure hosts:
{ Configure Host A and Host C to be on the same IP subnet. For example, 192.168.100.0/24.
{ Configure Host B and Host D to be on the same IP subnet. For example, 192.168.200.0/24.
Verifying the configuration
# Verify that Host A and Host C can ping each other, but they both fail to ping Host B. (Details not
shown.)
# Verify that Host B and Host D can ping each other, but they both fail to ping Host A. (Details not
shown.)
# Verify that VLANs 100 and 200 are correctly configured on devices, for example, on Device A.
[DeviceA-Ten-GigabitEthernet1/0/3] display vlan 100
VLAN ID: 100
VLAN type: Static
Route interface: Not configured
Description: VLAN 0100
Name: VLAN 0100
Tagged ports:
Ten-GigabitEthernet1/0/3
Untagged ports:
Ten-GigabitEthernet1/0/1
[DeviceA-Ten-GigabitEthernet1/0/3] display vlan 200
VLAN ID: 200
VLAN type: Static
Route interface: Not configured
Description: VLAN 0200
Name: VLAN 0200
Tagged ports:
Ten-GigabitEthernet1/0/3
Untagged ports:
Ten-GigabitEthernet1/0/2
152
• Different departments own Laptop 1 and Laptop 2. The two departments use VLANs 100 and
200, respectively.
Configure MAC-based VLANs, so that each laptop is able to access only its own department server,
no matter which meeting room they are used in.
Figure 42 Network diagram
Configuration procedure
1. Configure Device A:
# Create VLANs 100 and 200.
<DeviceA> system-view
[DeviceA] vlan 100
[DeviceA-vlan100] quit
[DeviceA] vlan 200
[DeviceA-vlan200] quit
# Associate the MAC addresses of Laptop 1 and Laptop 2 with VLANs 100 and 200,
respectively.
[DeviceA] mac-vlan mac-address 000d-88f8-4e71 vlan 100
[DeviceA] mac-vlan mac-address 0014-222c-aa69 vlan 200
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port to forward packets from VLANs 100 and
200 without VLAN tags.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type hybrid
[DeviceA-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged
# Enable the MAC-based VLAN feature on Ten-GigabitEthernet 1/0/1.
[DeviceA-Ten-GigabitEthernet1/0/1] mac-vlan enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Configure the uplink port Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs
100 and 200.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type trunk
153
[DeviceA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
[DeviceA-Ten-GigabitEthernet1/0/2] quit
2. Configure Device B:
# Create VLAN 100 and assign Ten-GigabitEthernet 1/0/13 to VLAN 100.
<DeviceB> system-view
[DeviceB] vlan 100
[DeviceB-vlan100] port ten-gigabitethernet 1/0/13
[DeviceB-vlan100] quit
# Create VLAN 200 and assign Ten-GigabitEthernet 1/0/14 to VLAN 200.
[DeviceB] vlan 200
[DeviceB-vlan200] port ten-gigabitethernet 1/0/14
[DeviceB-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign the port to VLANs 100 and
200.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/3] port trunk permit vlan 100 200
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Configure Ten-GigabitEthernet 1/0/4 as a trunk port, and assign the port to VLANs 100 and
200.
[DeviceB] interface ten-gigabitethernet 1/0/4
[DeviceB-Ten-GigabitEthernet1/0/4] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/4] port trunk permit vlan 100 200
[DeviceB-Ten-GigabitEthernet1/0/4] quit
3. Configure Device C in the same way as the Device A is configured. (Details not shown.)
Verifying the configuration
# Verify that Laptop 1 can access only Server 1, and Laptop 2 can access only Server 2. (Details not
shown.)
# Verify the MAC-to-VLAN entries on Device A and Device C, for example, Device A.
[DeviceA] display mac-vlan all
The following MAC VLAN addresses exist:
S:Static D:Dynamic
MAC address Mask VLAN ID Dot1q State
000d-88f8-4e71 ffff-ffff-ffff 100 0 S
0014-222c-aa69 ffff-ffff-ffff 200 0 S
154
Figure 43 Network diagram
Configuration procedure
1. Configure Device C:
# Associate IP subnet 192.168.5.0/24 with VLAN 100.
<DeviceC> system-view
[DeviceC] vlan 100
[DeviceC-vlan100] ip-subnet-vlan ip 192.168.5.0 255.255.255.0
[DeviceC-vlan100] quit
# Associate IP subnet 192.168.50.0/24 with VLAN 200.
[DeviceC] vlan 200
[DeviceC-vlan200] ip-subnet-vlan ip 192.168.50.0 255.255.255.0
[DeviceC-vlan200] quit
# Configure Ten-GigabitEthernet 1/0/11 as a hybrid port, and assign it to VLAN 100 as a tagged
VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/11
[DeviceC-Ten-GigabitEthernet1/0/11] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/11] port hybrid vlan 100 tagged
[DeviceC-Ten-GigabitEthernet1/0/11] quit
# Configure Ten-GigabitEthernet1/0/12 as a hybrid port, and assign it to VLAN 200 as a tagged
VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/12
[DeviceC-Ten-GigabitEthernet1/0/12] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/12] port hybrid vlan 200 tagged
[DeviceC-Ten-GigabitEthernet1/0/12] quit
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[DeviceC] interface ten-gigabitethernet 1/0/1
155
[DeviceC-Ten-GigabitEthernet1/0/1] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged
# Associate Ten-GigabitEthernet 1/0/1 with IP subnet-based VLANs 100 and 200.
[DeviceC-Ten-GigabitEthernet1/0/1] port hybrid ip-subnet-vlan vlan 100
[DeviceC-Ten-GigabitEthernet1/0/1] port hybrid ip-subnet-vlan vlan 200
[DeviceC-Ten-GigabitEthernet1/0/1] quit
2. Configure Device A and Device B to forward packets from VLANs 100 and 200, respectively.
(Details not shown.)
Verifying the configuration
# Display information about all IP subnet-based VLANs.
[DeviceC] display ip-subnet-vlan vlan all
VLAN ID: 100
Subnet index IP address Subnet mask
0 192.168.5.0 255.255.255.0
156
Figure 44 Network diagram
VLAN 100 VLAN 200
XGE1/0/11
XGE1/0/12
XGE1/0/1 XGE1/0/2
Device
L2 Switch A L2 Switch B
Configuration procedure
In this example, L2 Switch A and L2 Switch B use the factory configuration.
1. Configure Device:
# Create VLAN 100, and configure the description for VLAN 100 as protocol VLAN for IPv4.
<Device> system-view
[Device] vlan 100
[Device-vlan100] description protocol VLAN for IPv4
# Assign Ten-GigabitEthernet 1/0/11 to VLAN 100.
[Device-vlan100] port ten-gigabitethernet 1/0/11
[Device-vlan100] quit
# Create VLAN 200, and configure the description for VLAN 200 as protocol VLAN for IPv6.
[Device] vlan 200
[Device-vlan200] description protocol VLAN for IPv6
# Assign Ten-GigabitEthernet 1/0/12 to VLAN 200.
[Device-vlan200] port ten-gigabitethernet 1/0/12
# Configure VLAN 200 as a protocol-based VLAN, and create an IPv6 protocol template with
the index 1 for VLAN 200.
[Device-vlan200] protocol-vlan 1 ipv6
[Device-vlan200] quit
# Configure VLAN 100 as a protocol-based VLAN, and create an IPv4 protocol template with
the index 1 for VLAN 100.
[Device] vlan 100
[Device-vlan100] protocol-vlan 1 ipv4
# Create an ARP protocol template with the index 2 for VLAN 100. (In Ethernet II encapsulation,
the protocol type ID for ARP is 0x0806.)
[Device-vlan100] protocol-vlan 2 mode ethernetii etype 0806
[Device-vlan100] quit
157
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[Device] interface ten-gigabitethernet 1/0/1
[Device-Ten-GigabitEthernet1/0/1] port link-type hybrid
[Device-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 200 untagged
# Associate Ten-GigabitEthernet 1/0/1 with the IPv4 and ARP protocol templates of VLAN 100
and the IPv6 protocol template of VLAN 200.
[Device-Ten-GigabitEthernet1/0/1] port hybrid protocol-vlan vlan 100 1 to 2
[Device-Ten-GigabitEthernet1/0/1] port hybrid protocol-vlan vlan 200 1
[Device-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port, and assign it to VLANs 100 and 200 as
an untagged VLAN member.
[Device] interface ten-gigabitethernet 1/0/2
[Device-Ten-GigabitEthernet1/0/2] port link-type hybrid
[Device-Ten-GigabitEthernet1/0/2] port hybrid vlan 100 200 untagged
# Associate Ten-GigabitEthernet 1/0/2 with the IPv4 and ARP protocol templates of VLAN 100
and the IPv6 protocol template of VLAN 200.
[Device-Ten-GigabitEthernet1/0/2] port hybrid protocol-vlan vlan 100 1 to 2
[Device-Ten-GigabitEthernet1/0/2] port hybrid protocol-vlan vlan 200 1
[Device-Ten-GigabitEthernet1/0/2] quit
2. Configure hosts and servers:
a. Configure IPv4 Host A, IPv4 Host B, and IPv4 server to be on the same network segment
(192.168.100.0/24, for example). (Details not shown.)
b. Configure IPv6 Host A, IPv6 Host B, and IPv6 server to be on the same network segment
(2001::1/64, for example). (Details not shown.)
Verifying the configuration
1. Verify the following:
{ The hosts and the server in VLAN 100 can successfully ping one another. (Details not
shown.)
{ The hosts and the server in VLAN 200 can successfully ping one another. (Details not
shown.)
{ The hosts or the server in VLAN 100 cannot ping the hosts or server in VLAN 200. (Details
not shown.)
2. Verify the protocol-based VLAN configuration:
# Display protocol-based VLANs on Device.
[Device] display protocol-vlan vlan all
VLAN ID: 100
Protocol index Protocol type
1 IPv4
2 Ethernet II Etype 0x0806
158
100 1 IPv4 Active
100 2 Ethernet II Etype 0x0806 Active
200 1 IPv6 Active
159
Configuring super VLANs
Hosts in a VLAN typically use IP addresses in the same subnet. For Layer 3 interoperability with
other VLANs, you can create a VLAN interface for the VLAN and assign an IP address to it. This
requires a large number of IP addresses.
The super VLAN feature was introduced to save IP addresses. A super VLAN is associated with
multiple sub-VLANs. These sub-VLANs use the VLAN interface of the super VLAN (also known as a
super VLAN interface) as the gateway for Layer 3 communication.
You can create a VLAN interface for a super VLAN and assign an IP address to it. However, you
cannot create a VLAN interface for a sub-VLAN. You can assign a physical port to a sub-VLAN, but
you cannot assign a physical port to a super VLAN. Sub-VLANs are isolated at Layer 2.
You can enable Layer 3 communication between sub-VLANs by performing the following tasks:
1. Create a super VLAN and the super VLAN interface.
2. Enable local proxy ARP or ND on the super VLAN interface as follows:
{ In an IPv4 network, enable local proxy ARP on the super VLAN interface. The super VLAN
can then process ARP requests and replies sent from the sub-VLANs.
{ In an IPv6 network, enable local proxy ND on the super VLAN interface. The super VLAN
can forward and process the NS and NA messages sent from the sub-VLANs.
Creating a sub-VLAN
Step Command Remarks
1. Enter system view. system-view N/A
160
To configure a super VLAN:
161
Task Command
Display information about super VLANs and all
display supervlan [ supervlan-id ]
sub-VLANs associated with each super VLAN.
VLAN 2
XGE1/0/1 XGE1/0/2 Vlan-int10
XGE1/0/3 10.1.1.1/24
XGE1/0/4
Device A
XGE1/0/5 XGE1/0/6 Device B
VLAN 3
VLAN 5
Configuration procedure
# Create VLAN 10, and configure its VLAN interface IP address as 10.1.1.1/24.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] quit
[DeviceA] interface vlan-interface 10
[DeviceA-Vlan-interface10] ip address 10.1.1.1 255.255.255.0
# Create VLAN 2, and assign Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to the VLAN.
[DeviceA] vlan 2
[DeviceA-vlan2] port ten-gigabitethernet 1/0/1 ten-gigabitethernet 1/0/2
[DeviceA-vlan2] quit
# Create VLAN 3, and assign Ten-GigabitEthernet 1/0/3 and Ten-GigabitEthernet 1/0/4 to the VLAN.
162
[DeviceA] vlan 3
[DeviceA-vlan3] port ten-gigabitethernet 1/0/3 ten-gigabitethernet 1/0/4
[DeviceA-vlan3] quit
# Create VLAN 5, and assign Ten-GigabitEthernet 1/0/5 and Ten-GigabitEthernet 1/0/6 to the VLAN.
[DeviceA] vlan 5
[DeviceA-vlan5] port ten-gigabitethernet 1/0/5 ten-gigabitethernet 1/0/6
[DeviceA-vlan5] quit
# Configure VLAN 10 as a super VLAN, and associate sub-VLANs 2, 3, and 5 with the super VLAN.
[DeviceA] vlan 10
[DeviceA-vlan10] supervlan
[DeviceA-vlan10] subvlan 2 3 5
[DeviceA-vlan10] quit
[DeviceA] quit
VLAN ID: 10
VLAN type: Static
It is a super VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0010
Name: VLAN 0010
Tagged ports: none
Untagged ports: none
VLAN ID: 2
VLAN type: Static
It is a sub VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0002
Name: VLAN 0002
Tagged ports: none
Untagged ports:
Ten-GigabitEthernet1/0/1 Ten-GigabitEthernet1/0/2
VLAN ID: 3
VLAN type: Static
It is a sub VLAN.
Route interface: Configured
163
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0003
Name: VLAN 0003
Tagged ports: none
Untagged ports:
Ten-GigabitEthernet1/0/3 Ten-GigabitEthernet1/0/4
VLAN ID: 5
VLAN type: Static
It is a sub VLAN.
Route interface: Configured
Ipv4 address: 10.1.1.1
Ipv4 subnet mask: 255.255.255.0
Description: VLAN 0005
Name: VLAN 0005
Tagged ports: none
Untagged ports:
Ten-GigabitEthernet1/0/5 Ten-GigabitEthernet1/0/6
164
Configuring the private VLAN
The private VLAN feature uses a two-tier VLAN structure, including a primary VLAN and secondary
VLANs. This feature simplifies the network configuration and saves VLAN resources.
A primary VLAN is used for upstream data exchange. A primary VLAN can be associated with
multiple secondary VLANs. Because the upstream device identifies only the primary VLAN and not
the secondary VLANs, network configuration is simplified and VLAN resources are saved.
Secondary VLANs are isolated at Layer 2. To enable Layer 3 communication between secondary
VLANs associated with the same primary VLAN, you can enable local proxy ARP or ND on the
upstream device (for example, Device A in Figure 46).
As shown in Figure 46, the private VLAN feature is enabled on Device B. VLAN 10 is the primary
VLAN. VLAN 2, VLAN 5, and VLAN 8 are secondary VLANs associated with VLAN 10 and are
invisible to Device A.
Figure 46 Private VLAN example
165
For more information about promiscuous, trunk promiscuous, host, and trunk secondary ports,
see Layer 2—LAN Switching Command Reference.
4. Associate the secondary VLANs with the primary VLAN.
5. (Optional.) Configure Layer 3 communication between the specified secondary VLANs that are
associated with the primary VLAN.
Configuration procedure
To configure the private VLAN feature:
166
Step Command Remarks
8. Enter Layer 2 Ethernet
interface view or Layer 2 interface interface-type
N/A
aggregate interface view. interface-number
167
Step Command Remarks
a. Enter VLAN interface
view of the primary VLAN
interface:
interface vlan-interface
vlan-id
b. Enable Layer 3
communication between
secondary VLANs that
are associated with the
primary VLAN: Use substeps a, b, c, and e for
private-vlan secondary devices that run IPv4 protocols.
vlan-id-list Use substeps a, b, d, and f for
c. Assign an IPv4 address devices that run IPv6 protocols.
to the primary VLAN By default:
19. (Optional.) Configure Layer 3 interface:
communication between the • Secondary VLANs cannot
ip address ip-address
specified secondary VLANs. communicate with each
{ mask-length | mask }
other at Layer 3.
[ sub ]
• No IP address is configured
d. Assign an IPv6 address for a VLAN interface.
to the primary VLAN
interface: • Local proxy ARP and local
ipv6 address proxy ND are disabled.
{ ipv6-address
prefix-length |
ipv6-address/prefix-lengt
h}
e. Enable local proxy ARP:
local-proxy-arp enable
f. Enable local proxy ND:
local-proxy-nd enable
Task Command
Display information about primary VLANs and the
display private-vlan [ primary-vlan-id ]
secondary VLANs associated with each primary VLAN.
168
• On Device C, VLAN 6 is a primary VLAN that is associated with secondary VLANs 3 and 4.
Ten-GigabitEthernet 1/0/5 is in VLAN 6. Ten-GigabitEthernet 1/0/3 is in VLAN 3.
Ten-GigabitEthernet 1/0/4 is in VLAN 4.
• Device A is aware of only VLAN 5 on Device B and VLAN 6 on Device C.
Figure 47 Network diagram
Configuration procedure
This example describes the configurations on Device B and Device C.
1. Configure Device B:
# Configure VLAN 5 as a primary VLAN.
<DeviceB> system-view
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan primary
[DeviceB-vlan5] quit
# Create VLANs 2 and 3.
[DeviceB] vlan 2 to 3
# Configure the uplink port Ten-GigabitEthernet 1/0/5 as a promiscuous port of VLAN 5.
[DeviceB] interface ten-gigabitethernet 1/0/5
[DeviceB-Ten-GigabitEthernet1/0/5] port private-vlan 5 promiscuous
[DeviceB-Ten-GigabitEthernet1/0/5] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/1 to VLAN 3, and configure the port as a
host port.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port access vlan 3
[DeviceB-Ten-GigabitEthernet1/0/1] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/1] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/2 to VLAN 2, and configure the port as a
host port.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port access vlan 2
[DeviceB-Ten-GigabitEthernet1/0/2] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Associate the secondary VLANs 2 and 3 with the primary VLAN 5.
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan secondary 2 to 3
169
[DeviceB-vlan5] quit
2. Configure Device C:
# Configure VLAN 6 as a primary VLAN.
<DeviceC> system-view
[DeviceC] vlan 6
[DeviceC–vlan6] private-vlan primary
[DeviceC–vlan6] quit
# Create VLANs 3 and 4.
[DeviceC] vlan 3 to 4
# Configure the uplink port Ten-GigabitEthernet 1/0/5 as a promiscuous port of VLAN 6.
[DeviceC] interface ten-gigabitethernet 1/0/5
[DeviceC-Ten-GigabitEthernet1/0/5] port private-vlan 6 promiscuous
[DeviceC-Ten-GigabitEthernet1/0/5] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a
host port.
[DeviceC] interface ten-gigabitethernet 1/0/3
[DeviceC-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceC-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceC-Ten-GigabitEthernet1/0/3] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/4 to VLAN 4, and configure the port as a
host port.
[DeviceC] interface ten-gigabitethernet 1/0/4
[DeviceC-Ten-GigabitEthernet1/0/4] port access vlan 4
[DeviceC-Ten-GigabitEthernet1/0/4] port private-vlan host
[DeviceC-Ten-GigabitEthernet1/0/4] quit
# Associate the secondary VLANs 3 and 4 with the primary VLAN 6.
[DeviceC] vlan 6
[DeviceC-vlan6] private-vlan secondary 3 to 4
[DeviceC-vlan6] quit
VLAN ID: 5
VLAN type: Static
Private VLAN type: Primary
Route interface: Not configured
Description: VLAN 0005
Name: VLAN 0005
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1 Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/5
VLAN ID: 2
VLAN type: Static
170
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0002
Name: VLAN 0002
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/5
VLAN ID: 3
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0003
Name: VLAN 0003
Tagged Ports: None
Untagged Ports:
Ten-GigabitEthernet1/0/1 Ten-GigabitEthernet1/0/5
171
Figure 48 Network diagram
XG
/2
/0
E1
E1
/0
XG
/8
Configuration procedure
1. Configure Device B:
# Configure VLANs 5 and 10 as primary VLANs.
<DeviceB> system-view
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan primary
[DeviceB-vlan5] quit
[DeviceB] vlan 10
[DeviceB-vlan10] private-vlan primary
[DeviceB-vlan10] quit
# Create VLANs 2, 3, 6, and 8.
[DeviceB] vlan 2 to 3
[DeviceB] vlan 6
[DeviceB-vlan6] quit
[DeviceB] vlan 8
[DeviceB-vlan8] quit
# Configure the uplink port Ten-GigabitEthernet 1/0/1 as a trunk promiscuous port of VLANs 5
and 10.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port private-vlan 5 10 trunk promiscuous
[DeviceB-Ten-GigabitEthernet1/0/1] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/2 to VLAN 2, and configure the port as a
host port.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port access vlan 2
[DeviceB-Ten-GigabitEthernet1/0/2] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a
host port.
172
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceB-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Associate the secondary VLANs 2 and 3 with the primary VLAN 5.
[DeviceB] vlan 5
[DeviceB-vlan5] private-vlan secondary 2 to 3
[DeviceB-vlan5] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/6 to VLAN 6, and configure the port as a
host port.
[DeviceB] interface ten-gigabitethernet 1/0/6
[DeviceB-Ten-GigabitEthernet1/0/6] port access vlan 6
[DeviceB-Ten-GigabitEthernet1/0/6] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/6] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/8 to VLAN 8, and configure the port as a
host port.
[DeviceB] interface ten-gigabitethernet 1/0/8
[DeviceB-Ten-GigabitEthernet1/0/8] port access vlan 8
[DeviceB-Ten-GigabitEthernet1/0/8] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/8] quit
# Associate the secondary VLANs 6 and 8 with the primary VLAN 10.
[DeviceB] vlan 10
[DeviceB-vlan10] private-vlan secondary 6 8
[DeviceB-vlan10] quit
2. Configure Device A:
# Create VLANs 5 and 10.
[DeviceA] vlan 5
[DeviceA-vlan5] quit
[DeviceA] vlan 10
[DeviceA-vlan10] quit
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port, and assign it to VLANs 5 and 10 as a
tagged VLAN member.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type hybrid
[DeviceA-Ten-GigabitEthernet1/0/1] port hybrid vlan 5 10 tagged
[DeviceA-Ten-GigabitEthernet1/0/1] quit
VLAN ID: 5
VLAN type: Static
Private VLAN type: Primary
Route interface: Not configured
Description: VLAN 0005
173
Name: VLAN 0005
Tagged ports:
Ten-GigabitEthernet1/0/1
Untagged ports:
Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/3
VLAN ID: 2
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0002
Name: VLAN 0002
Tagged ports:
Ten-GigabitEthernet1/0/1
Untagged ports:
Ten-GigabitEthernet1/0/2
VLAN ID: 3
VLAN type: Static
Private VLAN type: Secondary
Route interface: Not configured
Description: VLAN 0003
Name: VLAN 0003
Tagged ports:
Ten-GigabitEthernet1/0/1
Untagged ports:
Ten-GigabitEthernet1/0/3
174
• Secondary VLANs 11 and 12 are associated with primary VLAN 10.
• Secondary VLANs 21 and 22 are associated with primary VLAN 20.
Figure 49 Network diagram
Configuration procedure
1. Configure Device A:
# Configure VLANs 10 and 20 as primary VLANs.
<DeviceA> system-view
[DeviceA] vlan 10
[DeviceA-vlan10] private-vlan primary
[DeviceA-vlan10] quit
[DeviceA] vlan 20
[DeviceA-vlan20] private-vlan primary
[DeviceA-vlan20] quit
# Create VLANs 11, 12, 21, and 22, which are to be configured as secondary VLANs.
[DeviceA] vlan 11 to 12
[DeviceA] vlan 21 to 22
# Associate the secondary VLANs 11 and 12 with the primary VLAN 10.
[DeviceA] vlan 10
[DeviceA-vlan10] private-vlan secondary 11 12
[DeviceA-vlan10] quit
# Associate the secondary VLANs 21 and 22 with the primary VLAN 20.
[DeviceA] vlan 20
[DeviceA-vlan20] private-vlan secondary 21 22
[DeviceA-vlan20] quit
# Configure the uplink port Ten-GigabitEthernet 1/0/5 as a trunk promiscuous port of VLANs 10
and 20.
[DeviceA] interface ten-gigabitethernet 1/0/5
[DeviceA-Ten-GigabitEthernet1/0/5] port private-vlan 10 20 trunk promiscuous
175
[DeviceA-Ten-GigabitEthernet1/0/5] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/1 to VLAN 22 and configure the port as a
host port.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port access vlan 22
[DeviceA-Ten-GigabitEthernet1/0/1] port private-vlan host
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/3 to VLAN 12 and configure the port as a
host port.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port access vlan 12
[DeviceA-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Configure the downlink port Ten-GigabitEthernet 1/0/2 as a trunk secondary port in VLANs 11
and 21.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port private-vlan 11 21 trunk secondary
[DeviceA-Ten-GigabitEthernet1/0/2] quit
2. Configure Device B:
# Create VLANs 11 and 21.
<DeviceB> system-view
[DeviceB] vlan 11
[DeviceB-vlan11] quit
[DeviceB] vlan 21
[DeviceB-vlan21] quit
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port, and assign it to VLANs 11 and 21 as a
tagged VLAN member.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type hybrid
[DeviceB-Ten-GigabitEthernet1/0/2] port hybrid vlan 11 21 tagged
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Assign the port Ten-GigabitEthernet 1/0/4 to VLAN 11.
[DeviceB] interface ten-gigabitethernet 1/0/4
[DeviceB-Ten-GigabitEthernet1/0/4] port access vlan 11
[DeviceB-Ten-GigabitEthernet1/0/4] quit
# Assign the port Ten-GigabitEthernet 1/0/3 to VLAN 21.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port access vlan 21
[DeviceB-Ten-GigabitEthernet1/0/3] quit
3. Configure Device C:
# Create VLANs 10 and 20.
<DeviceC> system-view
[DeviceC] vlan 10
[DeviceC-vlan10] quit
[DeviceC] vlan 20
[DeviceC-vlan20] quit
# Configure Ten-GigabitEthernet1/0/5 as a hybrid port, and assign it to VLANs 10 and 20 as a
tagged VLAN member.
176
[DeviceC] interface ten-gigabitethernet 1/0/5
[DeviceC-Ten-GigabitEthernet1/0/5] port link-type hybrid
[DeviceC-Ten-GigabitEthernet1/0/5] port hybrid vlan 10 20 tagged
[DeviceC-Ten-GigabitEthernet1/0/5] quit
VLAN ID: 10
VLAN type: Static
Private-vlan type: Primary
Route interface: Not configured
Description: VLAN 0010
Name: VLAN 0010
Tagged ports:
Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/5
Untagged ports:
Ten-GigabitEthernet1/0/3
VLAN ID: 11
VLAN type: Static
Private-vlan type: Secondary
Route interface: Not configured
Description: VLAN 0011
Name: VLAN 0011
Tagged ports:
Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/5
Untagged ports: None
VLAN ID: 12
VLAN type: Static
Private-vlan type: Secondary
Route interface: Not configured
Description: VLAN 0012
Name: VLAN 0012
Tagged ports:
Ten-GigabitEthernet1/0/5
Untagged ports:
Ten-GigabitEthernet1/0/3
177
# Display the configuration of primary VLAN 20 on Device A.
[DeviceA] display private-vlan 20
Primary VLAN ID: 20
Secondary VLAN ID: 21-22
VLAN ID: 20
VLAN type: Static
Private-vlan type: Primary
Route interface: Not configured
Description: VLAN 0020
Name: VLAN 0020
Tagged ports:
Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/5
Untagged ports:
Ten-GigabitEthernet1/0/1
VLAN ID: 21
VLAN type: Static
Private-vlan type: Secondary
Route interface: Not configured
Description: VLAN 0021
Name: VLAN 0021
Tagged ports:
Ten-GigabitEthernet1/0/2 Ten-GigabitEthernet1/0/5
Untagged ports: None
VLAN ID: 22
VLAN type: Static
Private-vlan type: Secondary
Route interface: Not configured
Description: VLAN 0022
Name: VLAN 0022
Tagged ports:
Ten-GigabitEthernet1/0/5
Untagged ports:
Ten-GigabitEthernet1/0/1
178
Secondary VLAN Layer 3 communication configuration
example
Network requirements
As shown in Figure 50, configure the private VLAN feature to meet the following requirements:
• Primary VLAN 10 on Device B is associated with secondary VLANs 2 and 3.
• The uplink port Ten-GigabitEthernet 1/0/1 is in VLAN 10.
• The IP address of VLAN-interface 10 is 192.168.1.1/24.
• The ports Ten-GigabitEthernet 1/0/2 and Ten-GigabitEthernet 1/0/3 are in VLAN 2 and VLAN 3,
respectively.
• Secondary VLANs are isolated at Layer 2 but interoperable at Layer 3.
Figure 50 Network diagram
Configuration procedure
# Create VLAN 2 and VLAN 3.
<DeviceB> system-view
[DeviceB] vlan 2 to 3
# Configure VLAN 10 as a primary VLAN, and associate VLAN 2 and VLAN 3 with primary VLAN 10
as secondary VLANs.
[DeviceB] vlan 10
[DeviceB-vlan10] private-vlan primary
[DeviceB-vlan10] private-vlan secondary 2 3
[DeviceB-vlan10] quit
# Configure the uplink port Ten-GigabitEthernet 1/0/1 as a promiscuous port of VLAN 10.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port private-vlan 10 promiscuous
[DeviceB-Ten-GigabitEthernet1/0/1] quit
# Assign the downlink port Ten-GigabitEthernet 1/0/2 to VLAN 2, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port access vlan 2
[DeviceB-Ten-GigabitEthernet1/0/2] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/2] quit
179
# Assign the downlink port Ten-GigabitEthernet 1/0/3 to VLAN 3, and configure the port as a host
port.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port access vlan 3
[DeviceB-Ten-GigabitEthernet1/0/3] port private-vlan host
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Enable Layer 3 communication between secondary VLANs 2 and 3 that are associated with
primary VLAN 10.
[DeviceB] interface vlan-interface 10
[DeviceB-Vlan-interface10] private-vlan secondary 2 3
VLAN ID: 10
VLAN type: Static
Private VLAN type: Primary
Route interface: Configured
IPv4 address: 192.168.1.1
IPv4 subnet mask: 255.255.255.0
Description: VLAN 0010
Name: VLAN 0010
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1
Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/3
VLAN ID: 2
VLAN type: Static
Private VLAN type: Secondary
Route interface: Configured
IPv4 address: 192.168.1.1
IPv4 subnet mask: 255.255.255.0
Description: VLAN 0002
Name: VLAN 0002
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1 Ten-GigabitEthernet1/0/2
VLAN ID: 3
VLAN type: Static
180
Private VLAN type: Secondary
Route interface: Configured
IPv4 address: 192.168.1.1
IPv4 subnet mask: 255.255.255.0
Description: VLAN 0003
Name: VLAN 0003
Tagged ports: None
Untagged ports:
Ten-GigabitEthernet1/0/1 Ten-GigabitEthernet1/0/3
The Route interface field in the output is Configured, indicating that secondary VLANs 2 and 3 are
interoperable at Layer 3.
181
Configuring voice VLANs
Overview
A voice VLAN is used for transmitting voice traffic. When ports that connect to voice devices are
assigned to a voice VLAN, the system can configure QoS parameters for voice packets to ensure
higher transmission priority and sound voice quality.
Common voice devices include IP phones and integrated access devices (IADs). This chapter uses
IP phone as an example.
For an IP phone to access a device, the device must perform the following operations:
• Identify the IP phone in the network and obtain the MAC address of the IP phone.
• Advertise the voice VLAN information to the IP phone.
After receiving the voice VLAN information, the IP phone can perform automatic configuration, so the
voice packets sent from the IP phone can be transmitted within the voice VLAN.
Typically, an OUI address refers to the first 24 bits of a MAC address (in binary notation) and is a
globally unique identifier that IEEE assigns to a vendor. However, OUI addresses in this chapter are
addresses that the system uses to determine whether a received packet is a voice packet. They are
the logical AND results of the mac-address and oui-mask arguments in the voice-vlan
mac-address command.
182
Automatically identifying IP phones through LLDP
When you use OUI addresses to identify IP phones, the number of OUI addresses that can be
configured is limited. Additionally, when there are plenty of IP phones in the network, you must
configure many OUI addresses. If IP phones support LLDP, configure LLDP on the device for
automatic IP phone discovery. For more information, see "Enabling LLDP for automatic IP phone
discovery."
After receiving the voice VLAN information, the IP phone automatically completes the voice VLAN
configuration.
• If the voice VLAN configuration is based on the received LLDP-MED TLVs or CDP packets, the
IP phone will send out packets tagged with the advertised voice VLAN ID. The voice packets
will be forwarded in the voice VLAN.
For more information about configuring LLDP or CDP, see "Configuring LLDP or CDP to
advertise a voice VLAN." For more information about LLDP and CDP compatibility, see
"Configuring LLDP."
• If the voice VLAN configuration is based on the authorization VLAN information, the IP phone
will send out packets tagged with the advertised authorization VLAN ID. The voice packets will
be forwarded in the authorization VLAN.
For more information about advertising the authorization VLAN information to IP phones, see
"Dynamically advertising an authorization VLAN through LLDP or CDP." For more information
about authorization VLANs, see Security Configuration Guide.
• If the voice VLAN configuration is based on the voice VLAN information of the accessing port,
the voice traffic from the IP phone will be forwarded in the voice VLAN of the accessing port.
Whether the voice packets are tagged depends on the voice VLAN configuration of the
accessing port. For more information about configuring a voice VLAN on a port, see
"Configuring a voice VLAN on a port."
183
IP phone access methods
Connecting the host and the IP phone in series
As shown in Figure 52, the host is connected to the IP phone, and the IP phone is connected to the
device. In this scenario, the following requirements must be met:
• The host and the IP phone use different VLANs.
• The IP phone is able to send out VLAN-tagged packets, so that the device can differentiate
traffic from the host and the IP phone.
• The port connecting to the IP phone forwards packets from the voice VLAN and the PVID.
Figure 52 Connecting the host and IP phone in series
184
When an IP phone is powered on, it sends out protocol packets. After receiving these protocol
packets, the device uses the source MAC address of the protocol packets to match its OUI
addresses. If the match succeeds, the system performs the following operations:
• Assigns the receiving port of the protocol packets to the voice VLAN.
• Issues ACL rules to set the packet precedence.
• Starts the voice VLAN aging timer.
The system will remove the port from the voice VLAN if no packet is received from the port before the
aging timer expires. The aging timer is also configurable.
If the device reboots, the port is reassigned to the voice VLAN to ensure the correct operation of the
existing voice connections. The reassignment occurs automatically without being triggered by voice
traffic as long as the voice VLAN operates correctly.
Manual mode
Use manual mode when only IP phones access the network through the device, as shown in Figure
53. In this mode, ports are assigned to a voice VLAN that transmits voice traffic exclusively. No data
traffic affects the voice traffic transmission.
You must manually assign the receiving port on the device to a voice VLAN. The device uses the
source MAC address of the received voice packets to match its OUI addresses. If the match
succeeds, the system issues ACL rules to set the packet precedence.
To remove the port from the voice VLAN, you must manually remove it.
Cooperation of voice VLAN assignment modes and IP phones
Some IP phones send out VLAN-tagged packets, and others send out only untagged packets. For
correct packet processing, ports of different link types must meet specific configuration requirements
in different voice VLAN assignment modes.
Table 12 Configuration requirements for access/trunk/hybrid ports to support tagged voice
traffic
Support for
Port link Voice VLAN
tagged voice Configuration requirements
type assignment mode
traffic
Automatic No N/A
Access
Manual No N/A
The PVID of the port cannot be the
Automatic Yes
voice VLAN.
185
Table 13 Configuration requirements for access/trunk/hybrid ports to support untagged
voice traffic
If an IP phone sends out tagged voice traffic, and its accessing port is configured with 802.1X
authentication, guest VLAN, Auth-Fail VLAN, or critical VLAN, the VLAN ID must be different for the
following VLANs:
• Voice VLAN.
• PVID of the accessing port.
• 802.1X guest, Auth-Fail, or critical VLAN.
If an IP phone sends out untagged voice traffic, the PVID of the accessing port must be the voice
VLAN. As a result, 802.1X authentication is not supported.
TIP:
As a best practice, do not transmit both voice traffic and non-voice traffic in a voice VLAN. If you
must transmit different traffic in a voice VLAN, make sure the voice VLAN security mode is disabled.
186
Table 14 Packet processing on a voice VLAN-enabled port in normal and security mode
Voice VLAN
Packet type Packet processing
mode
Untagged packets or The port does not examine the source MAC addresses of
packets with the voice incoming packets. Both voice traffic and non-voice traffic can
Normal VLAN tags be transmitted in the voice VLAN.
Packets with other VLAN Forwarded or dropped depending on whether the port allows
tags packets from these VLANs to pass through.
• If the source MAC address of a packet matches an OUI
Untagged packets or address on the device, the packet is forwarded in the
packets with the voice voice VLAN.
Security VLAN tags • If the source MAC address of a packet does not match
an OUI address on the device, the packet is dropped.
Packets with other VLAN Forwarded or dropped depending on whether the port allows
tags packets from these VLANs to pass through.
Configuration prerequisites
Before you configure a voice VLAN, complete the following tasks:
• Create a VLAN.
• Determine the QoS priority settings for voice VLAN traffic.
• Determine the voice VLAN assignment mode.
187
Configuring a port to operate in automatic voice VLAN
assignment mode
Configuration restrictions and guidelines
When you configure a port to operate in automatic voice VLAN assignment mode, follow these
restrictions and guidelines:
• Do not configure a VLAN as both a voice VLAN and a protocol-based VLAN. A voice VLAN in
automatic mode on a hybrid port processes only tagged incoming voice traffic. A protocol-based
VLAN on a hybrid port processes only untagged incoming packets. For more information about
protocol-based VLANs, see "Configuring protocol-based VLANs."
• As a best practice, do not use the automatic voice VLAN assignment mode together with MSTP.
In MSTP mode, if a port is blocked in the MSTI of the target voice VLAN, the port drops the
received packets instead of delivering them to the CPU. As a result, the receiving port will not
be dynamically assigned to the voice VLAN.
• As a best practice, do not use the automatic voice VLAN assignment mode together with PVST.
In PVST mode, if the target voice VLAN is not permitted on a port, the port is placed in blocked
state. The received packets are dropped instead of being delivered to the CPU. As a result, the
receiving port will not be dynamically assigned to the voice VLAN.
• As a best practice, do not configure both dynamic MAC-based VLAN assignment and automatic
voice VLAN assignment mode on a port. If you have to configure both of them on a port,
configure dynamic MAC-based VLAN assignment first. If you configure them in a reverse order,
conflict will occur. When you remove one of the configurations, the operation of the other is
affected.
Configuration procedure
To configure a port to operate in automatic voice VLAN assignment mode:
188
Configuring a port to operate in manual voice VLAN
assignment mode
Configuration restrictions and guidelines
When you configure a port to operate in manual voice VLAN assignment mode, follow these
restrictions and guidelines:
• You can configure different voice VLANs on different ports on the same device. Make sure the
following requirements are met:
{ One port can be configured with only one voice VLAN.
{ Voice VLANs must be existing static VLANs.
• Do not enable voice VLAN on the member ports of a link aggregation group. For more
information about link aggregation, see "Configuring Ethernet link aggregation."
• For a port that is enabled with voice VLAN and operating in manual mode, you must manually
assign the port to the voice VLAN to make the voice VLAN take effect.
Configuration procedure
To configure a port to operate in manual voice VLAN assignment mode:
189
Enabling LLDP for automatic IP phone discovery
The device can automatically discover the peer through LLDP, and exchange LLDP TLVs with the
peer. If the LLDP System Capabilities TLV received on a port indicates that the peer can act as a
telephone, the device sends an LLDP TLV with the voice VLAN configuration to the peer.
When the IP phone discovery process is complete, the port will continue the following voice VLAN
configuration:
• Join the voice VLAN.
• Increase the transmission priority of the voice traffic sent from the IP phone.
To ensure that the IP phone can pass authentication, the device will add the MAC address of the IP
phone to the MAC address table.
Configuration prerequisites
Before you enable LLDP for automatic IP phone discovery, complete the following tasks:
• Enable LLDP globally and on ports.
• Complete voice VLAN configurations.
Configuration procedure
To enable LLDP for automatic IP phone discovery:
190
To configure LLDP or CDP to advertise a voice VLAN:
191
Task Command
Display the voice VLAN state. display voice-vlan state
Display the OUI addresses that the system supports. display voice-vlan mac-address
Configuration procedure
1. Configure voice VLANs:
# Create VLANs 2 and 3.
<DeviceA> system-view
[DeviceA] vlan 2 to 3
# Set the voice VLAN aging timer to 30 minutes.
[DeviceA] voice-vlan aging 30
# Configure voice VLANs to operate in security mode to transmit only voice packets.
[DeviceA] voice-vlan security enable
# Add MAC addresses of IP phones A and B to the device with the mask FFFF-FF00-0000.
[DeviceA] voice-vlan mac-address 0011-1100-0001 mask ffff-ff00-0000 description IP
phone A
192
[DeviceA] voice-vlan mac-address 0011-2200-0001 mask ffff-ff00-0000 description IP
phone B
2. Configure Ten-GigabitEthernet 1/0/1:
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type hybrid
# Configure Ten-GigabitEthernet 1/0/1 to operate in automatic voice VLAN assignment mode.
[DeviceA-Ten-GigabitEthernet1/0/1] voice-vlan mode auto
# Enable voice VLAN on Ten-GigabitEthernet 1/0/1 and configure VLAN 2 as the voice VLAN
for it.
[DeviceA-Ten-GigabitEthernet1/0/1] voice-vlan 2 enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
3. Configure Ten-GigabitEthernet 1/0/2:
# Configure Ten-GigabitEthernet 1/0/2 as a hybrid port.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type hybrid
# Configure Ten-GigabitEthernet 1/0/2 to operate in automatic voice VLAN assignment mode.
[DeviceA-Ten-GigabitEthernet1/0/2] voice-vlan mode auto
# Enable voice VLAN on Ten-GigabitEthernet 1/0/2 and configure VLAN 3 as the voice VLAN
for it.
[DeviceA-Ten-GigabitEthernet1/0/2] voice-vlan 3 enable
[DeviceA-Ten-GigabitEthernet1/0/2] quit
193
Manual voice VLAN assignment mode configuration example
Network requirements
As shown in Figure 55:
• Device A transmits only voice traffic.
• IP phone A send untagged voice traffic.
For correct voice traffic transmission, perform the following tasks on Device A:
• Configure a voice VLAN to transmit voice traffic.
• Configure Ten-GigabitEthernet 1/0/1 to operate in manual voice VLAN assignment mode.
• Add the MAC address of IP phone A to the device for voice packet identification. The mask is
FFFF-FF00-0000.
Figure 55 Network diagram
Configuration procedure
# Configure the voice VLAN to operate in security mode.
<DeviceA> system-view
[DeviceA] voice-vlan security enable
# Create VLAN 2.
[DeviceA] vlan 2
[DeviceA-vlan2] quit
# Configure Ten-GigabitEthernet 1/0/1 to forward the voice traffic from VLAN 2 without VLAN tags.
[DeviceA-Ten-GigabitEthernet1/0/1] port hybrid vlan 2 untagged
# Enable voice VLAN and configure VLAN 2 as the voice VLAN on Ten-GigabitEthernet 1/0/1.
[DeviceA-Ten-GigabitEthernet1/0/1] voice-vlan 2 enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
194
Verifying the configuration
# Display the OUI addresses and their masks and descriptions.
[DeviceA] display voice-vlan mac-address
OUI Address Mask Description
0001-e300-0000 ffff-ff00-0000 Siemens phone
0003-6b00-0000 ffff-ff00-0000 Cisco phone
0004-0d00-0000 ffff-ff00-0000 Avaya phone
000f-e200-0000 ffff-ff00-0000 H3C Aolynk phone
0060-b900-0000 ffff-ff00-0000 Philips/NEC phone
00d0-1e00-0000 ffff-ff00-0000 Pingtel phone
00e0-7500-0000 ffff-ff00-0000 Polycom phone
00e0-bb00-0000 ffff-ff00-0000 3Com phone
195
Configuring MVRP
Multiple Registration Protocol (MRP) is an attribute registration protocol used to transmit attribute
values.
Multiple VLAN Registration Protocol (MVRP) is a typical MRP application. It synchronizes VLAN
information among devices.
MVRP propagates local VLAN information to other devices, receives VLAN information from other
devices, and dynamically updates local VLAN information. When the network topology changes,
MVRP propagates and learns VLAN information again according to the new topology.
MRP
MRP allows devices in the same LAN to transmit attribute values on a per MSTI basis. For more
information about MSTIs, see "Configuring spanning tree protocols."
MRP implementation
An MRP-enabled port is called an MRP participant. An MVRP-enabled port is called an MVRP
participant.
As shown in Figure 56, an MRP participant sends declarations and withdrawals to notify other
participants to register and deregister its attribute values. It also registers and deregisters the
attribute values of other participants according to the received declarations and withdrawals. MRP
rapidly propagates the configuration information of an MRP participant throughout the LAN.
Figure 56 MRP implementation
MRP messages
MRP messages include the following types:
• Declaration—Includes Join and New messages.
• Withdrawal—Includes Leave and LeaveAll messages.
196
Join message
An MRP participant sends a Join message to request the peer participant to register attributes in the
Join message.
When receiving a Join message from the peer participant, an MRP participant performs the following
tasks:
• Registers the attributes in the Join message.
• Propagates the Join message to all other participants on the device.
After receiving the Join message, other participants send the Join message to their respective peer
participants.
Join messages sent from a local participant to its peer participant include the following types:
• JoinEmpty—Declares an unregistered attribute. For example, when an MRP participant joins
an unregistered static VLAN, it sends a JoinEmpty message.
VLANs created manually and locally are called static VLANs. VLANs learned through MRP are
called dynamic VLANs.
• JoinIn—Declares a registered attribute. A JoinIn message is used in one of the following
situations:
{ An MRP participant joins an existing static VLAN and sends a JoinIn message after
registering the VLAN.
{ The MRP participant receives a Join message propagated by another participant on the
device and sends a JoinIn message after registering the VLAN.
New message
Similar to a Join message, a New message enables MRP participants to register attributes.
When the MSTP topology changes, an MRP participant sends a New message to the peer
participant to declare the topology change.
Upon receiving a New message from the peer participant, an MRP participant performs the following
tasks:
• Registers the attributes in the message.
• Propagates the New message to all other participants on the device.
After receiving the New message, other participants send the New message to their respective peer
participants.
Leave message
An MRP participant sends a Leave message to the peer participant when it wants the peer
participant to deregister attributes that it has deregistered.
When the peer participant receives the Leave message, it performs the following tasks:
• Deregisters the attribute in the Leave message.
• Propagates the Leave message to all other participants on the device.
After a participant on the device receives the Leave message, it determines whether to send the
Leave message to its peer participant depending on the attribute status on the device.
• If the VLAN in the Leave message is a dynamic VLAN not registered by any participants on the
device, both of the following events occur:
{ The VLAN is deleted on the device.
{ The participant sends the Leave message to its peer participant.
• If the VLAN in the a Leave message is a static VLAN, the participant will not send the Leave
message to its peer participant.
197
LeaveAll message
Each MRP participant starts its LeaveAll timer when starting up. When the timer expires, the MRP
participant sends LeaveAll messages to the peer participant.
Upon sending or receiving a LeaveAll message, the local participant starts the Leave timer. The local
participant determines whether to send a Join message depending on its the attribute status. A
participant can re-register the attributes in the received Join message before the Leave timer
expires.
When the Leave timer expires, a participant deregisters all attributes that have not been
re-registered to periodically clear useless attributes in the network.
MRP timers
MRP uses the following timers to control message transmission.
Periodic timer
The Periodic timer controls the transmission of MRP messages. An MRP participant starts its own
Periodic timer upon startup, and stores MRP messages to be sent before the Periodic timer expires.
When the Periodic timer expires, MRP sends stored MRP messages in as few MRP frames as
possible and restarts the Periodic timer. This mechanism reduces the number of MRP frames
periodically sent.
You can enable or disable the Periodic timer. When the Periodic timer is disabled, MRP does not
periodically send MRP messages. Instead, an MRP participant sends MRP messages when the
LeaveAll timer expires or the participant receives a LeaveAll message from the peer participant.
Join timer
The Join timer controls the transmission of Join messages. An MRP participant starts the Join timer
after sending a Join message to the peer participant. Before the Join timer expires, the participant
does not resend the Join message when the following conditions exist:
• The participant receives a JoinIn message from the peer participant.
• The received JoinIn message has the same attributes as the sent Join message.
When both the Join timer and the Periodic timer expire, the participant resends the Join message.
Leave timer
The Leave timer controls the deregistration of attributes.
An MRP participant starts the Leave timer in one of the following conditions:
• The participant receives a Leave message from its peer participant.
• The participant receives or sends a LeaveAll message.
The MRP participant does not deregister the attributes in the Leave or LeaveAll message if the
following conditions exist:
• The participant receives a Join message before the Leave timer expires.
• The Join message includes the attributes that have been encapsulated in the Leave or LeaveAll
message.
If the participant does not receive a Join message for these attributes before the Leave timer expires,
MRP deregisters the attributes.
LeaveAll timer
After startup, an MRP participant starts its own LeaveAll timer. When the LeaveAll timer expires, the
MRP participant sends out a LeaveAll message and restarts the LeaveAll timer.
198
Upon receiving the LeaveAll message, other participants restart their LeaveAll timer. The value of
the LeaveAll timer is randomly selected between the LeaveAll timer and 1.5 times the LeaveAll timer.
This mechanism provides the following benefits:
• Effectively reduces the number of LeaveAll messages in the network.
• Prevents the LeaveAll timer of a particular participant from always expiring first.
199
For more information about RRPP and Smart Link, see High Availability Configuration Guide.
• Do not configure both MVRP and remote port mirroring on a port. Otherwise, MVRP might
register the remote probe VLAN with incorrect ports, which would cause the monitor port to
receive undesired copies. For more information about port mirroring, see Network Management
and Monitoring Configuration Guide.
• MVRP takes effect only on trunk ports. For more information about trunk ports, see "Configuring
VLANs."
• Enabling MVRP on a Layer 2 aggregate interface takes effect on the aggregate interface and all
Selected member ports in the link aggregation group.
• MVRP configuration made on an aggregation group member port takes effect only after the port
is removed from the aggregation group.
Configuration prerequisites
Before configuring MVRP, make sure each MSTI is mapped to an existing VLAN on each device in
the network.
Enabling MVRP
Step Command Remarks
1. Enter system view. system-view N/A
By default, MVRP is globally
disabled.
2. Enable MVRP globally. mvrp global enable To make MVRP take effect on a
port, enable MVRP both on the
port and globally.
200
Configuring an MVRP registration mode
Step Command Remarks
1. Enter system view. system-view N/A
Optional.
3. Configure an MVRP mvrp registration { fixed |
registration mode. forbidden | normal } The default setting is normal
registration mode.
Optional.
3. Configure the LeaveAll timer. mrp timer leaveall timer-value The default setting is 1000
centiseconds.
Optional.
4. Configure the Join timer. mrp timer join timer-value The default setting is 20
centiseconds.
Optional.
5. Configure the Leave timer. mrp timer leave timer-value The default setting is 60
centiseconds.
Optional.
The default setting is 100
6. Configure the Periodic timer. mrp timer periodic timer-value centiseconds.
You can restore the Periodic timer
to the default at any time.
Table 15 shows the value ranges for Join, Leave, and LeaveAll timers and their dependencies.
• If you set a timer to a value beyond the allowed value range, your configuration fails. You can
set a timer by tuning the value of any other timer. The value of each timer must be an integer
multiple of 20 centiseconds and in the range defined in Table 15.
201
• As a best practice, restore the timers in the order of Join, Leave, and LeaveAll.
Table 15 Dependencies of the Join, Leave, and LeaveAll timers
Task Command
Display MVRP running status. display mvrp running-status [ interface interface-list ]
Display the MVRP state of a port in a display mvrp state interface interface-type interface-number
VLAN. vlan vlan-id
Display MVRP statistics. display mvrp statistics [ interface interface-list ]
Clear MVRP statistics. reset mvrp statistics [ interface interface-list ]
202
Configure MVRP on Device A, Device B, Device C, and Device D to meet the following
requirements:
• The devices can register and deregister dynamic VLANs.
• The devices can keep identical VLAN configuration for each MSTI.
Figure 57 Network diagram
Device A Device B
Permit: all VLANs
XGE1/0/3 XGE1/0/3
XG 2
XG
E1 /0/ VLAN 20
/0/
VLAN 10 /0/ E1
E1
E1
2 XG
/0/
XG
1
Permit: all VLANs Permit: VLANs 20, 40
s Pe
AN rm
VL it:
XG
all VL
1
/0/
it: AN
E1
rm XG
E1
2 40
/0/ Pe
/0/
E1
XG
E1 /0/
1
XG 2
VLAN 10 MSTI 1
VLAN 20 MSTI 2
Other VLANs MSTI 0
Device C Device D
A B A B A B
C D C C D
MSTI 0 MSTI 1 MSTI 2
Configuration procedure
1. Configure Device A:
# Enter MST region view.
<DeviceA> system-view
[DeviceA] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceA-mst-region] region-name example
[DeviceA-mst-region] instance 1 vlan 10
[DeviceA-mst-region] instance 2 vlan 20
[DeviceA-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceA-mst-region] active region-configuration
[DeviceA-mst-region] quit
# Configure Device A as the primary root bridge of MSTI 1.
203
[DeviceA] stp instance 1 root primary
# Globally enable the spanning tree feature.
[DeviceA] stp global enable
# Globally enable MVRP.
[DeviceA] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit all VLANs.
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/1] port trunk permit vlan all
# Enable MVRP on port Ten-GigabitEthernet 1/0/1.
[DeviceA-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceA-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit VLAN 40.
[DeviceA] interface ten-gigabitethernet 1/0/2
[DeviceA-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 40
# Enable MVRP on port Ten-GigabitEthernet 1/0/2.
[DeviceA-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceA-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and configure it to permit all VLANs.
[DeviceA] interface ten-gigabitethernet 1/0/3
[DeviceA-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceA-Ten-GigabitEthernet1/0/3] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/3.
[DeviceA-Ten-GigabitEthernet1/0/3] mvrp enable
[DeviceA-Ten-GigabitEthernet1/0/3] quit
# Create VLAN 10.
[DeviceA] vlan 10
[DeviceA-vlan10] quit
2. Configure Device B:
# Enter MST region view.
<DeviceB> system-view
[DeviceB] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceB-mst-region] region-name example
[DeviceB-mst-region] instance 1 vlan 10
[DeviceB-mst-region] instance 2 vlan 20
[DeviceB-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceB-mst-region] active region-configuration
[DeviceB-mst-region] quit
# Configure Device B as the primary root bridge of MSTI 2.
[DeviceB] stp instance 2 root primary
# Globally enable the spanning tree feature.
[DeviceB] stp global enable
# Globally enable MVRP.
[DeviceB] mvrp global enable
204
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit VLANs 20 and
40.
[DeviceB] interface ten-gigabitethernet 1/0/1
[DeviceB-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/1] port trunk permit vlan 20 40
# Enable MVRP on Ten-GigabitEthernet 1/0/1.
[DeviceB-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceB-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit all VLANs.
[DeviceB] interface ten-gigabitethernet 1/0/2
[DeviceB-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/2] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceB-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceB-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and configure it to permit all VLANs.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] port link-type trunk
[DeviceB-Ten-GigabitEthernet1/0/3] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/3.
[DeviceB-Ten-GigabitEthernet1/0/3] mvrp enable
[DeviceB-Ten-GigabitEthernet1/0/3] quit
# Create VLAN 20.
[DeviceB] vlan 20
[DeviceB-vlan20] quit
3. Configure Device C:
# Enter MST region view.
<DeviceC> system-view
[DeviceC] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceC-mst-region] region-name example
[DeviceC-mst-region] instance 1 vlan 10
[DeviceC-mst-region] instance 2 vlan 20
[DeviceC-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceC-mst-region] active region-configuration
[DeviceC-mst-region] quit
# Configure Device C as the root bridge of MSTI 0.
[DeviceC] stp instance 0 root primary
# Globally enable the spanning tree feature.
[DeviceC] stp global enable
# Globally enable MVRP.
[DeviceC] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit all VLANs.
[DeviceC] interface ten-gigabitethernet 1/0/1
[DeviceC-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/1] port trunk permit vlan all
205
# Enable MVRP on Ten-GigabitEthernet 1/0/1.
[DeviceC-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceC-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit all VLANs.
[DeviceC] interface ten-gigabitethernet 1/0/2
[DeviceC-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceC-Ten-GigabitEthernet1/0/2] port trunk permit vlan all
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceC-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceC-Ten-GigabitEthernet1/0/2] quit
4. Configure Device D:
# Enter MST region view.
<DeviceD> system-view
[DeviceD] stp region-configuration
# Configure the MST region name, VLAN-to-instance mappings, and revision level.
[DeviceD-mst-region] region-name example
[DeviceD-mst-region] instance 1 vlan 10
[DeviceD-mst-region] instance 2 vlan 20
[DeviceD-mst-region] revision-level 0
# Manually activate the MST region configuration.
[DeviceD-mst-region] active region-configuration
[DeviceD-mst-region] quit
# Globally enable the spanning tree feature.
[DeviceD] stp global enable
# Globally enable MVRP.
[DeviceD] mvrp global enable
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and configure it to permit VLANs 20 and
40.
[DeviceD] interface ten-gigabitethernet 1/0/1
[DeviceD-Ten-GigabitEthernet1/0/1] port link-type trunk
[DeviceD-Ten-GigabitEthernet1/0/1] port trunk permit vlan 20 40
# Enable MVRP on Ten-GigabitEthernet 1/0/1.
[DeviceD-Ten-GigabitEthernet1/0/1] mvrp enable
[DeviceD-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and configure it to permit VLAN 40.
[DeviceD] interface ten-gigabitethernet 1/0/2
[DeviceD-Ten-GigabitEthernet1/0/2] port link-type trunk
[DeviceD-Ten-GigabitEthernet1/0/2] port trunk permit vlan 40
# Enable MVRP on Ten-GigabitEthernet 1/0/2.
[DeviceD-Ten-GigabitEthernet1/0/2] mvrp enable
[DeviceD-Ten-GigabitEthernet1/0/2] quit
206
-------[MVRP Global Info]-------
Global Status : Enabled
Compliance-GVRP : False
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default)
Declared VLANs :
1(default), 10, 20
Propagated VLANs :
1(default)
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
None
Declared VLANs :
1(default)
Propagated VLANs :
None
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
20
Declared VLANs :
1(default), 10
Propagated VLANs :
20
207
The output shows that the following events have occurred:
• Ten-GigabitEthernet 1/0/1 has registered VLAN 1, declared VLAN 1, VLAN 10, and VLAN 20,
and propagated VLAN 1 through MVRP.
• Ten-GigabitEthernet 1/0/2 has declared VLAN 1, and registered and propagated no VLANs.
• Ten-GigabitEthernet 1/0/3 has registered VLAN 20, declared VLAN 1 and VLAN 10, and
propagated VLAN 20 through MVRP.
# Display the local VLAN information on Device B.
[DeviceB] display mvrp running-status
-------[MVRP Global Info]-------
Global Status : Enabled
Compliance-GVRP : False
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default)
Declared VLANs :
1(default), 20
Propagated VLANs :
1(default)
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 10
Declared VLANs :
1(default), 20
Propagated VLANs :
1(default)
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
208
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 10
Declared VLANs :
20
Propagated VLANs :
10
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 10, 20
Declared VLANs :
1(default)
Propagated VLANs :
1(default), 10
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 20
Declared VLANs :
1(default), 10
209
Propagated VLANs :
1(default), 20
----[Ten-GigabitEthernet1/0/1]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default), 20
Declared VLANs :
1(default)
Propagated VLANs :
1(default), 20
----[Ten-GigabitEthernet1/0/2]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Normal
Registered VLANs :
1(default)
Declared VLANs :
None
Propagated VLANs :
None
210
Verifying the configuration after changing the registration mode
When the network is stable, set the MVRP registration mode to fixed on the port of Device B
connected to Device A. Then, verify that dynamic VLANs on the port will not be deregistered.
# Set the MVRP registration mode to fixed on Ten-GigabitEthernet 1/0/3 of Device B.
[DeviceB] interface ten-gigabitethernet 1/0/3
[DeviceB-Ten-GigabitEthernet1/0/3] mvrp registration fixed
[DeviceB-Ten-GigabitEthernet1/0/3] quit
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Fixed
Registered VLANs :
1(default), 10
Declared VLANs :
20
Propagated VLANs :
10
The output shows that VLAN information on Ten-GigabitEthernet 1/0/3 is not changed after you set
its MVRP registration mode to fixed.
# Delete VLAN 10 on Device A.
[DeviceA] undo vlan 10
----[Ten-GigabitEthernet1/0/3]----
Config Status : Enabled
Running Status : Enabled
Join Timer : 20 (centiseconds)
Leave Timer : 60 (centiseconds)
Periodic Timer : 100 (centiseconds)
LeaveAll Timer : 1000 (centiseconds)
Registration Type : Fixed
Registered VLANs :
1(default), 10
211
Declared VLANs :
20
Propagated VLANs :
10
The output shows that the dynamic VLAN information on Ten-GigabitEthernet 1/0/3 is not changed
after you set its MVRP registration mode to fixed.
212
Configuring QinQ
This document uses the following terms:
• CVLAN—Customer network VLANs, also called inner VLANs, refer to VLANs that a customer
uses on the private network.
• SVLAN—Service provider network VLANs, also called outer VLANs, refer to VLANs that a
service provider uses to transmit VLAN tagged traffic for customers.
Overview
802.1Q-in-802.1Q (QinQ) adds an 802.1Q tag to 802.1Q tagged customer traffic. It enables a
service provider to extend Layer 2 connections across an Ethernet network between customer sites.
QinQ provides the following benefits:
• Enables a service provider to use a single SVLAN to convey multiple CVLANs for a customer.
• Enables customers to plan CVLANs without conflicting with SVLANs.
• Enables customers to keep their VLAN assignment schemes unchanged when the service
provider changes its VLAN assignment scheme.
• Allows customers to use overlapping CVLAN IDs. Devices in the service provider network make
forwarding decisions based on SVLAN IDs instead of CVLAN IDs.
As shown in Figure 59, customer A has remote sites CE 1 and CE 4. Customer B has remote sites
CE 2 and CE 3. The CVLANs of the two customers overlap. The service provider assigns SVLANs 3
and 4 to customers A and B, respectively.
213
When a tagged frame from CE 1 arrives, PE 1 tags the frame with SVLAN 3. The double-tagged
frame travels over the service provider network until it arrives at PE 2. PE 2 removes the SVLAN tag
of the frame, and then sends the frame to CE 4.
Figure 59 Typical QinQ application scenario
VLANs 1 to 20 VLANs 1 to 10
CE 3 CE 4
Customer Customer
network B network A
CVLAN B Data CVLAN A Data
PE 1 Network PE 2
VLANs 1 to 10 VLANs 1 to 20
QinQ implementations
QinQ is enabled on a per-port basis. The link type of a QinQ-enabled port can be access, hybrid, or
trunk. The QinQ tagging behaviors are the same across these types of ports.
A QinQ-enabled port tags all incoming frames (tagged or untagged) with the PVID tag.
• If an incoming frame already has one tag, it becomes a double-tagged frame.
• If the frame does not have any 802.1Q tags, it becomes a frame tagged with the PVID.
QinQ provides the most basic VLAN manipulation method to tag all incoming frames (tagged or
untagged) with the PVID tag. To perform advanced VLAN manipulations, use VLAN mapping (see
"Configuring VLAN mapping") or QoS policies. For example:
• To use different SVLANs for different CVLAN tags, use one-to-two VLAN mapping.
• To replace the SVLAN ID, CVLAN ID, or both IDs for an incoming double-tagged frame, use
two-to-two VLAN mapping.
• To set the 802.1p priority in SVLAN tags, configure a QoS policy as described in "Setting the
802.1p priority in SVLAN tags."
214
Restrictions and guidelines
When you configure QinQ, follow these restrictions and guidelines:
• EVB and QinQ are mutually exclusive. Do not enable both features on a port.
• Before you can configure QinQ on a port, you must remove any VLAN mappings on the port.
After you enable QinQ on the port, you can configure any VLAN mapping types except
two-to-two VLAN mapping. If QinQ and a VLAN mapping conflict, the VLAN mapping takes
effect.
• The inner 802.1Q tag of QinQ frames is treated as part of the payload. As a best practice to
ensure correct transmission of QinQ frames, set the MTU to a minimum of 1504 bytes for each
port on the forwarding path. This value is the sum of the default Ethernet interface MTU (1500
bytes) and the length (4 bytes) of a VLAN tag.
Enabling QinQ
Enable QinQ on customer-side ports of PEs. A QinQ-enabled port tags an incoming frame with its
PVID.
To enable QinQ:
215
Step Command Remarks
pass through. • For trunk ports: allow only packets from
port trunk permit vlan VLAN 1 to pass through
{ vlan-id-list | all } untagged.
5. Enable QinQ on the port. qinq enable By default, QinQ is disabled.
By default, transparent
6. Specify transparent VLANs. transmission is not
qinq transparent-vlan vlan-list
configured for any VLANs on
a port.
216
Protocol type Value
Cluster 0x88A7
Reserved 0xFFFD/0xFFFE/0xFFFF
3. Configure the SVLAN TPID. qinq ethernet-type service-tag The default setting is 0x8100 for
hex-value SVLAN tags.
217
Step Command Remarks
1. Enter system view. system-view N/A
2. Create a traffic class and traffic classifier classifier-name [ operator By default, no traffic
enter traffic class view. { and | or } ] class is configured.
• Match CVLAN IDs:
if-match customer-vlan-id vlan-id-list
3. Configure CVLAN match
criteria. • Match 802.1p priority: N/A
if-match customer-dot1p
dot1p-value&<1-8>
4. Return to system view. quit N/A
5. Create a traffic behavior
and enter traffic behavior traffic behavior behavior-name N/A
view.
For more information about QoS policies, see ACL and QoS Configuration Guide.
218
Displaying and maintaining QinQ
Execute display commands in any view.
Task Command
display qinq [ interface interface-type
Display QinQ-enabled ports.
interface-number ]
Site 3 CE 3 CE 4 Site 2
Company B Company A
XGE1/0/3 XGE1/0/3
XGE1/0/2 VLANs 100 and 200 XGE1/0/2
PE 1 PE 2
TPID = 0x8200
XGE1/0/1 XGE1/0/1
Company A Company B
Site 1 CE 1 CE 2 Site 4
VLANs 10 to 70 VLANs 30 to 90
Configuration procedure
1. Configure PE 1:
219
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLAN 100 and VLANs 10
through 70.
<PE1> system-view
[PE1] interface ten-gigabitethernet 1/0/1
[PE1-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 10 to 70
# Configure VLAN 100 as the PVID for Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] qinq enable
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 200.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
# Set the TPID value in the SVLAN tags to 0x8200 on Ten-GigabitEthernet 1/0/2.
[PE1-Ten-GigabitEthernet1/0/2] qinq ethernet-type service-tag 8200
[PE1-Ten-GigabitEthernet1/0/2] quit
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign it to VLAN 200 and VLANs 30
through 90.
[PE1] interface ten-gigabitethernet 1/0/3
[PE1-Ten-GigabitEthernet1/0/3] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/3] port trunk permit vlan 200 30 to 90
# Configure VLAN 200 as the PVID for Ten-GigabitEthernet 1/0/3.
[PE1-Ten-GigabitEthernet1/0/3] port trunk pvid vlan 200
# Enable QinQ on Ten-GigabitEthernet 1/0/3.
[PE1-Ten-GigabitEthernet1/0/3] qinq enable
[PE1-Ten-GigabitEthernet1/0/3] quit
2. Configure PE 2:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLAN 200 and VLANs 30
through 90.
<PE2> system-view
[PE2] interface ten-gigabitethernet 1/0/1
[PE2-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/1] port trunk permit vlan 200 30 to 90
# Configure VLAN 200 as the PVID for Ten-GigabitEthernet 1/0/1.
[PE2-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 200
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE2-Ten-GigabitEthernet1/0/1] qinq enable
[PE2-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 200.
[PE2] interface ten-gigabitethernet 1/0/2
[PE2-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 200
# Set the TPID value in the SVLAN tags to 0x8200 on Ten-GigabitEthernet 1/0/2.
[PE2-Ten-GigabitEthernet1/0/2] qinq ethernet-type service-tag 8200
[PE2-Ten-GigabitEthernet1/0/2] quit
220
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign it to VLAN 100 and VLANs 10
through 70.
[PE2] interface ten-gigabitethernet 1/0/3
[PE2-Ten-GigabitEthernet1/0/3] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/3] port trunk permit vlan 100 10 to 70
# Configure VLAN 100 as the PVID for Ten-GigabitEthernet 1/0/3.
[PE2-Ten-GigabitEthernet1/0/3] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/3.
[PE2-Ten-GigabitEthernet1/0/3] qinq enable
[PE2-Ten-GigabitEthernet1/0/3] quit
3. Configure the devices between PE 1 and PE 2:
# Set the MTU to a minimum of 1504 bytes for each port on the path of QinQ frames. (Details
not shown.)
# Configure all the ports on the forwarding path to allow frames from VLANs 100 and 200 to
pass through without removing the VLAN tag. (Details not shown.)
PE 1 PE 2
XGE1/0/2 XGE1/0/2
VLANs 100 and 3000
XGE1/0/1 XGE1/0/1
Site 1 Site 2
CE 1 CE 2
Configuration procedure
1. Configure PE 1:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLANs 10 through 50,
100, and 3000.
<PE1> system-view
[PE1] interface ten-gigabitethernet 1/0/1
221
[PE1-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 3000 10 to 50
# Configure VLAN 100 as the PVID of Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] qinq enable
# Configure Ten-GigabitEthernet 1/0/1 to transparently transmit frames from VLAN 3000.
[PE1-Ten-GigabitEthernet1/0/1] qinq transparent-vlan 3000
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 3000.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 3000
[PE1-Ten-GigabitEthernet1/0/2] quit
2. Configure PE 2:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign it to VLANs 10 through 50,
100, and 3000.
<PE2> system-view
[PE2] interface ten-gigabitethernet 1/0/1
[PE2-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 3000 10 to 50
# Configure VLAN 100 as the PVID of Ten-GigabitEthernet 1/0/1.
[PE1-Ten-GigabitEthernet1/0/1] port trunk pvid vlan 100
# Enable QinQ on Ten-GigabitEthernet 1/0/1.
[PE2-Ten-GigabitEthernet1/0/1] qinq enable
# Configure Ten-GigabitEthernet 1/0/1 to transparently transmit frames from VLAN 3000.
[PE2-Ten-GigabitEthernet1/0/1] qinq transparent-vlan 3000
[PE2-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to VLANs 100 and 3000.
[PE2] interface ten-gigabitethernet 1/0/2
[PE2-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100 3000
3. Configure the devices between PE 1 and PE 2:
# Set the MTU to a minimum of 1504 bytes for each port on the path of QinQ frames. (Details
not shown.)
# Configure all the ports on the forwarding path to allow frames from VLANs 100 and 3000 to
pass through without removing the VLAN tag. (Details not shown.)
222
Configuring VLAN mapping
Overview
VLAN mapping re-marks VLAN tagged traffic with new VLAN IDs. H3C provides the following types
of VLAN mapping:
• One-to-one VLAN mapping—Replaces one VLAN tag with another.
• Many-to-one VLAN mapping—Replaces multiple VLAN tags with the same VLAN tag.
• One-to-two VLAN mapping—Tags single-tagged packets with an outer VLAN tag.
• Two-to-two VLAN mapping—Replaces the SVLAN ID, CVLAN ID, or both IDs for an incoming
double-tagged frame.
223
Figure 62 Application scenario of one-to-one and many-to-one VLAN mapping
...
...
...
...
...
...
...
224
Application scenario of one-to-two and two-to-two VLAN
mapping
Figure 63 shows a typical application scenario of one-to-two and two-to-two VLAN mapping. In this
scenario, the remote sites of the same VPN must communicate across two SP networks.
Figure 63 Application scenario of one-to-two and two-to-two VLAN mapping
Site 1 and Site 2 are in VLAN 2 and VLAN 3, respectively. The SP 1 network assigns SVLAN 10 to
Site 1. The SP 2 network assigns SVLAN 20 to Site 2. When the packet from Site 1 arrives at PE 1,
PE 1 tags the packet with SVLAN 10 by using one-to-two VLAN mapping.
When the double-tagged packet from the SP 1 network arrives at the SP 2 network interface, PE 3
processes the packet as follows:
• Replaces SVLAN tag 10 with SVLAN tag 20.
• Replaces CVLAN tag 2 with CVLAN tag 3.
One-to-two VLAN mapping provides the following benefits:
• Enables a customer network to plan its CVLAN assignment without conflicting with SVLANs.
• Adds a VLAN tag to a tagged packet and expands the number of available VLANs to 4094 ×
4094.
• Reduces the stress on the SVLAN resources, which were 4094 VLANs in the SP network
before the mapping process was initiated.
225
Figure 64 Basic VLAN mapping terms
SP
Network-side port
Customer-side port
Uplink traffic
Downlink traffic
226
Figure 66 Many-to-one VLAN mapping implementation
...
...
One-to-two VLAN mapping
As shown in Figure 67, one-to-two VLAN mapping is implemented on the customer-side port to add
the SVLAN tag for the uplink traffic.
For the downlink traffic to be correctly sent to the customer network, make sure the SVLAN tag is
removed on the customer-side port before transmission. Use one of the following methods to remove
the SVLAN tag from the downlink traffic:
• Configure the customer-side port as a hybrid port and assign the port to the SVLAN as an
untagged member.
• Configure the customer-side port as a trunk port and configure the SVLAN as the PVID.
Figure 67 One-to-two VLAN mapping implementation
227
Figure 68 Two-to-two VLAN mapping implementation
Two-to-two VLAN
mapping
228
Tasks at a glance Remarks
• Configuring many-to-one VLAN mapping in a assignment method.
network with static IP address assignment
Configure one-to-two VLAN mapping on PE 1 and
PE 4, as shown in Figure 63, through which traffic
Configuring one-to-two VLAN mapping
from customer networks enter the service provider
networks.
Configure two-to-two VLAN mapping on PE 3, as
Configuring two-to-two VLAN mapping shown in Figure 63, which is an edge device of the
SP 2 network.
229
Configuring many-to-one VLAN mapping in a network with
dynamic IP address assignment
In a network that uses dynamic address assignment, configure many-to-one VLAN mapping with
DHCP snooping.
The switch replaces the SVLAN tag of the downlink traffic with the associated CVLAN tag based on
the DHCP snooping entry lookup.
Configuration restrictions and guidelines
When you configure many-to-one VLAN mapping in a network that uses dynamic address
assignment, follow these restrictions and guidelines:
• Before you configure many-to-one VLAN mapping, create the original VLANs and the
translated VLANs.
• Customer-side many-to-one VLAN mapping is not supported on Layer 2 aggregate interfaces.
• To ensure correct traffic forwarding from the service provider network to the customer network,
do not configure many-to-one VLAN mapping together with uRPF. For more information about
uRPF, see Security Configuration Guide.
• To modify many-to-one VLAN mappings, first use the reset dhcp snooping binding command
to clear the DHCP snooping entries.
Configuration task list
Tasks at a glance
(Required.) Enabling DHCP snooping
(Required.) Enabling ARP detection
(Required.) Configuring the customer-side port
(Required.) Configuring the network-side port
230
Step Command Remarks
Security Command Reference.
6. Configure the port as an ARP arp detection trust By default, all ports are ARP
231
Step Command Remarks
trusted port. untrusted ports.
Tasks at a glance
(Required.) Enabling ARP snooping
(Required.) Configuring the customer-side port
(Required.) Configuring the network-side port
232
Step Command Remarks
2. Enter VLAN view. vlan vlan-id N/A
By default, ARP snooping is disabled.
3. Enable ARP snooping. arp snooping enable For more information about ARP
snooping commands, see Layer 3—IP
Services Command Reference.
233
Step Command Remarks
5. Configure the port to use the
original VLAN tags of the By default, the port does not
many-to-one mapping to replace the VLAN tags of the
replace the VLAN tags of the vlan mapping nni
packets destined for the user
packets destined for the user network.
network.
234
Before you configure two-to-two VLAN mapping, create the original VLANs and the translated
VLANs.
To configure two-to-two VLAN mapping:
Task Command
Display VLAN mapping
display vlan mapping [ interface interface-type interface-number ]
information.
235
To isolate traffic of the same service type from different households, configure one-to-one VLAN
mapping on the wiring-closet switches. This feature assigns one VLAN to each type of traffic from
each household.
To save VLAN resources, configure many-to-one VLAN mapping on the campus switch (Switch C).
This feature transmits the same type of traffic from different households in one VLAN. Use VLANs
501, 502, and 503 for PC, VoD, and VoIP traffic, respectively.
Table 17 VLAN mapping for each service
VLAN 1
PC
Home gateway
VLAN 2
VoD
Wiring-closet XGE1/0/3
Switch A
VLAN 1 XGE1/0/2
PC VLAN 1 -> VLAN 102 DHCP server
VLAN 2 -> VLAN 202
VLAN 3 -> VLAN 302
VLAN 2
VoD
Home gateway VLANs 101–102 -> VLAN 501
VLAN 3 VLANs 201–202 -> VLAN 502
VoIP XGE1/0/1 VLANs 301–302 -> VLAN 503
Campus switch XGE1/0/3 XGE1/0/1
Switch D
Switch C
VLAN 1 XGE1/0/2 VLANs 103–104 -> VLAN 501
PC
VLANs 203–204 -> VLAN 502
Home gateway VLANs 303–304 -> VLAN 503
VLAN 2
VoD
Distribution
VLAN 1 -> VLAN 103 network
VLAN 3 VLAN 2 -> VLAN 203
VoIP XGE1/0/1 VLAN 3 -> VLAN 303
Wiring-closet XGE1/0/3
Switch B
VLAN 1 XGE1/0/2
PC VLAN 1 -> VLAN 104
VLAN 2 -> VLAN 204
VLAN 3 -> VLAN 304
VLAN 2
VoD
Home gateway
VLAN 3
VoIP
236
Configuration procedure
1. Configure Switch A:
# Create the original VLANs.
<SwitchA> system-view
[SwitchA] vlan 2 to 3
# Create the translated VLANs.
[SwitchA] vlan 101 to 102
[SwitchA] vlan 201 to 202
[SwitchA] vlan 301 to 302
# Configure the customer-side port Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the
port to all original VLANs and translated VLANs.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/1] port trunk permit vlan 1 2 3 101 201 301
# Configure one-to-one VLAN mappings on Ten-GigabitEthernet 1/0/1 to map VLANs 1, 2, and
3 to VLANs 101, 201, and 301, respectively.
[SwitchA-Ten-GigabitEthernet1/0/1] vlan mapping 1 translated-vlan 101
[SwitchA-Ten-GigabitEthernet1/0/1] vlan mapping 2 translated-vlan 201
[SwitchA-Ten-GigabitEthernet1/0/1] vlan mapping 3 translated-vlan 301
[SwitchA-Ten-GigabitEthernet1/0/1] quit
# Configure the customer-side port Ten-GigabitEthernet 1/0/2 as a trunk port, and assign the
port to all original VLANs and translated VLANs.
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/2] port trunk permit vlan 1 2 3 102 202 302
# Configure one-to-one VLAN mappings on Ten-GigabitEthernet 1/0/2 to map VLANs 1, 2, and
3 to VLANs 102, 202, and 302, respectively.
[SwitchA-Ten-GigabitEthernet1/0/2] vlan mapping 1 translated-vlan 102
[SwitchA-Ten-GigabitEthernet1/0/2] vlan mapping 2 translated-vlan 202
[SwitchA-Ten-GigabitEthernet1/0/2] vlan mapping 3 translated-vlan 302
[SwitchA-Ten-GigabitEthernet1/0/2] quit
# Configure the network-side port Ten-GigabitEthernet 1/0/3 as a trunk port, and assign the port
to the translated VLANs.
[SwitchA] interface ten-gigabitethernet 1/0/3
[SwitchA-Ten-GigabitEthernet1/0/3] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/3] port trunk permit vlan 101 201 301 102 202 302
[SwitchA-Ten-GigabitEthernet1/0/3] quit
2. Configure Switch B in the same way Switch A is configured. (Details not shown.)
3. Configure Switch C:
# Enable DHCP snooping.
<SwitchC> system-view
[SwitchC] dhcp snooping enable
# Create the original VLANs and translated VLANs, and enable ARP detection for these
VLANs.
[SwitchC] vlan 101
[SwitchC-vlan101] arp detection enable
[SwitchC-vlan101] vlan 201
[SwitchC-vlan201] arp detection enable
237
[SwitchC-vlan201] vlan 301
[SwitchC-vlan301] arp detection enable
[SwitchC-vlan301] vlan 102
[SwitchC-vlan102] arp detection enable
[SwitchC-vlan102] vlan 202
[SwitchC-vlan202] arp detection enable
[SwitchC-vlan202] vlan 302
[SwitchC-vlan302] arp detection enable
[SwitchC-vlan302] vlan 103
[SwitchC-vlan103] arp detection enable
[SwitchC-vlan103] vlan 203
[SwitchC-vlan203] arp detection enable
[SwitchC-vlan203] vlan 303
[SwitchC-vlan303] arp detection enable
[SwitchC-vlan303] vlan 104
[SwitchC-vlan104] arp detection enable
[SwitchC-vlan104] vlan 204
[SwitchC-vlan204] arp detection enable
[SwitchC-vlan204] vlan 304
[SwitchC-vlan304] arp detection enable
[SwitchC-vlan304] vlan 501
[SwitchC-vlan501] arp detection enable
[SwitchC-vlan501] vlan 502
[SwitchC-vlan502] arp detection enable
[SwitchC-vlan502] vlan 503
[SwitchC-vlan503] arp detection enable
[SwitchC-vlan503] quit
# Configure the customer-side port Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the
port to original VLANs and translated VLANs.
[SwitchC] interface ten-gigabitethernet 1/0/1
[SwitchC-Ten-GigabitEthernet1/0/1] port link-type trunk
[SwitchC-Ten-GigabitEthernet1/0/1] port trunk permit vlan 101 102 201 202 301 302 501
to 503
# Configure many-to-one VLAN mappings on the customer-side port Ten-GigabitEthernet 1/0/1
to map VLANs for PC, VoD, and VoIP traffic to VLANs 501, 502, and 503, respectively.
[SwitchC-Ten-GigabitEthernet1/0/1] vlan mapping uni range 101 to 102 translated-vlan
501
[SwitchC-Ten-GigabitEthernet1/0/1] vlan mapping uni range 201 to 202 translated-vlan
502
[SwitchC-Ten-GigabitEthernet1/0/1] vlan mapping uni range 301 to 302 translated-vlan
503
# Enable DHCP snooping entry recording on Ten-GigabitEthernet 1/0/1.
[SwitchC-Ten-GigabitEthernet1/0/1] dhcp snooping binding record
[SwitchC-Ten-GigabitEthernet1/0/1] quit
# Configure the customer-side port Ten-GigabitEthernet 1/0/2 as a trunk port, and assign the
port to original VLANs and translated VLANs.
[SwitchC] interface ten-gigabitethernet 1/0/2
[SwitchC-Ten-GigabitEthernet1/0/2] port link-type trunk
238
[SwitchC-Ten-GigabitEthernet1/0/2] port trunk permit vlan 103 104 203 204 303 304 501
to 503
# Configure many-to-one VLAN mappings on the customer-side port Ten-GigabitEthernet 1/0/2
to map VLANs for PC, VoD, and VoIP traffic to VLANs 501, 502, and 503, respectively.
[SwitchC-Ten-GigabitEthernet1/0/2] vlan mapping uni range 103 to 104 translated-vlan
501
[SwitchC-Ten-GigabitEthernet1/0/2] vlan mapping uni range 203 to 204 translated-vlan
502
[SwitchC-Ten-GigabitEthernet1/0/2] vlan mapping uni range 303 to 304 translated-vlan
503
# Enable DHCP snooping entry recording on Ten-GigabitEthernet 1/0/2.
[SwitchC-Ten-GigabitEthernet1/0/2] dhcp snooping binding record
[SwitchC-Ten-GigabitEthernet1/0/2] quit
# Configure the network-side port Ten-GigabitEthernet 1/0/3 to use the original VLAN tags of
the many-to-one mappings to replace the VLAN tags of the packets destined for the user
network.
[SwitchC] interface ten-gigabitethernet 1/0/3
[SwitchC-Ten-GigabitEthernet1/0/3] vlan mapping nni
# Configure Ten-GigabitEthernet 1/0/3 as a trunk port, and assign the port to the translated
VLANs.
[SwitchC-Ten-GigabitEthernet1/0/3] port link-type trunk
[SwitchC-Ten-GigabitEthernet1/0/3] port trunk permit vlan 501 to 503
# Configure Ten-GigabitEthernet 1/0/3 as a DHCP snooping trusted and ARP trusted port.
[SwitchC-Ten-GigabitEthernet1/0/3] dhcp snooping trust
[SwitchC-Ten-GigabitEthernet1/0/3] arp detection trust
[SwitchC-Ten-GigabitEthernet1/0/3] quit
4. Configure Switch D:
# Create the translated VLANs.
<SwitchD> system-view
[SwitchD] vlan 501 to 503
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the port to the translated
VLANs 501 through 503.
[SwitchD] interface ten-gigabitethernet 1/0/1
[SwitchD-Ten-GigabitEthernet1/0/1] port link-type trunk
[SwitchD-Ten-GigabitEthernet1/0/1] port trunk permit vlan 501 to 503
[SwitchD-Ten-GigabitEthernet1/0/1] quit
239
3 N/A 302 N/A
SP 1 SP 2
PE 1 PE 2 PE 3 PE 4
XGE1/0/2 XGE1/0/1 XGE1/0/2 XGE1/0/1 XGE1/0/2 XGE1/0/1
XGE1/0/1 XGE1/0/2
VLAN 100 VLAN 5 Data VLAN 200 VLAN 6 Data
VPN A VPN A CE 2
CE 1
Site 1 Site 2
Configuration procedure
1. Configure PE 1:
# Configure a one-to-two VLAN mapping on the customer-side port Ten-GigabitEthernet 1/0/1
to add SVLAN tag 100 to traffic from VLAN 5.
<PE1> system-view
[PE1] interface ten-gigabitethernet 1/0/1
240
[PE1-Ten-GigabitEthernet1/0/1] vlan mapping nest single 5 nested-vlan 100
# Configure Ten-GigabitEthernet 1/0/1 as a hybrid port. Assign the port to VLAN 5 and VLAN
100 as a tagged member and an untagged member, respectively.
[PE1-Ten-GigabitEthernet1/0/1] port link-type hybrid
[PE1-Ten-GigabitEthernet1/0/1] port hybrid vlan 5 tagged
[PE1-Ten-GigabitEthernet1/0/1] port hybrid vlan 100 untagged
[PE1-Ten-GigabitEthernet1/0/1] quit
# Configure the network-side port Ten-GigabitEthernet 1/0/2 as a trunk port, and assign the port
to VLAN 100.
[PE1] interface ten-gigabitethernet 1/0/2
[PE1-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE1-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[PE1-Ten-GigabitEthernet1/0/2] quit
2. Configure PE 2:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the port to VLAN 100.
<PE2> system-view
[PE2] interface ten-gigabitethernet 1/0/1
[PE2-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100
[PE2-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign the port to VLAN 100.
[PE2] interface ten-gigabitethernet 1/0/2
[PE2-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE2-Ten-GigabitEthernet1/0/2] port trunk permit vlan 100
[PE2-Ten-GigabitEthernet1/0/2] quit
3. Configure PE 3:
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the port to VLANs 100 and
200.
<PE3> system-view
[PE3] interface ten-gigabitethernet 1/0/1
[PE3-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE3-Ten-GigabitEthernet1/0/1] port trunk permit vlan 100 200
# Configure a two-to-two VLAN mapping on Ten-GigabitEthernet 1/0/1 to map SVLAN 100 and
CVLAN 5 to SVLAN 200 and CVLAN 6.
[PE3-Ten-GigabitEthernet1/0/1] vlan mapping tunnel 100 5 translated-vlan 200 6
[PE3-Ten-GigabitEthernet1/0/1] quit
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign the port to VLAN 200.
[PE3] interface ten-gigabitethernet 1/0/2
[PE3-Ten-GigabitEthernet1/0/2] port link-type trunk
[PE3-Ten-GigabitEthernet1/0/2] port trunk permit vlan 200
[PE3-Ten-GigabitEthernet1/0/2] quit
4. Configure PE 4:
# Configure the network-side port Ten-GigabitEthernet 1/0/1 as a trunk port, and assign the port
to VLAN 200.
<PE4> system-view
[PE4] interface ten-gigabitethernet 1/0/1
[PE4-Ten-GigabitEthernet1/0/1] port link-type trunk
[PE4-Ten-GigabitEthernet1/0/1] port trunk permit vlan 200
241
[PE4-Ten-GigabitEthernet1/0/1] quit
# Configure the customer-side port Ten-GigabitEthernet 1/0/2 as a hybrid port. Assign the port
to VLAN 6 and VLAN 200 as a tagged member and an untagged member, respectively.
[PE4] interface ten-gigabitethernet 1/0/2
[PE4-Ten-GigabitEthernet1/0/2] port link-type hybrid
[PE4-Ten-GigabitEthernet1/0/2] port hybrid vlan 6 tagged
[PE4-Ten-GigabitEthernet1/0/2] port hybrid vlan 200 untagged
# Configure a one-to-two VLAN mapping on the customer-side port Ten-GigabitEthernet 1/0/2
to add SVLAN tag 200 to traffic from VLAN 6.
[PE4-Ten-GigabitEthernet1/0/2] vlan mapping nest single 6 nested-vlan 200
[PE4-Ten-GigabitEthernet1/0/2] quit
242
Configuring PBB
Overview
IEEE 802.1ah Provider Backbone Bridge (PBB) is a MAC-in-MAC Layer 2 VPN technology. It
interconnects multiple provider bridged networks to build a large-scale end-to-end Layer 2 provider
bridged network.
PBB has the following advantages over QinQ:
• Reduces the MAC address table size. In a PBB-enabled service provider network, only the
edge devices maintain entries for customer MAC addresses. In a QinQ-enabled service
provider network, all devices must maintain entries for customer MAC addresses.
• Supports more than 16 million service instances. QinQ supports only a maximum of 4094 outer
VLANs (service instances).
For more information about QinQ, see "Configuring QinQ."
243
Terminology
PBBN
A network using PBB is a provider backbone bridge network (PBBN). A PBBN is a Layer 2 switching
network where Layer 2 connections are established between different nodes.
PBN
A provider bridge network (PBN) connects a PBBN to a customer network. A customer network can
connect to a PBBN directly or through a PBN.
BEB
A backbone edge bridge (BEB) is an edge device in a PBBN. A BEB encapsulates frames from a
customer network by using PBB. It decapsulates PBB frames from a PBBN and forwards them to a
customer network. The BEB learns customer MAC addresses.
BCB
A backbone core bridge (BCB) is a core device in a PBBN. It forwards a PBB frame according to its
B-MAC and B-VLAN. A BCB only forwards frames and learns MAC addresses within the PBBN. It
does not learn a large number of customer MAC addresses. This reduces network deployment costs,
and the PBBN is more expandable.
B-MAC and B-VLAN
A backbone MAC address (B-MAC) is a bridge MAC address associated with a PBB bridge. A
backbone VLAN (B-VLAN) is a VLAN assigned by the service provider for transmitting customer
traffic on the PBBN.
For customer frames to be transmitted across a PBBN, the ingress BEB encapsulates them in
MAC-in-MAC format. In the outer frame header, the source MAC address is a B-MAC of the ingress
BEB, and the destination MAC is a B-MAC of the egress BEB. All devices in the PBBN forward the
PBB frames based on the destination B-MAC and B-VLAN.
Uplink port and downlink port
A port that connects a BEB to a PBBN is an uplink port, and a port that connects a BEB to a customer
network is a downlink port. After frames from the customer network are encapsulated in PBB frames,
they are forwarded out of the corresponding uplink ports on the BEB. After PBB frames from the
PBBN are decapsulated, they are forwarded out of the corresponding downlink ports on the BEB
according to the customer MAC addresses.
PBB VSI and I-SID
In a PBBN, a PBB VSI is a virtual switch provided by the service provider, and it is uniquely identified
by a backbone service instance identifier (I-SID). A VSI acts as a virtual switch with all conventional
Ethernet switch functions, including source MAC address learning, MAC address aging, and
flooding.
244
Figure 72 PBB frame format
245
PBB frame forwarding
Figure 73 PBB frame forwarding
Tasks at a glance
(Required.) Enabling L2VPN
(Required.) Creating a PBB VSI
(Required.) Configuring a B-VLAN for a PBB VSI
(Required.) Configuring an uplink port
(Required.) Configuring a downlink port
(Optional.) Configuring the data encapsulation type
246
Enabling L2VPN
Step Command Remarks
1. Enter system view. system-view N/A
2. Enable L2VPN. l2vpn enable By default, L2VPN is disabled.
247
You can specify multiple uplink ports for one PBB VSI.
For the uplink port configuration to take effect, perform the following tasks before uplink port
assignment:
• Assign a B-VLAN to the PBB VSI.
• Make sure the port is in up state and is not a link aggregation group member.
• Assign the port to the B-VLAN.
To configure an uplink port:
248
Step Command Remarks
802.1Q VLAN IDs:
encapsulation s-vid vlan-id
c-vid vlan-id
5. Associate the Ethernet xconnect vsi vsi-name By default, an Ethernet service
service instance with the [ access-mode { ethernet | instance is not associated with
specified PBB VSI. vlan } ] any PBB VSI.
For more information about the service-instance, encapsulation, and xconnect vsi commands,
see MPLS Command Reference.
Traffic
Ethernet encapsulation VLAN encapsulation
direction
The traffic must contain a P-tag.
• VLAN access mode—The BEB
The traffic must not contain a P-tag.
retains the P-tag or changes the
• VLAN access mode—The BEB P-tag to the value assigned by the
removes the P-tag before it peer BEB.
encapsulates the traffic in PBB.
CE to PBBN • Ethernet access mode—The BEB
• Ethernet access mode—The BEB adds the P-tag assigned by the peer
directly encapsulates the traffic in BEB. The original VLAN tag in the
PBB. The VLAN tag in the received received traffic is considered a U-tag.
traffic is considered a U-tag.
The P-tag assigned by the peer BEB
might be a null tag (tag 0).
• VLAN access mode—The BEB
adds a P-tag before it forwards the
traffic. • VLAN access mode—The BEB
forwards the traffic with the P-tag
• Ethernet access mode—The BEB
modified or intact.
PBBN to CE forwards the traffic without adding a
P-tag. • Ethernet access mode—The BEB
removes the P-tag before it forwards
The BEB cannot modify or remove any the traffic.
tags already in the traffic from PBBN to
CE.
NOTE:
To configure the access mode, use the xconnect vsi command (see MPLS Command Reference).
249
Step Command Remarks
type for the PBB VSI. vlan } applies.
Task Command
Display the PBB VSI uplink connection information. display pbb connection
Display MAC-in-MAC connection information. display l2vpn minm connection [ vsi vsi-name ]
display l2vpn minm forwarding [ vsi vsi-name ]
Display MAC-in-MAC forwarding entries.
[ slot slot-number ]
Display VSI information. display l2vpn vsi [ name vsi-name ] [ verbose ]
reset pbb connection [ bvlan vlan-id | interface
Clear the PBB VSI uplink connection information.
interface-type interface-number ] *
BEB 1 BEB 2
XGE1/0/1 Core XGE1/0/1
network
XGE1/0/2 XGE1/0/2
PBBN
Device A Device B
Customer Customer
network A network B
Configuration procedures
1. Configure BEB 1:
# Create VLAN 20.
<BEB1> system-view
[BEB1] vlan 20
[BEB1-vlan20] quit
250
# Enable L2VPN.
[BEB1] l2vpn enable
# Create a VSI of the PBB type named aaa.
[BEB1] vsi aaa
# Specify the I-SID as 1.
[BEB1-vsi-aaa] pbb i-sid 1
# Specify B-VLAN 20 for PBB VSI aaa.
[BEB1-vsi-aaa-1] bvlan 20
[BEB1-vsi-aaa-1] quit
[BEB1-vsi-aaa] quit
# Configure Ten-GigabitEthernet 1/0/1 as a trunk port, assign it to VLAN 20, and configure it as
an uplink port of PBB VSI aaa.
[BEB1] interface ten-gigabitethernet 1/0/1
[BEB1-Ten-GigabitEthernet1/0/1] port link-type trunk
[BEB1-Ten-GigabitEthernet1/0/1] port trunk permit vlan 20
[BEB1-Ten-GigabitEthernet1/0/1] pbb uplink vsi aaa
[BEB1-Ten-GigabitEthernet1/0/1] quit
# Create VLANs 100 through 120.
[BEB1] vlan 100 to 120
# Configure Ten-GigabitEthernet 1/0/2 as a trunk port, and assign it to all VLANs.
[BEB1] interface ten-gigabitethernet 1/0/2
[BEB1-Ten-GigabitEthernet1/0/2] port link-type trunk
[BEB1-Ten-GigabitEthernet1/0/2] port trunk permit vlan all
# Create Ethernet service instance 1 on Ten-GigabitEthernet 1/0/2.
[BEB1-Ten-GigabitEthernet1/0/2] service-instance 1
# Configure the Ethernet service instance to match all 802.1q tagged frames. Associate the
Ethernet service instance with PBB VSI aaa, and set the access mode to Ethernet.
[BEB1-Ten-GigabitEthernet1/0/2-srv1] encapsulation tagged
[BEB1-Ten-GigabitEthernet1/0/2-srv1] xconnect vsi aaa access-mode ethernet
[BEB1-Ten-GigabitEthernet1/0/2-srv1] quit
[BEB1-Ten-GigabitEthernet1/0/2] quit
# Configure Ethernet encapsulation for the PBB VSI.
[BEB1] vsi aaa
[BEB1-vsi-aaa] pbb i-sid 1
[BEB1-vsi-aaa-1] encapsulation ethernet
[BEB1-vsi-aaa-1] quit
2. Configure BEB 2 in the same way BEB 1 is configured. (Details not shown.)
# Verify that Device A and Device B can ping each other. (Details not shown.)
251
Troubleshooting
Symptom
Customer frames cannot be transmitted to the peer network by using PBB.
Analysis
• No PBB VSI is configured on the BEB, or the configured VSI is down.
• PBB configurations on the BEBs are inconsistent.
• The B-VLAN in the BEB is not created on the BCB, or ports connecting the BEB and BCB are
not both assigned to the B-VLAN.
Solution
To resolve the problem:
1. Use the display l2vpn vsi verbose command to display the PBB configuration of the VSI.
{ If the VSI is not configured as a PBB VSI, configure the VSI as a PBB VSI.
{ If the VSI is down, use the undo shutdown command to bring the VSI up.
For more information about the display l2vpn vsi verbose command, see MPLS Command
Reference.
2. Use the display l2vpn vsi verbose command to verify that the VSI's PBB settings are
consistent across BEBs, especially the I-SID and B-VLAN settings.
3. Use the display vlan all command to verify that the following settings are configured on all
BCBs:
{ The B-VLAN is created on each BCB.
{ All ports on the path between the BEBs are assigned to the B-VLAN.
4. If the problem persists, contact H3C Support.
252
Configuring LLDP
You can set an Ethernet interface to work in Layer 3 mode by using the port link-mode route
command (see "Configuring Ethernet interfaces").
Overview
In a heterogeneous network, a standard configuration exchange platform makes sure different types
of network devices from different vendors can discover one another and exchange configuration.
The Link Layer Discovery Protocol (LLDP) is specified in IEEE 802.1AB. The protocol operates on
the data link layer to exchange device information between directly connected devices. With LLDP, a
device sends local device information as TLV (type, length, and value) triplets in LLDP Data Units
(LLDPDUs) to the directly connected devices. Local device information includes its system
capabilities, management IP address, device ID, and port ID. The device stores the device
information in LLDPDUs from the LLDP neighbors in a standard MIB. For more information about
MIBs, see Network Management and Monitoring Configuration Guide. LLDP enables a network
management system to quickly detect and identify Layer 2 network topology changes.
Basic concepts
LLDP agent
An LLDP agent is a mapping of an entity where LLDP runs. Multiple LLDP agents can run on the
same interface.
LLDP agents are divided into the following types:
• Nearest bridge agent.
• Nearest customer bridge agent.
• Nearest non-TPMR bridge agent.
A Two-port MAC Relay (TPMR) is a type of bridge that has only two externally-accessible bridge
ports, and supports a subset of the functions of a MAC bridge. A TPMR is transparent to all
frame-based media-independent protocols except for the following:
• Protocols destined to it.
• Protocols destined to reserved MAC addresses that the relay function of the TPMR is
configured not to forward.
LLDP exchanges packets between neighbor agents and creates and maintains neighbor information
for them. Figure 75 shows the neighbor relationships for these LLDP agents. LLDP has two bridge
modes: customer bridge (CB) and service bridge (SB).
Figure 75 LLDP neighbor relationships
Nearest Nearest
customer customer
bridge bridge
Nearest non- Nearest non- Nearest non- Nearest non-
TPMR bridge TPMR bridge TPMR bridge TPMR bridge
Nearest bridge Nearest bridge Nearest bridge Nearest bridge
253
LLDP frame formats
LLDP sends device information in LLDP frames. LLDP frames are encapsulated in Ethernet II or
SNAP frames.
• LLDP frame encapsulated in Ethernet II
Figure 76 Ethernet II-encapsulated LLDP frame
Field Description
MAC address to which the LLDP frame is advertised. LLDP specifies
different multicast MAC addresses as destination MAC addresses for LLDP
frames destined for agents of different types. This helps distinguish between
LLDP frames sent and received by different agent types on the same
interface. The destination MAC address is fixed to one of the following
multicast MAC addresses:
Destination MAC address • 0x0180-C200-000E for LLDP frames destined for nearest bridge
agents.
• 0x0180-C200-0000 for LLDP frames destined for nearest customer
bridge agents.
• 0x0180-C200-0003 for LLDP frames destined for nearest non-TPMR
bridge agents.
Type Ethernet type for the upper-layer protocol. It is 0x88CC for LLDP.
Data LLDPDU. An LLDP frame contains only one LLDPDU.
Frame check sequence, a 32-bit CRC value used to determine the validity of
FCS
the received Ethernet frame.
254
Figure 77 SNAP-encapsulated LLDP frame
Field Description
MAC address to which the LLDP frame is advertised. It is the same as that
Destination MAC address
for Ethernet II-encapsulated LLDP frames.
LLDPDUs
LLDP uses LLDPDUs to exchange information. An LLDPDU comprises multiple TLVs. Each TLV
carries a type of device information, as shown in Figure 78.
Figure 78 LLDPDU encapsulation format
An LLDPDU can carry up to 32 types of TLVs. Mandatory TLVs include Chassis ID TLV, Port ID TLV,
Time to Live TLV, and End of LLDPDU TLV. Other TLVs are optional.
TLVs
A TLV is an information element that contains the type, length, and value fields.
LLDPDU TLVs include the following categories:
• Basic management TLVs
• Organizationally (IEEE 802.1 and IEEE 802.3) specific TLVs
• LLDP-MED (media endpoint discovery) TLVs
Basic management TLVs are essential to device management.
Organizationally specific TLVs and LLDP-MED TLVs are used for enhanced device management.
They are defined by standardization or other organizations and are optional for LLDPDUs.
• Basic management TLVs
Table 22 lists the basic management TLV types. Some of them are mandatory for LLDPDUs.
255
Table 22 Basic management TLVs
Type Description
Port VLAN ID Specifies the port VLAN identifier (PVID).
Indicates whether the device supports protocol VLANs and, if so, what
Port And Protocol VLAN ID
VLAN IDs these protocols will be associated with.
VLAN Name Specifies the textual name of any VLAN to which the port belongs.
Protocol Identity Indicates protocols supported on the port.
DCBX Data center bridging exchange protocol.
Edge Virtual Bridging module, including EVB TLV and CDCP TLV. For more
EVB module
information, see EVB Configuration Guide.
Indicates whether the port supports link aggregation, and if yes, whether link
Link Aggregation
aggregation is enabled.
Management VID Management VLAN ID.
VID Usage Digest VLAN ID usage digest.
ETS Configuration Enhanced Transmission Selection configuration.
ETS Recommendation ETS recommendation.
PFC Priority-based Flow Control.
APP Application protocol.
QCN Quantized Congestion Notification.
256
NOTE:
• H3C devices support only receiving protocol identity TLVs and VID usage digest TLVs.
• Layer 3 Ethernet ports support only link aggregation TLVs.
Type Description
Contains the bit-rate and duplex capabilities of the sending port,
MAC/PHY Configuration/Status support for autonegotiation, enabling status of autonegotiation, and
the current rate and duplex mode.
Contains the power supply capabilities of the port:
• Port class (PSE or PD).
• Power supply mode.
Power Via MDI
• Whether PSE power supply is supported.
• Whether PSE power supply is enabled.
• Whether pair selection can be controlled.
Indicates the supported maximum frame size. It is now the MTU of
Maximum Frame Size
the port.
Indicates the power state control configured on the sending port,
including the following:
Power Stateful Control • Power supply mode of the PSE/PD.
• PSE/PD priority.
• PSE/PD power.
NOTE:
The Power Stateful Control TLV is defined in IEEE P802.3at D1.0 and is not supported in later
versions. H3C devices send this type of TLVs only after receiving them.
• LLDP-MED TLVs
LLDP-MED TLVs provide multiple advanced applications for voice over IP (VoIP), such as
basic configuration, network policy configuration, and address and directory management.
LLDP-MED TLVs provide a cost-effective and easy-to-use solution for deploying voice devices
in Ethernet. LLDP-MED TLVs are shown in Table 25.
Table 25 LLDP-MED TLVs
Type Description
Allows a network device to advertise the LLDP-MED TLVs that it
LLDP-MED Capabilities
supports.
Allows a network device or terminal device to advertise the VLAN ID
Network Policy of a port, the VLAN type, and the Layer 2 and Layer 3 priorities for
specific applications.
Allows a network device or terminal device to advertise power
Extended Power-via-MDI supply capability. This TLV is an extension of the Power Via MDI
TLV.
Hardware Revision Allows a terminal device to advertise its hardware version.
Firmware Revision Allows a terminal device to advertise its firmware version.
Software Revision Allows a terminal device to advertise its software version.
Serial Number Allows a terminal device to advertise its serial number.
257
Type Description
Manufacturer Name Allows a terminal device to advertise its vendor name.
Model Name Allows a terminal device to advertise its model name.
Allows a terminal device to advertise its asset ID. The typical case is
Asset ID that the user specifies the asset ID for the endpoint to facilitate
directory management and asset tracking.
Allows a network device to advertise the appropriate location
Location Identification identifier information for a terminal device to use in the context of
location-based applications.
NOTE:
• If the MAC/PHY configuration/status TLV is not advertisable, none of the LLDP-MED TLVs will be
advertised even if they are advertisable.
• If the LLDP-MED capabilities TLV is not advertisable, the other LLDP-MED TLVs will not be
advertised even if they are advertisable.
Management address
The network management system uses the management address of a device to identify and manage
the device for topology maintenance and network management. The management address is
encapsulated in the management address TLV.
Working mechanism
LLDP operating modes
An LLDP agent can operate in one of the following modes:
• TxRx mode—An LLDP agent in this mode can send and receive LLDP frames.
• Tx mode—An LLDP agent in this mode can only send LLDP frames.
• Rx mode—An LLDP agent in this mode can only receive LLDP frames.
• Disable mode—An LLDP agent in this mode cannot send or receive LLDP frames.
Each time the LLDP operating mode of an LLDP agent changes, its LLDP protocol state machine
reinitializes. A configurable reinitialization delay prevents frequent initializations caused by frequent
changes to the operating mode. If you configure the reinitialization delay, an LLDP agent must wait
the specified amount of time to initialize LLDP after the LLDP operating mode changes.
Transmitting LLDP frames
An LLDP agent operating in TxRx mode or Tx mode sends LLDP frames to its directly connected
devices both periodically and when the local configuration changes. To prevent LLDP frames from
overwhelming the network during times of frequent changes to local device information, LLDP uses
the token bucket mechanism to rate limit LLDP frames. For more information about the token bucket
mechanism, see ACL and QoS Configuration Guide.
LLDP automatically enables the fast LLDP frame transmission mechanism in either of the following
cases:
• A new neighbor is discovered. A new LLDP frame is received and carries device information
new to the local device.
• The LLDP operating mode of the LLDP agent changes from Disable or Rx to TxRx or Tx.
With this mechanism, the specified number of LLDP frames are sent successively at a configurable
fast transmission interval to help LLDP neighbors discover the local device as soon as possible.
Then, the normal LLDP frame transmission interval resumes.
258
Receiving LLDP frames
An LLDP agent operating in TxRx mode or Rx mode confirms the validity of TLVs carried in every
received LLDP frame. If the TLVs are valid, the LLDP agent saves the information and starts an
aging timer. When the TTL value in the Time To Live TLV carried in the LLDP frame becomes zero,
the information ages out immediately.
259
Step Command Remarks
1. Enter system view. system-view N/A
By default:
• If the switch starts up
with empty
configuration, LLDP is
disabled globally
(initial setting).
• If the switch starts up
with the default
2. Enable LLDP globally. lldp global enable configuration file,
LLDP is enabled
globally (factory
default).
For more information about
empty configuration and
the default configuration
file, see Fundamentals
Configuration Guide.
3. Enter Layer 2/Layer 3
Ethernet interface view,
management Ethernet
interface view, Layer interface interface-type interface-number N/A
2/Layer 3 aggregate
interface view, or IRF
physical interface view.
NOTE:
An LLDP-enabled IRF physical interface supports only the nearest bridge agents.
260
Setting the LLDP operating mode
Step Command Remarks
1. Enter system view. system-view N/A
2. Enter Layer 2/Layer 3
Ethernet interface view,
management Ethernet
interface view, Layer interface interface-type interface-number N/A
2/Layer 3 aggregate
interface view, or IRF
physical interface view.
By default:
• The nearest bridge
agent operates in txrx
mode.
• The nearest customer
bridge agent and
• In Layer 2/Layer 3 Ethernet interface
nearest non-TPMR
view or management Ethernet
bridge agent operate
interface view:
in disable mode.
lldp [ agent { nearest-customer |
nearest-nontpmr } ] admin-status In Ethernet interface view,
{ disable | rx | tx | txrx } if no agent type is
3. Set the LLDP operating • In Layer 2/Layer 3 aggregate interface specified, the command
mode. view: configures the operating
lldp agent { nearest-customer | mode for nearest bridge
nearest-nontpmr } admin-status agents.
{ disable | rx | tx | txrx } In aggregate interface
• In IRF physical interface view: view, you can configure the
lldp admin-status { disable | rx | tx | operating mode only for
txrx } nearest customer bridge
agents and nearest
non-TPMR bridge agents.
In IRF physical interface
view, you can configure the
operating mode only for
nearest bridge agents.
261
Enabling LLDP polling
With LLDP polling enabled, a device periodically searches for local configuration changes. When the
device detects a configuration change, it sends LLDP frames to inform neighboring devices of the
change.
To enable LLDP polling:
262
Step Command Remarks
power-over-ethernet | location-id bridge agents can
{ civic-address device-type advertise only the
country-code { ca-type EVB TLV.
ca-value }&<1-10> | elin-address • Nearest customer
tel-number } } } bridge agents can
• lldp agent nearest-nontpmr advertise basic
tlv-enable { basic-tlv { all | TLVs and IEEE
port-description | system-capability 802.1
| system-description | system-name organizationally
| management-address-tlv specific TLVs.
[ ip-address ] } | dot1-tlv { all |
congestion-notification | evb |
port-vlan-id | link-aggregation } }
• lldp agent nearest-customer
tlv-enable { basic-tlv { all |
port-description | system-capability
| system-description | system-name
| management-address-tlv
[ ip-address ] } | dot1-tlv { all |
congestion-notification |
port-vlan-id | link-aggregation } }
By default:
• lldp tlv-enable { basic-tlv { all | • Nearest bridge
port-description | system-capability agents can
| system-description | system-name advertise all types of
| management-address-tlv LLDP TLVs (only
[ ip-address ] } | dot1-tlv { all | link aggregation TLV
link-aggregation } | dot3-tlv { all | in 802.1
mac-physic | max-frame-size | organizationally
power } | med-tlv { all | capability | specific TLVs)
4. Configure the advertisable inventory | power-over-ethernet | except network
TLVs (in Layer 3 Ethernet location-id { civic-address policy TLVs.
interface view or device-type country-code { ca-type • Nearest non-TPMR
management Ethernet ca-value }&<1-10> | elin-address bridge agents
interface view). tel-number } } } advertise no TLVs.
• lldp agent { nearest-nontpmr | • Nearest customer
nearest-customer } tlv-enable bridge agents can
{ basic-tlv { all | port-description | advertise basic
system-capability | TLVs and IEEE
system-description | system-name | 802.1
management-address-tlv organizationally
[ ip-address ] } | dot1-tlv { all | specific TLVs (only
link-aggregation } } link aggregation
TLV).
• lldp agent nearest-nontpmr By default:
tlv-enable { basic-tlv { all | • Nearest non-TPMR
management-address-tlv bridge agents can
[ ip-address ] | port-description | advertise only EVB
system-capability | TLVs.
system-description | system-name }
• Nearest customer
| dot1-tlv { all | evb | port-vlan-id } }
5. Configure the advertisable bridge agents can
TLVs (in Layer 2 aggregate • lldp agent nearest-customer advertise basic
interface view). tlv-enable { basic-tlv { all | TLVs and IEEE
management-address-tlv 802.1
[ ip-address ] | port-description | organizationally
system-capability | specific TLVs (only
system-description | system-name } port and protocol
| dot1-tlv { all | port-vlan-id } } VLAN ID TLV, VLAN
• lldp tlv-enable dot1-tlv name TLV, and
{ protocol-vlan-id [ vlan-id ] | management VLAN
263
Step Command Remarks
vlan-name [ vlan-id ] | ID TLV).
management-vid [ mvlan-id ] } Nearest bridge agents
are not supported on
Layer 2 aggregate
interfaces.
By default:
• Nearest non-TPMR
bridge agents
lldp agent { nearest-nontpmr | advertise no TLVs.
6. Configure the advertisable nearest-customer } tlv-enable basic-tlv • Nearest customer
TLVs (in Layer 3 aggregate { all | management-address-tlv bridge agents can
interface view). [ ip-address ] | port-description | advertise only basic
system-capability | system-description | TLVs.
system-name }
Nearest bridge agents
are not supported on
Layer 3 aggregate
interfaces.
7. Configure the advertisable lldp tlv-enable basic-tlv By default, IRF interfaces
TLVs (in IRF physical { port-description | system-capability | advertise all supported
interface view). system-description | system-name } types of TLVs.
264
Step Command Remarks
tlv-enable basic-tlv
management-address-tlv
[ ip-address ]
• In Layer 2/Layer 3 Ethernet
interface view or
management Ethernet
interface view:
lldp [ agent
{ nearest-customer |
nearest-nontpmr } ]
4. Configure the encoding management-address-for By default, the encoding format of
format of the management mat string the management address is
address as string. numeric.
• In Layer 2/Layer 3
aggregate interface view:
lldp agent
{ nearest-customer |
nearest-nontpmr }
management-address-for
mat string
265
• Ethernet II—With Ethernet II encapsulation configured, an LLDP port sends LLDP frames in
Ethernet II frames.
• SNAP—With SNAP encapsulation configured, an LLDP port sends LLDP frames in SNAP
frames.
LLDP of earlier versions requires the same encapsulation format on both ends to process LLDP
frames. To successfully communicate with a neighboring device running LLDP of earlier versions,
the local device must be configured with the same encapsulation format.
To set the encapsulation format for LLDP frames to SNAP:
266
CDP compatibility enables the switch to use LLDP to receive and recognize CDP packets from the
directly-connected device and send CDP packets to the directly-connected device. The packets that
the switch sends to the neighboring CDP device carry the following information:
• Device ID.
• ID of the port connecting to the neighboring device.
• port IP address.
• PVID.
• TTL.
The port IP address is the primary IP address of the VLAN interface in up state. The VLAN ID of the
VLAN interface must be the lowest among the VLANs permitted on the port. If no VLAN interfaces of
the permitted VLANs is assigned an IP address or all VLAN interfaces are down, no port IP address
will be advertised.
The CDP neighbor-information-related fields in the output of the display lldp neighbor-information
command show the CDP neighboring device information that can be recognized by the switch. For
more information about the display lldp neighbor-information command, see Layer 2—LAN
Switching Command Reference.
If your LLDP-enabled device cannot recognize CDP packets, it does not respond to the requests of
Cisco IP phones for the voice VLAN ID configured on the device. As a result, a requesting Cisco IP
phone sends voice traffic without any VLAN tag to your device. Your device cannot differentiate the
voice traffic from other types of traffic.
CDP compatibility enables your device to receive and recognize CDP packets from a Cisco IP phone
and respond with CDP packets carrying TLVs with the voice VLAN configuration. According to TLVs
with the voice VLAN configuration, the IP phone automatically configures the voice VLAN. As a result,
the voice traffic is confined in the configured voice VLAN and is differentiated from other types of
traffic.
For more information about voice VLANs, see "Configuring voice VLANs."
Configuration prerequisites
Before you configure CDP compatibility, complete the following tasks:
• Globally enable LLDP.
• Enable LLDP on the port connecting to a device supporting CDP.
• Configure LLDP to operate in TxRx mode on the port.
Configuration procedure
CDP-compatible LLDP operates in one of the following modes:
• TxRx—CDP packets can be transmitted and received.
• Disable—CDP packets cannot be transmitted or received.
To make CDP-compatible LLDP take effect on ports, follow these steps:
1. Enable CDP-compatible LLDP globally.
2. Configure CDP-compatible LLDP to operate in TxRx mode.
The maximum TTL value that CDP allows is 255 seconds. To make CDP-compatible LLDP work
correctly with Cisco IP phones, configure the LLDP frame transmission interval to be no more than
1/3 of the TTL value.
To enable LLDP to be compatible with CDP:
267
Step Command Remarks
1. Enter system view. system-view N/A
2. Enable CDP compatibility By default, CDP compatibility is
globally. lldp compliance cdp
disabled globally.
3. Enter Layer 2/Layer 3
Ethernet interface view or interface interface-type
management Ethernet N/A
interface-number
interface view.
4. Configure CDP-compatible
LLDP to operate in TxRx lldp compliance admin-status By default, CDP-compatible LLDP
mode. cdp txrx operates in disable mode.
Configuring DCBX
Data Center Ethernet (DCE), also known as Converged Enhanced Ethernet (CEE), is enhancement
and expansion of traditional Ethernet local area networks for use in data centers. DCE uses the Data
Center Bridging Exchange Protocol (DCBX) to negotiate and remotely configure the bridge capability
of network elements.
DCBX has the following self-adaptable versions:
• DCB Capability Exchange Protocol Specification Rev 1.00.
• DCB Capability Exchange Protocol Base Specification Rev 1.01.
• IEEE Std 802.1Qaz-2011 (Media Access Control (MAC) Bridges and Virtual Bridged Local Area
Networks-Amendment 18: Enhanced Transmission Selection for Bandwidth Sharing Between
Traffic Classes).
DCBX offers the following functions:
• Discovers the peer devices' capabilities and determines whether devices at both ends support
these capabilities.
• Detects configuration errors on peer devices.
• Remotely configures the peer device if the peer device accepts the configuration.
NOTE:
H3C devices support only the remote configuration function.
268
• In DCBX Rev 1.00 and DCBX Rev 1.01:
{ Application Protocol (APP).
{ Enhanced Transmission Selection (ETS).
{ Priority-based Flow Control (PFC).
• In IEEE Std 802.1Qaz-2011:
{ ETS Configuration.
{ ETS Recommendation.
{ PFC.
{ APP.
H3C devices can send these types of DCBX information to a server's or disk device's adapter
supporting FCoE, but they cannot accept them.
269
Step Command Remarks
Fundamentals Configuration
Guide.
3. Enter Layer 2 Ethernet interface interface-type
interface view. N/A
interface-number
270
Step Command Remarks
• For the Ethernet frame
header ACL:
rule [ rule-id ] permit type
protocol-type ffff Create rules according to the type
3. Create a rule for the ACL.
• For the IPv4 advanced ACL: of the ACL previously created.
rule [ rule-id ] permit { tcp |
udp } destination-port eq
port
4. Return to system view. quit N/A
5. Create a class, specify the
operator of the class as OR, traffic classifier classifier-name
N/A
and enter class view. operator or
For more information about the acl, rule, traffic classifier, if-match, traffic behavior, remark
dot1p, qos policy, classifier behavior, qos apply policy global, and qos apply policy
commands, see ACL and QoS Command Reference.
271
• Uses ETS parameters to negotiate with the server adapter.
• Controls the server adapter's transmission speed of the specified type of traffic,
• Guarantees that the transmission speed is within the committed bandwidth of the interface.
To configure ETS parameters, you must configure the 802.1p-to-local priority mapping and
group-based WRR queuing.
Configuring the 802.1p-to-local priority mapping
For more information about the qos map-table, qos map-table color, and import commands, see
ACL and QoS Command Reference.
Configuring group-based WRR queuing
You can configure group-based WRR queuing to allocate bandwidth.
To configure group-based WRR queuing:
For more information about the qos wrr, qos wrr byte-count, and qos wrr group sp commands,
see ACL and QoS Command Reference.
272
Configuring PFC parameters
To prevent packets with an 802.1p priority value from being dropped, enable PFC for the 802.1p
priority value. This feature reduces the sending rate of packets carrying this priority when network
congestion occurs.
The device uses PFC parameters to negotiate with the server adapter and to enable PFC for the
specified 802.1p priorities on the server adapter.
To configure PFC parameters:
For more information about the priority-flow-control and priority-flow-control no-drop dot1p
commands, see Interface Command Reference.
3. Configure the DCBX dcbx version { rev100 | rev101 | By default, the DCBX version
version. standard } is not configured. It is
autonegotiated by the local
273
Step Command Remarks
port and peer port.
274
Task Command
display lldp local-information [ global | interface interface-type
Display local LLDP information.
interface-number ]
display lldp neighbor-information [ [ [ interface interface-type
Display the information contained
interface-number ] [ agent { nearest-bridge | nearest-customer |
in the LLDP TLVs sent from
nearest-nontpmr } ] [ verbose ] ] | list [ system-name
neighboring devices.
system-name ] ]
display lldp statistics [ global | [ interface interface-type
Display LLDP statistics. interface-number ] [ agent { nearest-bridge | nearest-customer |
nearest-nontpmr } ] ]
display lldp status [ interface interface-type interface-number ]
Display LLDP status of a port.
[ agent { nearest-bridge | nearest-customer | nearest-nontpmr } ]
Display types of advertisable display lldp tlv-config [ interface interface-type interface-number ]
optional LLDP TLVs. [ agent { nearest-bridge | nearest-customer | nearest-nontpmr } ]
MED
XGE1/0/1
NMS
XGE1/0/2 XGE1/0/1
Switch A Switch B
Configuration procedure
1. Configure Switch A:
# Enable LLDP globally.
<SwitchA> system-view
[SwitchA] lldp global enable
# Enable LLDP on Ten-GigabitEthernet 1/0/1. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] lldp enable
# Set the LLDP operating mode to Rx.
[SwitchA-Ten-GigabitEthernet1/0/1] lldp admin-status rx
275
[SwitchA-Ten-GigabitEthernet1/0/1] quit
# Enable LLDP on Ten-GigabitEthernet 1/0/2. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] lldp enable
# Set the LLDP operating mode to Rx.
[SwitchA-Ten-GigabitEthernet1/0/2] lldp admin-status rx
[SwitchA-Ten-GigabitEthernet1/0/2] quit
2. Configure Switch B:
# Enable LLDP globally.
<SwitchB> system-view
[SwitchB] lldp global enable
# Enable LLDP on Ten-GigabitEthernet 1/0/1. By default, LLDP is enabled on ports.
[SwitchB] interface ten-gigabitethernet 1/0/1
[SwitchB-Ten-GigabitEthernet1/0/1] lldp enable
# Set the LLDP operating mode to Tx.
[SwitchB-Ten-GigabitEthernet1/0/1] lldp admin-status tx
[SwitchB-Ten-GigabitEthernet1/0/1] quit
276
Number of sent optional TLV : 21
Number of received unknown TLV : 0
277
Number of CDP neighbors : 0
Number of sent optional TLV : 16
Number of received unknown TLV : 0
278
MED trap flag : No
Polling interval : 0s
Number of LLDP neighbors : 0
Number of MED neighbors : 0
Number of CDP neighbors : 0
Number of sent optional TLV : 0
Number of received unknown TLV : 0
279
Configuration procedure
1. Configure a voice VLAN on Switch A:
# Create VLAN 2.
<SwitchA> system-view
[SwitchA] vlan 2
[SwitchA-vlan2] quit
# Set the link type of Ten-GigabitEthernet 1/0/1 and Ten-GigabitEthernet 1/0/2 to trunk, and
enable voice VLAN on them.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/1] voice vlan 2 enable
[SwitchA-Ten-GigabitEthernet1/0/1] quit
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-Ten-GigabitEthernet1/0/2] voice vlan 2 enable
[SwitchA-Ten-GigabitEthernet1/0/2] quit
2. Configure CDP-compatible LLDP on Switch A:
# Enable LLDP globally, and enable CDP compatibility globally.
[SwitchA] lldp global enable
[SwitchA] lldp compliance cdp
# Enable LLDP on Ten-GigabitEthernet 1/0/1. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] lldp enable
# Configure LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/1.
[SwitchA-Ten-GigabitEthernet1/0/1] lldp admin-status txrx
# Configure CDP-compatible LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/1.
[SwitchA-Ten-GigabitEthernet1/0/1] lldp compliance admin-status cdp txrx
[SwitchA-Ten-GigabitEthernet1/0/1] quit
# Enable LLDP on Ten-GigabitEthernet 1/0/2. By default, LLDP is enabled on ports.
[SwitchA] interface ten-gigabitethernet 1/0/2
[SwitchA-Ten-GigabitEthernet1/0/2] lldp enable
# Configure LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/2.
[SwitchA-Ten-GigabitEthernet1/0/2] lldp admin-status txrx
# Configure CDP-compatible LLDP to operate in TxRx mode on Ten-GigabitEthernet 1/0/2.
[SwitchA-Ten-GigabitEthernet1/0/2] lldp compliance admin-status cdp txrx
[SwitchA-Ten-GigabitEthernet1/0/2] quit
280
Software version : P0030301MFG2
Platform : Cisco IP Phone 7960
Duplex : Full
NOTE:
In this example, both Switch A and the DC server support DCBX Rev 1.01.
Configuration procedure
1. Enable LLDP and DCBX TLV advertising:
# Enable LLDP globally.
<SwitchA> system-view
[SwitchA] lldp global enable
# Enable LLDP and DCBX TLV advertising on interface Ten-GigabitEthernet 1/0/1.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] lldp enable
[SwitchA-Ten-GigabitEthernet1/0/1] lldp tlv-enable dot1-tlv dcbx
[SwitchA-Ten-GigabitEthernet1/0/1] quit
2. Configure APP parameters:
# Create Ethernet frame header ACL 4000.
[SwitchA] acl number 4000
# Configure ACL 4000 to permit FCoE frames (frame type is 0x8906) and FIP frames (frame
type is 0x8914) to pass through.
[SwitchA-acl-ethernetframe-4000] rule permit type 8906 ffff
[SwitchA-acl-ethernetframe-4000] rule permit type 8914 ffff
281
[SwitchA-acl-ethernetframe-4000] quit
# Create a class named app_c, specify the operator of the class as OR, and use ACL 4000 as
the match criterion of the class.
[SwitchA] traffic classifier app_c operator or
[SwitchA-classifier-app_c] if-match acl 4000
[SwitchA-classifier-app_c] quit
# Create a traffic behavior named app_b, and configure the traffic behavior to mark packets
with 802.1p priority value 3.
[SwitchA] traffic behavior app_b
[SwitchA-behavior-app_b] remark dot1p 3
[SwitchA-behavior-app_b] quit
# Create a QoS policy named plcy, associate class app_c with traffic behavior app_b in the
QoS policy, and apply the association to DCBX.
[SwitchA] qos policy plcy
[SwitchA-qospolicy-plcy] classifier app_c behavior app_b mode dcbx
[SwitchA-qospolicy-plcy] quit
# Apply the policy named plcy to the outgoing traffic of interface Ten-GigabitEthernet 1/0/1.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] qos apply policy plcy outbound
[SwitchA-Ten-GigabitEthernet1/0/1] quit
3. Configure ETS parameters:
# Configure the 802.1p-to-local priority mapping table to map 802.1p priority value 3 to local
precedence 3. (This is the default mapping table. You can modify this configuration as needed.)
[SwitchA] qos map-table dot1p-lp
[SwitchA-maptbl-dot1p-lp] import 3 export 3
[SwitchA-maptbl-dot1p-lp] quit
# Configure the interface Ten-GigabitEthernet 1/0/1 to trust the 802.1p priority carried in
packets.
[SwitchA] interface ten-gigabitethernet 1/0/1
[SwitchA-Ten-GigabitEthernet1/0/1] qos trust dot1p
# Enable byte-count WRR queuing on interface Ten-GigabitEthernet 1/0/1, and configure
queue 3 on the interface to use SP queuing.
[SwitchA-Ten-GigabitEthernet1/0/1] qos wrr byte-count
[SwitchA-Ten-GigabitEthernet1/0/1] qos wrr 3 group sp
4. Enable interface Ten-GigabitEthernet 1/0/1 to automatically negotiate with its peer to decide
whether to enable PFC, and enable PFC for 802.1 priority 3.
[SwitchA-Ten-GigabitEthernet1/0/1] priority-flow-control auto
[SwitchA-Ten-GigabitEthernet1/0/1] priority-flow-control no-drop dot1p 3
282
=================================
DCBX Parameter Type and Length
DCBX Parameter Length: 13
DCBX Parameter Type: 2
283
Priority Group ID of Priority 5: 5
Priority Group ID of Priority 4: 4
The output shows that the DC server will use SP queuing (priority group ID 15) for 802.1p priority 3.
DCBX Parameter Type and Length
284
DCBX Parameter Length: 2
DCBX Parameter Type: 3
285
PFC Enabled on Priority 2: No
PFC Enabled on Priority 3: Yes
PFC Enabled on Priority 4: No
PFC Enabled on Priority 5: No
PFC Enabled on Priority 6: No
PFC Enabled on Priority 7: No
The output shows that the DC server will use PFC for 802.1p priority 3.
286
Configuring service loopback groups
A service loopback group contains one or multiple Ethernet ports for looping packets sent out by the
device back to the device. This feature must work with other features, such as GRE.
A service loopback group provides one of the following services:
• Tunnel—Supports unicast tunnel traffic.
• Multicast tunnel—Supports multicast tunnel traffic.
• Multiport—Supports multiport ARP traffic.
The device supports only one service loopback group for each service type. You can use the service
loopback group with multiple features.
Member ports in the service loopback group are load balanced.
Configuration procedure
Follow these guidelines when you configure the service loopback group:
• Make sure the ports you are assigning to the service loopback group meet the following
requirements:
{ The ports are not used for any other purposes. The configuration on a port is removed when
it is assigned to the service loopback group.
{ The ports support the service type of the service loopback group and are not members of
any other service loopback group.
• You cannot change the service type of a service loopback group.
• For correct traffic processing, follow these guidelines:
{ Make sure the service loopback group has a minimum of one member port when it is being
used by a feature.
{ Do not delete the service loopback group when it is being used by a feature.
To configure a service loopback group:
287
Displaying and maintaining service loopback
groups
Execute display commands in any view.
Task Command
Display information about service loopback groups. display service-loopback group [ number ]
Configuration procedure
# Create service loopback group 1, and specify its service type as tunnel.
<DeviceA> system-view
[DeviceA] service-loopback group 1 type tunnel
# Create the interface Tunnel 1 and set it to GRE mode. The interface will automatically use service
loopback group 1.
[DeviceA] interface tunnel 1 mode gre
[DeviceA-Tunnel1]
288
Configuring cut-through Layer 2
forwarding
A cut-through forwarding-enabled switch forwards a frame after it receives the first 64 bytes of the
frame. This feature reduces the transmission time of a frame within the switch, and enhances
forwarding performance.
To configure cut-through forwarding:
289
Index
Numerics SNMP notification for MAC address table, 33
1\ static source check disable, 32
1 VLAN mappingapplication scenario, 223 advertising
1 VLAN mappingconfiguration, 229, 235 LAN switching LLDP advertisable TLV, 262
1 VLAN mappingimplementation, 225, 226 LAN switching LLDP+DCBX TLV
advertisement, 269
2 VLAN mappingapplication scenario, 225
voice VLAN CDP advertisement
2 VLAN mappingconfiguration, 234, 240
configuration, 190
2 VLAN mappingimplementation, 225, 227
voice VLAN information advertisement to IP
10-GE interface;10-GE interface phones, 183
combine, 2 voice VLAN LLDP advertisement
2\ configuration, 190
2 VLAN mappingapplication scenario, 225 aggregating
2 VLAN mappingconfiguration, 234, 240 link. See Ethernet link aggregation
2 VLAN mappingimplementation, 225, 227 aging
40-GE interface;40-GE interface MAC address table timer, 27
split, 2 spanning tree max age timer, 100
802 algorithm
802.1ah PBB configuration, 243 STP calculation, 81
802.1Q-in-802.1Q. Use QinQ alternate port (MST), 90
QinQ SVLAN tag 802.1p priority, 217 APP parameter (LLDP), 270
VLAN group configuration, 150 ARP
802.x ARP fast update enabling for MAC address
802.1 LLDPDU TLV types, 255 move, 32
802.1p-to-local priority mapping, 272 ARP detection
802.3 LLDPDU TLV types, 255 VLAN M\1 mapping (dynamic IP address
LAN switching LLDP PFC 802.1p priority, 273 assignment), 230
ARP snooping
A
VLAN M\1 mapping (static IP address
accessing assignment), 232
port-based VLAN assignment (access assigning
port), 140 Layer 2 LAN switching port-based VLAN access
ACL port, 140
LAN switching LLDP APP parameter, 270 MAC address table learning priority, 28
action MAC-based VLAN dynamic assignment, 143
loop detection block, 130 MAC-based VLAN server assignment, 145
loop detection no-learning protection, 130 MAC-based VLAN static assignment, 143
loop detection shutdown protection, 130 port to isolation group (multiple), 77
adding port-based VLAN access port (interface
MAC address table blackhole entry, 24 view), 140
MAC address table multiport unicast entry, 24 port-based VLAN access port (VLAN view), 140
address port-based VLAN hybrid port, 142
MAC address learning disable, 26 port-based VLAN trunk port, 141
MAC address move notification, 30 voice VLAN assignment mode, 184
MAC address table address voice VLAN assignment mode (automatic), 184
synchronization, 29 voice VLAN assignment mode (manual), 185
MAC address table learning priority, 28 attribute
MAC Information queue length, 37
290
Ethernet link aggregation attribute LAN switching LLDP agent non-TPMR
configuration, 41 bridge, 253
auto bridging
interface auto power-down (Ethernet), 8 MST common root bridge, 90
loop detection port status auto recovery, 130 MST regional root, 90
voice VLAN assignment (automatic), 184 PBB network model, 243
voice VLAN port operation configuration spanning tree loop guard, 117
(automatic assignment), 188, 192 spanning tree root bridge, 97
AutoMDIX mode (Ethernet interface), 13 spanning tree root bridge (device), 98
B spanning tree root guard, 117
spanning tree secondary root bridge (device), 98
backbone
STP designated bridge, 81
core bridge. See BCB
STP root bridge, 80
edge bridge. See
bulk
MAC address. See B-MACBEB
interface configuration, 19
PBB configuration, 243, 246, 250
interface configuration display, 20
PBB core bridge network model, 243
interface configuration restrictions, 19
PBB edge bridge network model, 243
B-VLAN
service instance identifier. See I-SID
PBB VSI, 247
VLAN. See B-VLAN
backing up C
MST backup port, 90 cable
bandwidth interface cable connection (Layer 2 Ethernet), 13
Ethernet link aggregate interface (expected calculating
bandwidth), 56 MSTI calculation, 92
LAN switching LLDP ETS parameters, 271 MSTP CIST calculation, 92
basic management LLDPDU TLV types, 255 spanning tree port path cost calculation
BFD standard, 103
Ethernet link aggregation group BFD, 57 spanning tree timeout factor, 101
bidirectional STP algorithm, 81
forwarding detection. Use BFD CDP
blackhole entry LAN switching LLDP CDP compatibility, 266
MAC address table, 21, 24 LAN switching LLDP CDP-compatible
block action (loop detection), 130 configuration, 279
boundary port (MST), 90 voice VLAN information advertisement to IP
BPDU phones, 183
MST region max hops, 99 changing
spanning tree BPDU drop, 119 interface to FC interface (Layer 2 Ethernet), 14
spanning tree BPDU guard, 116 checking
spanning tree hello time, 100 spanning tree No Agreement Check, 112, 114
spanning tree max age timer, 100 choosing
spanning tree TC-BPDU guard, 119 Ethernet link aggregation reference port, 42, 44
spanning tree TC-BPDU transmission Cisco
restriction, 118 LAN switching LLDP CDP compatibility, 266
STP BPDU forwarding, 86 LAN switching LLDP configuration
transmission rate configuration, 102 (CDP-compatible), 279
bridge CIST
LAN switching LLDP agent customer calculation, 92
bridge, 253 network device connection, 90
LAN switching LLDP agent nearest spanning tree max age timer, 100
bridge, 253 combining
291
interfaces (Ethernet 10-GE into 40-GE), 2 LAN switching LLDP-MED trapping, 274
common root bridge, 90 Layer 2 cut-through forwarding, 289
configuring Layer 2 Ethernet interface, 11
Ethernet aggregate interface, 53 Layer 2 Ethernet link aggregation (dynamic), 66
Ethernet link aggregation, 40, 47, 64 Layer 2 Ethernet link aggregation (static), 64
Ethernet link aggregation edge aggregate Layer 2 Ethernet link aggregation edge aggregate
interface, 57 interface, 71
Ethernet link aggregation group, 48 Layer 2 Ethernet link aggregation group
Ethernet link aggregation group (dynamic), 50 (dynamic), 50
Ethernet link aggregation group (static), 49 Layer 2 Ethernet link aggregation group
Ethernet link aggregation group BFD, 57 (static), 49
Ethernet link aggregation group load sharing Layer 2 Ethernet link aggregation load sharing, 68
mode, 59 Layer 3 Ethernet link aggregation (dynamic), 73
Ethernet link aggregation load sharing, 59 Layer 3 Ethernet link aggregation (static), 72
Ethernet link aggregation load sharing mode Layer 3 Ethernet link aggregation edge aggregate
(global), 60 interface, 74
Ethernet link aggregation load sharing mode Layer 3 Ethernet link aggregation group
(group-specific), 60 (dynamic), 52
interface (Ethernet), 1 Layer 3 Ethernet link aggregation group
interface (inloopback), 18 (static), 49
interface (Layer 3 Ethernet), 15 loop detection, 129, 131, 133
interface (loopback), 17 loop detection protection action, 132
interface (null), 17 loop detection protection action (global), 132
interface basic settings (Ethernet), 3 loop detection protection action (Layer 2
aggregate interface), 132
interface common settings (Ethernet), 1
loop detection protection action (Layer 2 Ethernet
interface generic flow control (Ethernet), 6
interface), 132
interface jumbo frame support (Ethernet), 4
MAC address table, 21, 22, 34
interface link mode (Ethernet), 4
MAC address table entry, 23
interface PFC (Ethernet), 7
MAC address table unknown frame forwarding
interface physical state change suppression rule, 28
(Ethernet), 4
MAC change notification interval, 37
interface storm control (Layer 2 Ethernet), 11
MAC Information, 36, 37
IP subnet-based VLAN, 148, 154
MAC Information mode, 36
LAN switching LLDP, 253, 259, 275
MAC Information queue length, 37
LAN switching LLDP (CDP-compatible), 279
MAC-based VLAN, 143, 152
LAN switching LLDP 802.1p-to-local priority
MAC-based VLAN dynamic assignment, 147
mapping, 272
MAC-based VLAN server assignment, 147
LAN switching LLDP advertisable TLVs, 262
MAC-based VLAN static assignment, 146
LAN switching LLDP APP parameter, 270
management interface, 1
LAN switching LLDP basics, 259, 275
MST region, 97
LAN switching LLDP bridge mode, 260
MST region max hops, 99
LAN switching LLDP CDP compatibility, 266
MSTP, 95, 121
LAN switching LLDP DCBX, 268, 281
MVRP, 196, 199, 202
LAN switching LLDP ETS parameter, 271
MVRP registration mode, 201
LAN switching LLDP group-based WRR
queuing, 272 MVRP timer, 201
LAN switching LLDP management PBB, 243, 246, 250
address, 264 PBB data encapsulation type, 249
LAN switching LLDP management address PBB downlink port, 248
encoding format, 264 PBB uplink port, 247
LAN switching LLDP PFC parameter, 273 PBB VSI B-VLAN, 247
LAN switching LLDP trapping, 274 port isolation, 77
292
port isolation (multiple isolation groups), 78 VLAN mapping, 223, 228, 235
port-based VLAN, 139, 151 VLAN mapping (1\1), 229, 235
private VLAN, 165, 166, 168 VLAN mapping (1\2), 234, 240
private VLAN promiscuous port, 168 VLAN mapping (2\2), 234, 240
private VLAN trunk promiscuous port, 171 VLAN mapping (M\1), 229, 235
private VLAN trunk promiscuous+trunk VLAN mapping (M\1) (static IP address
secondary port, 174 assignment), 232
protocol-based VLAN, 149, 156 VLAN mapping (M\1)(dynamic IP address
PVST, 94, 125 assignment), 230
QinQ, 213, 219 VLAN mapping M\1 customer-side port (dynamic
QinQ basics, 219 IP address assignment), 231
QinQ CVLAN tag TPID value, 217 VLAN mapping M\1 customer-side port (static IP
address assignment), 233
QinQ SVLAN tag TPID value, 217
VLAN mapping M\1 network-side port (dynamic
QinQ VLAN tag TPID value, 216
IP address assignment), 231
QinQ VLAN transparent
VLAN mapping M\1 network-side port (static IP
transmission, 215, 221
address assignment), 233
RSTP, 94
voice VLAN, 182, 192
secondary VLAN Layer 3 communication, 179
voice VLAN CDP advertisement, 190
service loopback group, 287, 287, 288
voice VLAN LLDP advertisement, 190
spanning tree, 80, 92, 121
voice VLAN port operation (automatic
spanning tree BPDU transmission rate, 102 assignment), 188, 192
spanning tree device priority, 99 voice VLAN port operation (manual
spanning tree Digest Snooping, 110, 111 assignment), 189, 194
spanning tree edge port, 102 voice VLAN QoS priority settings, 187
spanning tree No Agreement Check, 112, 114 connecting
spanning tree port link type, 107 interface cable connection (Layer 2 Ethernet), 13
spanning tree port mode, 107 voice VLAN host+IP phone connection (in
spanning tree port path cost, 103, 105 series), 184
spanning tree port priority, 106 voice VLAN IP phone connection (device), 184
spanning tree port role restriction, 118 Converged Enhanced Ethernet. Use CEE
spanning tree protection functions, 115 CoS
spanning tree root bridge, 97 voice VLAN QoS priority setting
spanning tree root bridge (device), 98 configuration, 187
spanning tree secondary root bridge, 97 cost
spanning tree secondary root bridge spanning tree port path cost calculation
(device), 98 standard, 103
spanning tree switched network diameter, 100 spanning tree port path cost
spanning tree TC Snooping, 114 configuration, 103, 105
spanning tree TC-BPDU transmission STP path cost, 81
restriction, 118 creating
spanning tree timeout factor, 101 PBB VSI, 247
spanning tree timer, 100 super VLAN sub-VLAN, 160
storm suppression, 10 CST
STP, 93 MST region connection, 89
subinterface (Layer 3 Ethernet), 15 customer
super VLAN, 160, 160, 162 LAN switching LLDP customer bridge mode, 260
super VLAN interface, 161 cut-through Layer 2 forwarding, 289
VLAN, 136, 151 CVLAN
VLAN basic settings, 137 QinQ basic configuration, 219
VLAN group, 150 QinQ configuration, 213, 219
VLAN interface basics, 138
293
QinQ VLAN transparent transmission spanning tree loop guard, 117
configuration, 221 spanning tree No Agreement Check, 112, 114
VLAN mapping configuration, 223, 228, 235 spanning tree port role restriction, 118
VLAN mapping implementation, 225 spanning tree priority, 99
D spanning tree protection functions, 115
spanning tree root guard, 117
data
spanning tree SNMP notification (new-root
PBB data encapsulation, 249
election, topology change events), 120
Data Center
spanning tree TC Snooping, 114
Bridging Exchange Protocol. Use DCBX
spanning tree TC-BPDU guard, 119
Ethernet. Use DCE
spanning tree TC-BPDU transmission
DCBX restriction, 118
configuration, 268, 281 voice VLAN IP phone connection, 184
LAN switching LLDP APP parameter DHCP snooping
configuration, 270
VLAN M\1 mapping (dynamic IP address
LAN switching LLDP ETS parameter assignment), 230
configuration, 271
Digest Snooping (spanning tree), 110, 111
LAN switching LLDP PFC parameter
disabling
configuration, 273
LLDP PVID inconsistency check, 266
LAN switching LLDP+DCBX TLV
advertisement, 269 MAC address learning, 26
default static source check, 32
Ethernet link aggregate interface default discarding
settings, 58 MST discarding port state, 91
designated displaying
MST port, 90 bulk interface configuration, 20
STP bridge, 81 Ethernet link aggregation, 63
STP port, 81 interface, 18
detecting interface (Ethernet), 15
Ethernet link aggregation group BFD, 57 LAN switching LLDP, 274
device loop detection, 133
disabling the device to reactivate the MAC address table, 33
shutdown edge ports, 120 MVRP, 202
interface configuration (Ethernet), 1 PBB, 250
LAN switching LLDP basic port isolation, 77
configuration, 259, 275 private VLAN, 168
LAN switching LLDP CDP compatibility, 266 QinQ, 219
LAN switching LLDP service loopback group, 288
configuration, 253, 259, 275 spanning tree, 121
LAN switching LLDP configuration super VLAN, 161
(CDP-compatible), 279
VLAN, 150
LAN switching LLDP DCBX
VLAN mapping, 235
configuration, 268, 281, 281
voice VLAN, 191
LAN switching LLDP parameters, 265
dot1d-1998 (STP port path cost calculation), 103
Layer 2 cut-through forwarding
configuration, 289 dot1s (STP port mode), 107
loop protection actions, 130 dot1t (STP port path cost calculation), 103
MSTP implementation, 92 downlink port
MVRP configuration, 196, 199, 202 PBB configuration, 248
spanning tree BPDU drop, 119 DSCP
spanning tree BPDU guard, 116 voice VLAN QoS priority setting
configuration, 187
spanning tree Digest Snooping, 110, 111
dynamic
294
Ethernet link aggregation dynamic mode, 43 spanning tree loop guard, 117
Ethernet link aggregation edge aggregate spanning tree port state transition information
interface, 47 output, 108
Ethernet link aggregation group, 50 spanning tree root guard, 117
Ethernet link aggregation mode, 42 spanning tree SNMP notification (new-root
Layer 2 Ethernet link aggregation, 66 election, topology change events), 120
Layer 2 Ethernet link aggregation edge spanning tree TC-BPDU guard, 119
aggregate interface, 71 VLAN mapping M\1 ARP detection (dynamic IP
Layer 2 Ethernet link aggregation group address assignment), 230
(dynamic), 50 VLAN mapping M\1 ARP snooping (static IP
Layer 3 Ethernet link aggregation, 73 address assignment), 232
Layer 3 Ethernet link aggregation edge VLAN mapping M\1 DHCP snooping (dynamic IP
aggregate interface, 74 address assignment), 230
Layer 3 Ethernet link aggregation group voice VLAN LLDP, 190
(dynamic), 52 encapsulating
MAC address table dynamic aging timer, 27 LAN switching LLDP frame encapsulated in
MAC address table entry, 21 Ethernet II, 254
MAC-based VLAN dynamic LAN switching LLDP frame encapsulated in
assignment, 143, 147 SNAP format, 254
LAN switching LLDP frame encapsulation
E
format, 265
edge port PBB data encapsulation, 249
MST, 90 VLAN frame encapsulation, 136
spanning tree, 102 Energy Efficient Ethernet. See EEE
EEE energy saving, 8 energy-saving features, 8
enabling entry
ARP fast update for MAC address move, 32 ARP fast update enabling for MAC address
BPDU guard on an interface, 116 move, 32
Ethernet link aggregation traffic redirection, 62 Ethernet
global BPDU guard, 116 interface. See Ethernet interface
interface auto power-down (Ethernet), 8 LAN switching LLDP APP parameters, 270
interface bridging (Ethernet), 14 LAN switching LLDP DCBX
interface EEE energy saving, 8 configuration, 268, 281
interface energy-saving features (Ethernet), 8 LAN switching LLDP ETS parameters, 271
LAN switching LLDP, 259 LAN switching LLDP frame encapsulated in
LAN switching LLDP polling, 262 Ethernet II, 254
LAN switching LLDP+DCBX TLV LAN switching LLDP group-based WRR
advertisement, 269 queuing, 272
loop detection, 131 LAN switching LLDP PFC parameters, 273
loop detection (global), 131 LAN switching LLDP trapping, 274
loop detection (port-specific), 131 LAN switching LLDP+DCBX TLV
advertisement, 269
MAC address move notification, 30
LAN switching LLDP-MED trapping, 274
MAC address synchronization, 29
link aggregation. See Ethernet link aggregation
MAC Information, 36
loop detection configuration, 129, 133
MVRP, 200
MAC address table configuration, 21, 22, 34
MVRP GVRP compatibility, 202
MAC Information configuration, 36, 37
PBB L2VPN, 247
PBB data encapsulation, 249
QinQ, 215
port isolation configuration, 77
SNMP notification for MAC address table, 33
port isolation configuration (multiple isolation
spanning tree BPDU drop, 119
groups), 78
spanning tree BPDU guard, 116
port-based VLAN assignment (access port), 140
spanning tree feature, 108
295
port-based VLAN assignment (hybrid physical state change suppression, 4
port), 142 statistics polling interval, 9
port-based VLAN assignment (trunk port), 141 storm control restrictions (Layer 2), 6
port-based VLAN configuration, 139 storm suppression, 10
private VLAN configuration, 165, 166, 168 storm suppression restrictions (Layer 2), 6
private VLAN promiscuous port Ethernet link aggregation
configuration, 168 aggregate group Selected ports min/max, 55
private VLAN trunk promiscuous port aggregate interface, 40
configuration, 171
aggregate interface (description), 53
private VLAN trunk promiscuous+trunk
aggregate interface configuration, 53
secondary port configuration, 174
aggregate interface default settings, 58
QinQ CVLAN frame header tag, 213
aggregate interface shutdown, 58
QinQ SVLAN frame header tag, 213
aggregation group, 40
secondary VLAN Layer 3 communication, 179
aggregation group restrictions, 48
service loopback group
configuration, 287, 287, 288 basic concepts, 40
subinterface. See Ethernet interface, Ethernet configuration, 40, 47, 64
subinterface, subinterface configuration types, 41
super VLAN configuration, 160, 160, 162 display, 63
super VLAN sub-VLAN creation, 160 dynamic mode, 43
VLAN basic configuration, 137 edge aggregate interface, 47, 57
VLAN configuration, 136, 151 group configuration, 48
VLAN frame encapsulation, 136 group configuration (dynamic), 50
VLAN interface basics, 138 group configuration (static), 49
VLAN port-based configuration, 151 group load sharing mode, 59
voice VLAN configuration, 182, 192 how dynamic link aggregation works, 44
Ethernet interface interface configuration (expected bandwidth), 56
10-GE into 40-GE interface combine;10-GE LACP, 43
into 40-GE interface combine, 2 Layer 2 aggregate interface (ignored
40-GE interface split;40-GE interface split, 2 VLAN), 54, 54
auto power-down enable, 8 Layer 2 aggregation (dynamic), 66
basic settings configuration, 3 Layer 2 aggregation (static), 64
bridging, 14 Layer 2 aggregation load sharing, 68
common settings configuration, 1 Layer 2 edge aggregate interface, 71
configuration, 1 Layer 2 group (dynamic), 50
dampening restrictions, 6 Layer 2 group (static), 49
displaying, 15 Layer 3 aggregate interface configuration
EEE energy saving enable, 8 (MTU), 54
energy-saving features, 8 Layer 3 aggregation (dynamic), 73
fiber port restrictions (Layer 2), 6 Layer 3 aggregation (static), 72
generic flow control, 6 Layer 3 edge aggregate interface, 74
interface change to FC interface (Layer 2), 14 Layer 3 group (dynamic), 52
jumbo frame support configuration, 4 Layer 3 group (static), 49
link mode, 4 load sharing configuration, 59
loopback test, 5 load sharing mode, 47
loopback test restrictions, 6 local-first load sharing, 60
maintaining, 15 maintain, 63
management interface configuration, 1 management VLAN+management port, 59
naming conventions, 1 member port, 40
PFC configuration, 7 member port state, 41, 42, 45
PFC configuration restrictions, 6 modes, 42
operational key, 41
296
per-flow load sharing algorithm settings, 61 MAC address table blackhole entry, 24
reference port, 44 MAC address table configuration, 21, 22, 34
reference port choice, 42 MAC address table entry configuration, 23
static mode, 42 MAC address table multiport unicast entry, 24
traffic redirection, 62 MAC address table unknown frame forwarding
traffic redirection restrictions, 62 rule, 28
Ethernet link aggregation group MAC Information configuration, 36, 37
BFD configuration, 57 port-based VLAN frame handling, 139
Ethernet subinterface, 1, See also Ethernet QinQ CVLAN Ethernet frame header tag, 213
interface, Layer 2 Ethernet subinterface, Layer 3 QinQ implementation, 214
Ethernet subinterface QinQ SVLAN Ethernet frame header tag, 213
ETS parameter (LLDP), 271 VLAN frame encapsulation, 136
external
G
interface external loopback test (Ethernet), 5
GARP
F
VLAN Registration Protocol. Use GVRP
FCoE generic flow control (Ethernet interface), 6
LAN switching LLDP APP parameters, 270 Generic VLAN Registration Protocol. Use GVRP
LAN switching LLDP DCBX configuration, 281 group
flow control Ethernet link aggregate group Selected ports
interface generic flow control (Ethernet), 6 min/max, 55
interface PFC (Ethernet), 7 Ethernet link aggregation, 48
forcing Ethernet link aggregation group, 40
interface fiber port (Layer 2 Ethernet), 9 Ethernet link aggregation group (dynamic), 50
format Ethernet link aggregation group (static), 49
LAN switching LLDP frame encapsulated in Ethernet link aggregation LACP, 43
Ethernet II, 254 Ethernet link aggregation load sharing, 59
LAN switching LLDP frame encapsulated in Ethernet link aggregation load sharing
SNAP format, 254 mode, 47, 59
LAN switching LLDP frame encapsulation Ethernet link aggregation member port state, 41
format, 265 Layer 2 Ethernet link aggregation group
LAN switching LLDP management address (dynamic), 50
encoding format, 264 Layer 2 Ethernet link aggregation group
PBB frame format, 244 (static), 49
forwarding Layer 3 Ethernet link aggregation group
Layer 2 cut-through forwarding (dynamic), 52
configuration, 289 Layer 3 Ethernet link aggregation group
MAC address table unknown frame (static), 49
forwarding rule, 28 VLAN group configuration, 150
MST forwarding port state, 91 GVRP
spanning tree forward delay timer, 100 MVRP compatibility, 202
STP BPDU forwarding, 86
H
STP forward delay timer, 86
frame hello
interface jumbo frame support (Ethernet), 4 spanning tree timer, 100
Layer 2 cut-through forwarding STP timer, 86
configuration, 289 host
loop detection, 129 voice VLAN host+IP phone connection (in
loop detection (Ethernet frame header), 129 series), 184
loop detection (inner frame header), 129 voice VLAN IP phone connection (device), 184
loop detection interval, 130 hybrid port
MAC address learning, 21 port-based VLAN assignment (hybrid port), 142
297
I voice VLAN IP phone connection (device), 184
identifying IP subnet-based VLAN
voice VLAN IP phone identification method configuration, 148, 154
(LLDP), 183 isolating
voice VLAN IP phone identification method ports. See port isolation
(OUI address), 182 IST
ignored VLAN MST region, 90
Layer 2 aggregate interface, 54 J
implementing
jumbo frame support (Ethernet interface), 4
1\1 VLAN mapping, 225, 226
1\2 VLAN mapping, 225, 227 K
2\2 VLAN mapping, 225, 227 key
M\1 VLAN mapping, 225, 226 Ethernet link aggregation operational key, 41
MSTP device implementation, 92
L
QinQ, 214
inloopback interface L2VPN
configuration, 18 PBB enable, 247
display, 18 LACP
maintain, 18 Ethernet link aggregation, 43
interface LAN switching
bulk configuration, 19 displaying LLDP, 274
configuration (inloopback), 17, 18 Ethernet aggregate interface, 53
configuration (loopback), 17, 17 Ethernet aggregate interface (description), 53
configuration (null), 17, 17 Ethernet aggregate interface (ignored VLAN), 54
Ethernet aggregate interface, 53 Ethernet link aggregate group Selected ports
min/max, 55
Ethernet aggregate interface (description), 53
Ethernet link aggregate interface (expected
Ethernet link aggregate interface default
settings, 58 bandwidth), 56
Ethernet link aggregate interface Ethernet link aggregate interface default
shutdown, 58 settings, 58
Ethernet link aggregation edge aggregate Ethernet link aggregate interface shutdown, 58
interface, 47, 57 Ethernet link aggregation (dynamic), 66
Layer 2 Ethernet aggregate interface (ignored Ethernet link aggregation (static), 64
VLAN), 54 Ethernet link aggregation basic concepts, 40
Layer 3 aggregate interface configuration Ethernet link aggregation configuration, 40, 47, 64
(MTU), 54 Ethernet link aggregation display, 63
internal Ethernet link aggregation dynamic mode, 43
interface internal loopback test (Ethernet), 5 Ethernet link aggregation edge aggregate
interval interface, 47, 57, 71
loop detection, 130, 132 Ethernet link aggregation group, 48
MAC change notification interval, 37 Ethernet link aggregation group (dynamic), 50, 50
IP addressing Ethernet link aggregation group (static), 49
voice VLAN configuration, 182, 192 Ethernet link aggregation group load sharing
IP phone mode, 59
voice VLAN host+IP phone connection (in Ethernet link aggregation LACP, 43
series), 184 Ethernet link aggregation load sharing, 59, 68
voice VLAN identification method (LLDP), 183 Ethernet link aggregation load sharing mode, 47
voice VLAN identification method (OUI Ethernet link aggregation local-first load
address), 182 sharing, 60
voice VLAN information advertisement, 183 Ethernet link aggregation maintain, 63
voice VLAN IP phone access method, 184 Ethernet link aggregation static mode, 42
298
Ethernet link aggregation traffic redirection, 62 private VLAN trunk promiscuous port
IP subnet-based VLAN configuration, 171
configuration, 148, 154 private VLAN trunk promiscuous+trunk
LLDP basic concepts, 253 secondary port configuration, 174
LLDP basic configuration, 259, 275 protocol-based VLAN configuration, 149, 156
LLDP CDP compatibility, 266 QinQ basic configuration, 219
LLDP configuration, 253, 259, 275 QinQ configuration, 213, 219
LLDP configuration (CDP-compatible), 279 QinQ configuration restrictions, 215
LLDP DCBX configuration, 281 QinQ CVLAN tag TPID value, 217
MAC-based VLAN configuration, 143, 152 QinQ implementation, 214
MAC-based VLAN dynamic QinQ protocols and standards, 214
assignment, 143, 147 QinQ SVLAN tag 802.1p priority, 217
MAC-based VLAN server QinQ SVLAN tag TPID value, 217
assignment, 145, 147 QinQ VLAN tag TPID value, 216
MAC-based VLAN static QinQ VLAN transparent transmission
assignment, 143, 146 configuration, 221
MRP implementation, 196 secondary VLAN Layer 3 communication, 179
MVRP configuration, 196, 199, 202 service loopback group
MVRP display, 202 configuration, 287, 287, 288
MVRP GVRP compatibility, 202 service loopback group display, 288
MVRP maintain, 202 super VLAN configuration, 160, 160, 162
MVRP protocols and standards, 199 super VLAN display, 161
MVRP registration mode configuration, 201 super VLAN interface configuration, 161
MVRP timer configuration, 201 super VLAN sub-VLAN creation, 160
PBB configuration, 243, 246, 250 troubleshooting PBB, 252
PBB data encapsulation type troubleshooting PBB customer frames cannot be
configuration, 249 transmitted, 252
PBB display, 250 VLAN basic configuration, 137
PBB downlink port, 248 VLAN configuration, 136, 151
PBB frame format, 244 VLAN display, 150
PBB frame forwarding, 246 VLAN group configuration, 150
PBB L2VPN enable, 247 VLAN interface basics, 138
PBB maintain, 250 VLAN maintain, 150
PBB protocols and standards, 246 VLAN port-based configuration, 151
PBB uplink port, 247 VLAN protocols and standards, 137
PBB VSI B-VLAN configuration, 247 voice VLAN CDP advertisement
PBB VSI creation, 247 configuration, 190
port isolation configuration, 77 voice VLAN display, 191
port isolation configuration (multiple isolation voice VLAN LLDP advertisement
groups), 78 configuration, 190
port isolation display, 77 voice VLAN LLDP enable, 190
port isolation group assignment (multiple), 77 voice VLAN LLDP enable restrictions, 190
port-based VLAN assignment (access voice VLAN port operation configuration
port), 140 (automatic assignment), 188, 192
port-based VLAN assignment (hybrid voice VLAN port operation configuration (manual
port), 142 assignment), 189, 194
port-based VLAN assignment (trunk port), 141 voice VLAN port operation configuration
port-based VLAN configuration, 139 restrictions (automatic assignment), 188
private VLAN configuration, 166, 168 voice VLAN port operation configuration
restrictions (manual assignment), 189
private VLAN display, 168
Layer 2
private VLAN promiscuous port
configuration, 168 interface configuration (Ethernet), 1, 11
299
interface FC interface change (Ethernet), 14 Ethernet link aggregate interface default
LAN switching LLDP basic configuration, 275 settings, 58
LAN switching LLDP configuration, 275 Ethernet link aggregate interface shutdown, 58
LAN switching LLDP group-based WRR Ethernet link aggregation (dynamic), 73
queuing, 272 Ethernet link aggregation (static), 72
LAN switching LLDP trapping, 274 Ethernet link aggregation configuration, 40, 47, 64
LAN switching LLDP+DCBX TLV Ethernet link aggregation edge aggregate
advertisement, 269 interface, 47, 57, 74
LAN switching LLDP-MED trapping, 274 Ethernet link aggregation group, 48
loop detection configuration, 129, 131, 133 Ethernet link aggregation group (dynamic), 50, 52
PBB configuration, 243, 246, 250 Ethernet link aggregation group (static), 49, 49
PBB data encapsulation type Ethernet link aggregation group load sharing
configuration, 249 mode, 59
PBB downlink port, 248 Ethernet link aggregation load sharing, 59
PBB frame format, 244 Ethernet link aggregation local-first load
PBB frame forwarding, 246 sharing, 60
PBB L2VPN enable, 247 Ethernet link aggregation traffic redirection, 62
PBB uplink port, 247 interface configuration (Ethernet), 1
PBB VSI B-VLAN configuration, 247 interface configuration (Layer 3), 15
PBB VSI creation, 247 IP subnet-based VLAN configuration, 148, 154
voice VLAN configuration, 182, 192 LAN switching LAN switching VLAN interface
Layer 2 Ethernet interface basics, 138
cable connection, 13 LAN switching LLDP basic configuration, 275
fiber port, 9 LAN switching LLDP configuration, 275
interface connection distance setting, 15 LAN switching LLDP trapping, 274
MDIX mode, 13 LAN switching LLDP-MED trapping, 274
storm control configuration, 11 MAC-based VLAN configuration, 152
Layer 2 LAN switching port-based VLAN assignment (access port), 140
cut-through forwarding configuration, 289 port-based VLAN assignment (hybrid port), 142
displaying spanning tree, 121 port-based VLAN assignment (trunk port), 141
Ethernet link aggregation group (static), 49 port-based VLAN configuration, 139
maintaining spanning tree, 121 private VLAN configuration, 168
MST region, 97 private VLAN promiscuous port configuration, 168
MSTP configuration, 121 private VLAN trunk promiscuous port
configuration, 171
private VLAN configuration, 165
private VLAN trunk promiscuous+trunk
PVST configuration, 125
secondary port configuration, 174
spanning tree configuration, 80, 121
protocol-based VLAN configuration, 149, 156
spanning tree Digest Snooping, 110, 111
secondary VLAN Layer 3 communication, 179
VLAN mapping configuration, 223, 228, 235
subinterface configuration (Ethernet), 15
VLAN mapping configuration (1\1), 229, 235
subinterface MTU setting (Layer 3 Ethernet), 15
VLAN mapping configuration (1\2), 234, 240
super VLAN configuration, 162
VLAN mapping configuration (2\2), 234, 240
VLAN configuration, 151
VLAN mapping configuration (M\1), 229, 235
VLAN port-based configuration, 151
Layer 3
voice VLAN configuration, 182, 192
aggregate interface configuration (MTU), 54
Layer 3 Ethernet interface
Ethernet aggregate interface, 53
MTU setting, 15
Ethernet aggregate interface (description), 53
learning
Ethernet link aggregate group Selected ports
loop detection no-learning action, 130
min/max, 55
MAC address, 21
Ethernet link aggregate interface (expected
bandwidth), 56 MAC address learning disable, 26
300
MAC address table learning priority, 28 parameter set, 265
MST learning port state, 91 PFC parameter configuration, 273
legacy polling enable, 262
spanning tree port mode, 107 protocols and standards, 259
spanning tree port path cost calculation, 103 reinitialization delay, 261
link trapping configuration, 274
aggregation. See Ethernet link aggregation voice VLAN CDP advertisement
Ethernet link aggregation group BFD, 57 configuration, 190
interface link mode (Ethernet), 4 voice VLAN information advertisement to IP
link layer discovery protocol. Use LLDP phones, 183
MSTP configuration, 121 voice VLAN IP phone identification
method, 182, 183
PVST configuration, 125
voice VLAN LLDP advertisement
spanning tree configuration, 80, 92, 121
configuration, 190
spanning tree hello time, 100
voice VLAN LLDP enable, 190
spanning tree port link type configuration, 107
LLDP frame
LLDP
encapsulated in Ethernet II format, 254
802.1p-to-local priority mapping, 272
encapsulated in SNAP format, 254
advertisable TLV configuration, 262
encapsulation format, 265
agent, 253
receiving, 259
APP parameter configuration, 270
transmitting, 258
basic concepts, 253
LLDPDU
basic configuration, 259, 275
LAN switching LLDP basic configuration, 275
bridge mode configuration, 260
LAN switching LLDP configuration, 259, 275
CDP compatibility configuration, 266
LLDP basic configuration, 259
CDP-compatible configuration, 279
LLDP configuration, 253
configuration, 253, 259, 275
LLDP parameters, 265
DCBX configuration, 268, 281
management address configuration, 264
disabling PVID inconsistency check, 266
management address encoding format, 264
displaying, 274
management address TLV, 258
enable, 259
TLV basic management types, 255
ETS parameter configuration, 271
TLV LLDP-MED types, 255
group-based WRR queuing, 272
TLV organization-specific types, 255
how it works, 258
load balancing
LAN switching LLDP+DCBX TLV
service loopback group
advertisement, 269
configuration, 287, 287, 288
LAN switching LLDP-MED trapping
load sharing
configuration, 274
Ethernet link aggregation configuration, 59
LLDP frame encapsulation format, 265
Ethernet link aggregation group load sharing, 47
LLDP frame format, 254
Ethernet link aggregation load sharing mode, 59
LLDP frame reception, 259
Ethernet link aggregation load sharing mode for
LLDP frame transmission, 258
MAC-in-MAC traffic (global), 62
LLDPDU management address TLV, 258
Ethernet link aggregation local-first load
LLDPDU TLV types, 255 sharing, 60
LLDPDU TLVs, 255 Ethernet link aggregation packet type-based load
management address configuration, 264 sharing, 47
management address encoding format, 264 Ethernet link aggregation per-flow load
operating mode (disable), 258 sharing, 47
operating mode (Rx), 258 Ethernet link aggregation per-flow load sharing
operating mode (Tx), 258 algorithm settings, 61
operating mode (TxRx), 258 Ethernet link aggregation per-packet load
operating mode set, 261 sharing, 47
301
Layer 2 Ethernet link aggregation 1 VLAN mappingcustomer-side port (static IP
configuration, 68 address assignment), 233
local 1 VLAN mappingDHCP snooping (dynamic IP
Ethernet link aggregation local-first load address assignment), 230
sharing, 60 1 VLAN mappingimplementation, 225, 226
Ethernet link aggregation per-flow load 1 VLAN mappingnetwork-side port (dynamic IP
sharing algorithm settings, 61 address assignment), 231
logging 1 VLAN mappingnetwork-side port (static IP
loop detection configuration, 129, 131, 133 address assignment), 233
loop MAC
MSTP configuration, 121 PBB configuration, 246, 250
PVST configuration, 125 MAC address move
spanning tree configuration, 80, 92, 121 ARP fast update enabling, 32
spanning tree loop guard, 117 MAC address table
loop detection address learning, 21
configuration, 129, 131, 133 address synchronization, 29
displaying, 133 blackhole entry, 24
enable, 131 configuration, 21, 22, 34
enable (global), 131 displaying, 33
enable (port-specific), 131 dynamic aging timer, 27
interval, 130 enabling SNMP notification, 33
interval setting, 132 entry configuration, 23
mechanisms, 129 entry creation, 21
port status auto recovery, 130 entry types, 21
protection action configuration, 132 learning priority assignment, 28
protection action configuration (global), 132 MAC address learning disable, 26
protection action configuration (Layer 2 MAC address move notification, 30
aggregate interface), 132 manual entries, 21
protection action configuration (Layer 2 multiport unicast entry, 24
Ethernet interface), 132 static source check disable, 32
protection actions, 130 unknown frame forwarding rule, 28
loopback MAC address table learning limit on interface
interface loopback test (Ethernet), 5 set, 27
loopback interface MAC addressing
configuration, 17 MAC-based VLAN configuration, 143
display, 18 MAC-based VLAN dynamic assignment, 143, 147
maintain, 18 MAC-based VLAN server assignment, 145, 147
M MAC-based VLAN static assignment, 143, 146
VLAN frame encapsulation, 136
M\
MAC Information
1 VLAN mappingapplication scenario, 223
change notification interval, 37
1 VLAN mappingARP detection (dynamic IP
address assignment), 230 configuration, 36, 37
1 VLAN mappingARP snooping (static IP enable, 36
address assignment), 232 mode configuration, 36
1 VLAN mappingconfiguration, 229, 235 queue length configuration, 37
1 VLAN mappingconfiguration (dynamic IP MAC relay (LLDP agent), 253
address assignment), 230 MAC-based VLAN
1 VLAN mappingconfiguration (static IP configuration, 143, 152
address assignment), 232 dynamic assignment, 143, 147
1 VLAN mappingcustomer-side port (dynamic dynamic assignment restrictions, 146
IP address assignment), 231 server assignment, 145, 147
302
static assignment, 143, 146 interface Auto MDIX mode (Layer 2 Ethernet), 13
MAC-in-MAC interface link mode (Ethernet), 4
Ethernet link aggregation group load sharing interface MDI mode (Layer 2 Ethernet), 13
mode for MAC-in-MAC traffic, 62 interface MDIX mode (Layer 2 Ethernet), 13
PBB configuration, 243 LAN switching LLDP customer bridge mode, 260
maintaining LAN switching LLDP disable, 258, 261
Ethernet link aggregation, 63 LAN switching LLDP Rx, 258, 261
interface, 18 LAN switching LLDP service bridge mode, 260
interface (Ethernet), 15 LAN switching LLDP Tx, 258, 261
MVRP, 202 LAN switching LLDP TxRx, 258, 261
PBB, 250 MAC Information syslog, 36
spanning tree, 121 MAC Information trap, 36
VLAN, 150 MVRP registration, 201
management address MVRP registration fixed, 199
LAN switching LLDP encoding format, 264 MVRP registration forbidden, 199
manual MVRP registration normal, 199
voice VLAN assignment mode, 185 spanning tree mCheck, 109
voice VLAN port operation spanning tree MSTP, 96
configuration, 189, 194 spanning tree PVST, 96
mapping spanning tree RSTP, 96
1\1 VLAN mapping, 223 spanning tree STP, 96
1\2 VLAN mapping, 225 voice VLAN assignment, 184
2\2 VLAN mapping, 225 voice VLAN assignment (automatic), 184
M\1 VLAN mapping, 223 voice VLAN assignment (manual), 185
MSTP VLAN-to-instance mapping table, 89 voice VLAN port normal, 186
master voice VLAN port security, 186
MSTP master port, 90 modifying
max age timer (STP), 86 MAC address table blackhole entry, 24
maximum transmission unit. Use MTU MAC address table multiport unicast entry, 24
mCheck MRP
spanning tree, 109 implementation, 196
MDI mode (Ethernet interface), 13 messages, 196
MDIX mode (Ethernet interface), 13 MVRP configuration, 196, 199, 202
MED (LLDP-MED trapping), 274 timers, 198
message MST
MRP JoinEmpty, 196 region max hops, 99
MRP JoinIn, 196 MSTI
MRP Leave, 196 calculation, 92
MRP LeaveAll, 196 MRP, 196
MRP New, 196 MST instance, 89
MRP timers, 198 MSTP, 80, See also STP
MIB basic concepts, 88
LAN switching LLDP basic CIST, 90
configuration, 259, 275
CIST calculation, 92
LAN switching LLDP
common root bridge, 90
configuration, 253, 259, 275
configuration, 95, 121
mode
CST, 89
Ethernet link aggregation dynamic, 42, 43
device implementation, 92
Ethernet link aggregation load sharing, 47
feature enable, 109
Ethernet link aggregation static, 42, 42
features, 88
303
how it works, 91 Ethernet link aggregation reference port, 44
IST, 90 Ethernet link aggregation reference port
mode set, 96 choice, 42
MST region, 89 Ethernet link aggregation static mode, 42
MST region configuration, 97 interface auto power-down (Ethernet), 8
MSTI, 89 interface basic settings (Ethernet), 3
MSTI calculation, 92 interface bridging (Ethernet), 14
port roles, 90 interface cable connection (Layer 2 Ethernet), 13
port states, 91 interface common settings configuration
protocols and standards, 92 (Ethernet), 1
regional root, 90 interface configuration (inloopback), 18
relationships, 87 interface configuration (loopback), 17
spanning tree max age timer, 100 interface configuration (null), 17
spanning tree port mode configuration, 107 interface EEE energy saving, 8
VLAN-to-instance mapping table, 89 interface energy-saving features (Ethernet), 8
MTU interface fiber port (Layer 2 Ethernet), 9
Layer 3 Ethernet aggregate interface, 54 interface generic flow control (Ethernet), 6
subinterface MTU setting (Layer 3 interface jumbo frame support (Ethernet), 4
Ethernet), 15 interface link mode (Ethernet), 4
multiple interface loopback test (Ethernet), 5
registration protocol. Use MRP interface MDIX mode (Layer 2 Ethernet), 13
VLAN registration protocol. Use MVRP interface MTU setting (Layer 3 Ethernet), 15
Multiple Spanning Tree Protocol. Use MSTP interface PFC (Ethernet), 7
multiport unicast entry (MAC address table), 21, 24 interface physical state change suppression
MVRP (Ethernet), 4
configuration, 196, 199, 202 interface split (Ethernet 40-GE), 2
configuration restrictions, 199 interface statistics polling interval (Ethernet), 9
display, 202 interface storm control (Layer 2 Ethernet), 11
enable, 200 interfaces combine (Ethernet 10-GE into
40-GE), 2
GVRP compatibility, 202
IP subnet-based VLAN configuration, 148, 154
maintain, 202
LAN switching LLDP basic configuration, 259
MRP implementation, 196
Layer 2 Ethernet interface configuration, 11
protocols and standards, 199
Layer 2 Ethernet link aggregation (dynamic), 66
registration mode configuration, 201
Layer 2 Ethernet link aggregation (static), 64
registration modes, 199
Layer 2 Ethernet link aggregation edge aggregate
timer configuration, 201
interface, 71
N Layer 2 Ethernet link aggregation load sharing, 68
network Layer 3 Ethernet link aggregation (dynamic), 73
disabling the device to reactivate the Layer 3 Ethernet link aggregation (static), 72
shutdown edge ports, 120 Layer 3 Ethernet link aggregation edge aggregate
Ethernet link aggregation configuration interface, 74
types, 41 loop detection interval, 130, 132
Ethernet link aggregation dynamic mode, 43 loop detection protection action configuration, 132
Ethernet link aggregation edge aggregate loop protection actions, 130
interface, 47 MAC address move notification, 30
Ethernet link aggregation LACP, 43 MAC address table address synchronization, 29
Ethernet link aggregation member port MAC address table blackhole entry, 24
state, 42, 45 MAC address table dynamic aging timer, 27
Ethernet link aggregation modes, 42 MAC address table entry configuration, 23
Ethernet link aggregation operational key, 41 MAC address table entry types, 21
304
MAC address table learning priority, 28 spanning tree port path cost, 103, 105
MAC address table multiport unicast entry, 24 spanning tree port priority, 106
MAC-based VLAN configuration, 143, 152 spanning tree port role restriction, 118
MAC-based VLAN dynamic spanning tree port state transition, 108
assignment, 143, 147 spanning tree priority, 99
MAC-based VLAN server spanning tree protection functions, 115
assignment, 145, 147 spanning tree root bridge, 97
MAC-based VLAN static spanning tree root bridge (device), 98
assignment, 143, 146
spanning tree root guard, 117
management interface configuration, 1
spanning tree secondary root bridge (device), 98
MRP timers, 198
spanning tree SNMP notification (new-root
MST region configuration, 97 election, topology change events), 120
MVRP timer configuration, 201 spanning tree switched network diameter, 100
PBB frame format, 244 spanning tree TC Snooping, 114
PBB frame forwarding, 246 spanning tree TC-BPDU guard, 119
port isolation group assignment (multiple), 77 spanning tree TC-BPDU transmission
port-based VLAN assignment (access restriction, 118
port), 140 storm suppression, 10
port-based VLAN assignment (hybrid STP algorithm calculation, 81
port), 142
STP designated bridge, 81
port-based VLAN assignment (trunk port), 141
STP designated port, 81
port-based VLAN configuration, 139
STP path cost, 81
private VLAN configuration, 166
STP root bridge, 80
private VLAN promiscuous port
STP root port, 81
configuration, 168
subinterface MTU setting (Layer 3 Ethernet), 15
private VLAN trunk promiscuous port
configuration, 171 super VLAN configuration, 160, 162
private VLAN trunk promiscuous+trunk super VLAN interface configuration, 161
secondary port configuration, 174 super VLAN sub-VLAN creation, 160
protocol-based VLAN configuration, 149, 156 VLAN basic configuration, 137
QinQ basic configuration, 219 VLAN group configuration, 150
QinQ CVLAN tag TPID value, 217 VLAN interface basics, 138
QinQ SVLAN tag TPID value, 217 VLAN mapping 1\1 implementation, 226
QinQ VLAN tag TPID value, 216 VLAN mapping 1\2 implementation, 227
QinQ VLAN transparent transmission, 215 VLAN mapping 2\2 implementation, 227
QinQ VLAN transparent transmission VLAN mapping configuration (1\1), 229
configuration, 221 VLAN mapping configuration (1\2), 234
RSTP network convergence, 87 VLAN mapping configuration (2\2), 234
secondary VLAN Layer 3 communication, 179 VLAN mapping configuration (M\1), 229
service loopback group VLAN mapping configuration (M\1) (dynamic IP
configuration, 287, 288 address assignment), 230
SNMP notification for MAC address table, 33 VLAN mapping configuration (M\1) (static IP
spanning tree BPDU drop, 119 address assignment), 232
spanning tree BPDU guard, 116 VLAN mapping M\1 customer-side port (dynamic
spanning tree BPDU transmission rate, 102 IP address assignment), 231
spanning tree Digest Snooping, 110, 111 VLAN mapping M\1 customer-side port (static IP
address assignment), 233
spanning tree edge port, 102
VLAN mapping M\1 implementation, 226
spanning tree loop guard, 117
VLAN mapping M\1 network-side port (dynamic
spanning tree mode set, 96
IP address assignment), 231
spanning tree No Agreement Check, 112, 114
VLAN mapping M\1 network-side port (static IP
spanning tree port link type, 107 address assignment), 233
spanning tree port mode, 107
305
VLAN port-based configuration, 151 port isolation configuration, 77
voice VLAN assignment mode, 184 port isolation configuration (multiple isolation
voice VLAN CDP advertisement groups), 78
configuration, 190 private VLAN configuration, 165, 168
voice VLAN host+IP phone connection (in PVST configuration, 125
series), 184 QinQ configuration, 213, 219
voice VLAN information advertisement to IP service loopback group configuration, 287
phones, 183 spanning tree configuration, 80, 92, 121
voice VLAN IP phone access method, 184 subinterface configuration (Layer 3 Ethernet), 15
voice VLAN IP phone connection super VLAN configuration, 160
(device), 184
VLAN configuration, 136, 151
voice VLAN IP phone identification method
VLAN mapping configuration, 223, 228, 235
(LLDP), 183
VLAN mapping configuration (1\1), 235
voice VLAN IP phone identification method
(OUI address), 182 VLAN mapping configuration (1\2), 240
voice VLAN LLDP advertisement VLAN mapping configuration (2\2), 240
configuration, 190 VLAN mapping configuration (M\1), 235
voice VLAN LLDP enable, 190 voice VLAN configuration, 182, 192
voice VLAN port mode, 186 No Agreement Check (spanning tree), 112, 114
voice VLAN port operation configuration no-learning action (loop detection), 130
(automatic assignment), 188, 192 normal
voice VLAN port operation configuration voice VLAN mode, 186
(manual assignment), 189, 194 notification
voice VLAN QoS priority setting MAC address move, 30
configuration, 187 SNMP notification for MAC address table, 33
network management null interface
Ethernet link aggregation configuration, 17, 17
configuration, 40, 47, 64
display, 18
interface bulk configuration, 19
maintain, 18
interface configuration (Ethernet), 1
interface configuration (inloopback), 17 O
interface configuration (Layer 3 Ethernet), 15 operational key (Ethernet link aggregation), 41
interface configuration (loopback), 17 organization-specific LLDPDU TLV types, 255
interface configuration (null), 17 OUI address
LAN switching LLDP basic concepts, 253 voice VLAN IP phone identification method, 182
LAN switching LLDP basic configuration, 275 outputting
LAN switching LLDP spanning tree port state transition
configuration, 253, 259, 275 information, 108
LAN switching LLDP configuration
P
(CDP-compatible), 279
LAN switching LLDP DCBX packet
configuration, 268, 281 Ethernet link aggregation group BFD, 57
Layer 2 cut-through forwarding Ethernet link aggregation packet type-based load
configuration, 289 sharing, 47
loop detection, 129 LAN switching LLDP CDP compatibility, 266
loop detection configuration, 131, 133 LAN switching LLDP DCBX configuration, 281
MAC address table configuration, 21, 22, 34 LAN switching LLDP PFC parameters, 273
MAC Information configuration, 36, 37 service loopback group
MSTP configuration, 121 configuration, 287, 287, 288
MVRP, 196, 199, 202 spanning tree port mode configuration, 107
PBB configuration, 243, 246, 250 STP BPDU protocol packets, 80
PBB network model, 243 STP TCN BPDU protocol packets, 80
VLAN mapping configuration, 223, 228, 235
306
VLAN mapping configuration (1\1), 229, 235 Ethernet link aggregate interface (expected
VLAN mapping configuration (1\2), 234, 240 bandwidth), 56
VLAN mapping configuration (2\2), 234, 240 Ethernet link aggregate interface default
VLAN mapping configuration (M\1), 229, 235 settings, 58
VLAN mapping configuration (M\1) (dynamic Ethernet link aggregate interface shutdown, 58
IP address assignment), 230 Ethernet link aggregation configuration, 40, 47, 64
VLAN mapping configuration (M\1) (static IP Ethernet link aggregation configuration types, 41
address assignment), 232 Ethernet link aggregation dynamic mode, 43
parameter Ethernet link aggregation edge aggregate
LAN switching LLDP APP configuration, 270 interface, 47, 57
LAN switching LLDP ETS configuration, 271 Ethernet link aggregation group, 48
LAN switching LLDP PFC configuration, 273 Ethernet link aggregation group (dynamic), 50
spanning tree timeout factor, 101 Ethernet link aggregation group (static), 49
PBB Ethernet link aggregation LACP, 43
configuration, 243, 246, 250 Ethernet link aggregation load sharing, 59
data encapsulation type configuration, 249 Ethernet link aggregation load sharing mode, 47
display, 250 Ethernet link aggregation local-first load
downlink port configuration, 248 sharing, 60
frame format, 244 Ethernet link aggregation member port, 40
frame forwarding, 246 Ethernet link aggregation member port
state, 41, 42, 45
L2VPN enable, 247
Ethernet link aggregation modes, 42
maintain, 250
Ethernet link aggregation operational key, 41
network model, 243
Ethernet link aggregation per-flow load sharing
protocols and standards, 246
algorithm settings, 61
terminology, 244
Ethernet link aggregation reference port, 44
troubleshoot, 252
Ethernet link aggregation reference port
troubleshooting customer frames cannot be choice, 42
transmitted, 252
Ethernet link aggregation static mode, 42
uplink port configuration, 247
Ethernet link aggregation traffic redirection, 62
VSI B-VLAN configuration, 247
interface fiber port (Layer 2 Ethernet), 9
VSI creation, 247
isolation. See port isolation
per-flow load sharing, 47, 61
LAN switching LLDP basic
performing configuration, 259, 275
interface loopback test (Ethernet), 5 LAN switching LLDP configuration, 253, 259, 275
spanning tree mCheck, 109 LAN switching LLDP disable operating mode, 258
per-packet load sharing, 47 LAN switching LLDP enable, 259
Per-VLAN Spanning Tree Protocol. Use PVST LAN switching LLDP frame encapsulation
PFC (Ethernet interface), 7 format, 265
PFC priority (LLDP), 273 LAN switching LLDP frame reception, 259
physical LAN switching LLDP frame transmission, 258
interface physical state change suppression LAN switching LLDP operating mode, 261
(Ethernet), 4 LAN switching LLDP polling, 262
polling LAN switching LLDP reinitialization delay, 261
interface statistics polling interval (Ethernet), 9 LAN switching LLDP Rx operating mode, 258
LAN switching LLDP enable, 262 LAN switching LLDP Tx operating mode, 258
port LAN switching LLDP TxRx operating mode, 258
Ethernet aggregate interface, 53 Layer 2 aggregate interface (ignored VLAN), 54
Ethernet aggregate interface (description), 53 Layer 2 Ethernet link aggregation (dynamic), 66
Ethernet link aggregate group Selected ports Layer 2 Ethernet link aggregation (static), 64
min/max, 55
Layer 2 Ethernet link aggregation edge aggregate
interface, 71
307
Layer 2 Ethernet link aggregation group spanning tree port mode configuration, 107
(dynamic), 50 spanning tree port priority configuration, 106
Layer 2 Ethernet link aggregation group spanning tree port role restriction, 118
(static), 49 spanning tree port state transition output, 108
Layer 2 Ethernet link aggregation load spanning tree root guard, 117
sharing, 68
spanning tree TC-BPDU guard, 119
Layer 3 aggregate interface configuration
spanning tree TC-BPDU transmission
(MTU), 54
restriction, 118
Layer 3 Ethernet link aggregation
STP designated port, 81
(dynamic), 73
STP root port, 81
Layer 3 Ethernet link aggregation (static), 72
VLAN mapping M\1 customer-side port (dynamic
Layer 3 Ethernet link aggregation edge
IP address assignment), 231
aggregate interface, 74
VLAN mapping M\1 customer-side port (static IP
Layer 3 Ethernet link aggregation group
address assignment), 233
(dynamic), 52
VLAN mapping M\1 network-side port (dynamic
Layer 3 Ethernet link aggregation group
IP address assignment), 231
(static), 49
VLAN mapping M\1 network-side port (static IP
link aggregation management
address assignment), 233
VLAN+management port, 59
VLAN port link type, 139
loop detection configuration, 129, 131, 133
voice VLAN port mode, 186
loop detection interval, 130, 132
voice VLAN port operation configuration
loop detection protection action
(automatic assignment), 188, 192
configuration, 132
voice VLAN port operation configuration (manual
loop detection protection actions, 130
assignment), 189, 194
loop detection status auto recovery, 130
port isolation
MAC address learning, 21
configuration, 77
MAC address table blackhole entry, 24
configuration (multiple isolation groups), 78
MAC address table configuration, 21, 22, 34
display, 77
MAC address table entry configuration, 23
port assignment to group (multiple), 77
MAC address table multiport unicast entry, 24
port-based VLAN
MAC Information configuration, 36, 37
access port assignment (interface view), 140
MST port roles, 90
access port assignment (VLAN view), 140
MST port states, 91
assignment (access port), 140
MVRP application, 196, 199, 202
assignment (hybrid port), 142
MVRP timer configuration, 201
assignment (trunk port), 141
PBB downlink port, 248
configuration, 139, 151
PBB uplink port, 247
port frame handling, 139
QinQ implementation, 214
port link type, 139
RSTP network convergence, 87
PVID, 139
service loopback group
power
configuration, 287, 287, 288
interface auto power-down (Ethernet), 8
spanning tree BPDU drop, 119
interface EEE energy saving, 8
spanning tree BPDU guard, 116
interface energy-saving features (Ethernet), 8
spanning tree BPDU transmission rate, 102
priority
spanning tree edge port configuration, 102
802.1p-to-local priority mapping, 272
spanning tree forward delay timer, 100
Ethernet link aggregation LACP, 43
spanning tree loop guard, 117
LAN switching LLDP PFC 802.1p priority, 273
spanning tree path cost calculation
standard, 103 MAC address table learning priority, 28
spanning tree path cost QinQ SVLAN tag 802.1p priority, 217
configuration, 103, 105 spanning tree device priority, 99
spanning tree port link type configuration, 107 spanning tree port priority configuration, 106
308
priority-based flow control. Use PFC configuring interface (loopback), 17
private VLAN configuring interface (null), 17
configuration, 165, 166, 168 configuring interface auto power-down
display, 168 (Ethernet), 8
promiscuous port configuration, 168 configuring interface basic settings (Ethernet), 3
secondary VLAN Layer 3 communication, 179 configuring interface common settings
trunk promiscuous port configuration, 171 (Ethernet), 1
trunk promiscuous+trunk secondary port configuring interface EEE energy saving, 8
configuration, 174 configuring interface energy-saving features
procedure (Ethernet), 8
adding MAC address table blackhole entry, 24 configuring interface generic flow control
(Ethernet), 6
adding MAC address table multiport unicast
entry, 24 configuring interface jumbo frame support
(Ethernet), 4
assigning MAC address table learning priority
to interface, 28 configuring interface link mode (Ethernet), 4
assigning port isolation group (multiple), 77 configuring interface PFC (Ethernet), 7
assigning port-based VLAN access port, 140 configuring interface physical state change
suppression (Ethernet), 4
assigning port-based VLAN access port
(interface view), 140 configuring interface storm control (Layer 2
Ethernet), 11
assigning port-based VLAN access port
(VLAN view), 140 configuring IP subnet-based VLAN, 148, 154
assigning port-based VLAN hybrid port, 142 configuring LAN switching LLDP, 259, 275
assigning port-based VLAN trunk port, 141 configuring LAN switching LLDP
(CDP-compatible), 279
bulk configuring interfaces, 19
configuring LAN switching LLDP 802.1p-to-local
changing interface to FC interface (Layer 2
priority mapping, 272
Ethernet), 14
configuring LAN switching LLDP advertisable
combining interfaces (Ethernet 10-GE into
TLVs, 262
40-GE), 2
configuring LAN switching LLDP APP
configuring Ethernet aggregate interface, 53
parameters, 270
configuring Ethernet link aggregation, 47
configuring LAN switching LLDP basics, 259, 275
configuring Ethernet link aggregation edge
configuring LAN switching LLDP bridge
aggregate interface, 57
mode, 260
configuring Ethernet link aggregation
configuring LAN switching LLDP CDP
group, 48
compatibility, 266
configuring Ethernet link aggregation group
configuring LAN switching LLDP DCBX, 268, 281
(dynamic), 50
configuring LAN switching LLDP ETS
configuring Ethernet link aggregation group
parameters, 271
(static), 49
configuring LAN switching LLDP group-based
configuring Ethernet link aggregation group
WRR queuing, 272
BFD, 57
configuring LAN switching LLDP management
configuring Ethernet link aggregation group
address, 264
load sharing mode, 59
configuring LAN switching LLDP management
configuring Ethernet link aggregation load
address encoding format, 264
sharing, 59
configuring LAN switching LLDP PFC
configuring Ethernet link aggregation load
parameters, 273
sharing mode (global), 60
configuring LAN switching LLDP trapping, 274
configuring Ethernet link aggregation load
sharing mode (group-specific), 60 configuring LAN switching LLDP-MED
trapping, 274
configuring Ethernet link aggregation per-flow
load sharing algorithm settings, 61 configuring LAN switching QinQ CVLAN tag TPID
value, 217
configuring interface (inloopback), 18
configuring LAN switching QinQ SVLAN tag TPID
configuring interface (Layer 2 Ethernet), 11
value, 217
configuring interface (Layer 3 Ethernet), 15
309
configuring LAN switching QinQ VLAN tag configuring MST region, 97
TPID value, 216 configuring MST region max hops, 99
configuring LAN switching spanning tree configuring MSTP, 95, 121
Digest Snooping, 111 configuring MVRP, 199, 202
configuring Layer 2 cut-through configuring MVRP registration mode, 201
forwarding, 289
configuring MVRP timer, 201
configuring Layer 2 Ethernet link aggregation
configuring PBB, 246, 250
(dynamic), 66
configuring PBB data encapsulation
configuring Layer 2 Ethernet link aggregation
type, 249, 249
(static), 64
configuring PBB downlink port, 248
configuring Layer 2 Ethernet link aggregation
edge aggregate interface, 71 configuring PBB uplink port, 247
configuring Layer 2 Ethernet link aggregation configuring PBB VSI B-VLAN, 247
group (dynamic), 50 configuring port isolation (multiple isolation
configuring Layer 2 Ethernet link aggregation groups), 78
group (static), 49 configuring port-based VLAN, 139, 151
configuring Layer 2 Ethernet link aggregation configuring private VLAN, 166, 168
load sharing, 68 configuring private VLAN promiscuous port, 168
configuring Layer 3 Ethernet link aggregation configuring private VLAN trunk promiscuous
(dynamic), 73 port, 171
configuring Layer 3 Ethernet link aggregation configuring private VLAN trunk
(static), 72 promiscuous+trunk secondary port, 174
configuring Layer 3 Ethernet link aggregation configuring protocol-based VLAN, 149, 156
edge aggregate interface, 74 configuring PVST, 94, 125
configuring Layer 3 Ethernet link aggregation configuring QinQ, 219
group (dynamic), 52 configuring QinQ basics, 219
configuring Layer 3 Ethernet link aggregation configuring QinQ VLAN transparent
group (static), 49 transmission, 215, 221
configuring loop detection, 131, 133 configuring RSTP, 94
configuring loop detection protection configuring secondary VLAN Layer 3
action, 132 communication, 179
configuring loop detection protection action configuring service loopback group, 287, 288
(global), 132
configuring spanning tree, 92, 121
configuring loop detection protection action
(Layer 2 aggregate interface), 132 configuring spanning tree BPDU transmission
rate, 102
configuring loop detection protection action
configuring spanning tree device priority, 99
(Layer 2 Ethernet interface), 132
configuring spanning tree Digest Snooping, 110
configuring MAC address table, 34
configuring spanning tree edge port, 102
configuring MAC address table entry, 23
configuring spanning tree No Agreement
configuring MAC address table unknown
frame forwarding rule, 28 Check, 112, 114
configuring MAC change notification configuring spanning tree port link type, 107
interval, 37 configuring spanning tree port mode for MSTP
configuring MAC Information, 37 packets, 107
configuring spanning tree port path cost, 103, 105
configuring MAC Information mode, 36
configuring spanning tree port priority, 106
configuring MAC Information queue length, 37
configuring spanning tree port role restriction, 118
configuring MAC-based VLAN, 143, 152
configuring spanning tree protection
configuring MAC-based VLAN dynamic
assignment, 147 functions, 115
configuring MAC-based VLAN server configuring spanning tree root bridge, 97
assignment, 147 configuring spanning tree root bridge (device), 98
configuring MAC-based VLAN static configuring spanning tree secondary root
assignment, 146 bridge, 97
configuring management interface, 1
310
configuring spanning tree secondary root disabling MAC address learning on interface, 26
bridge (device), 98 disabling MAC address learning on VLAN, 27
configuring spanning tree switched network disabling static source check, 32
diameter, 100 disabling the device to reactivate the shutdown
configuring spanning tree TC Snooping, 114 edge ports, 120
configuring spanning tree TC-BPDU displaying bulk interface configuration, 20
transmission restriction, 118 displaying Ethernet link aggregation, 63
configuring spanning tree timeout factor, 101 displaying interface, 18
configuring spanning tree timer, 100 displaying interface (Ethernet), 15
configuring storm suppression, 10 displaying LAN switching LLDP, 274
configuring STP, 93 displaying loop detection, 133
configuring subinterface (Layer 3 displaying MAC address table, 33
Ethernet), 15
displaying MVRP, 202
configuring super VLAN, 160, 160, 162
displaying PBB, 250
configuring super VLAN interface, 161
displaying port isolation, 77
configuring VLAN, 151
displaying private VLAN, 168
configuring VLAN basic settings, 137
displaying QinQ, 219
configuring VLAN group, 150
displaying service loopback group, 288
configuring VLAN interface basics, 138
displaying spanning tree, 121
configuring VLAN mapping, 228, 235
displaying super VLAN, 161
configuring VLAN mapping (1\1), 229, 235
displaying VLAN, 150
configuring VLAN mapping (1\2), 234, 240
displaying VLAN mapping, 235
configuring VLAN mapping (2\2), 234, 240
displaying voice VLAN, 191
configuring VLAN mapping (M\1), 229, 235
enabling ARP fast update for MAC address
configuring VLAN mapping (M\1) (dynamic IP move, 32
address assignment), 230
enabling BPDU guard on an interface, 116
configuring VLAN mapping (M\1) (static IP
enabling Ethernet link aggregation local-first load
address assignment), 232
sharing, 60
configuring VLAN mapping M\1 customer-side
enabling Ethernet link aggregation traffic
port (dynamic IP address assignment), 231
redirection, 62
configuring VLAN mapping M\1 customer-side
enabling global BPDU guard, 116
port (static IP address assignment), 233
enabling interface bridging (Ethernet), 14
configuring VLAN mapping M\1 network-side
port (dynamic IP address assignment), 231 enabling LAN switching LLDP, 259
configuring VLAN mapping M\1 network-side enabling LAN switching LLDP polling, 262
port (static IP address assignment), 233 enabling LAN switching LLDP+DCBX TLV
configuring voice VLAN, 192 advertisement, 269
configuring voice VLAN CDP enabling loop detection, 131
advertisement, 190 enabling loop detection (global), 131
configuring voice VLAN LLDP enabling loop detection (port-specific), 131
advertisement, 190 enabling MAC address move notification, 30
configuring voice VLAN port operation enabling MAC address synchronization
(automatic assignment), 188, 192 globally, 29
configuring voice VLAN port operation enabling MAC Information, 36
(manual assignment), 189, 194 enabling MVRP, 200
configuring voice VLAN QoS priority enabling MVRP GVRP compatibility, 202
settings, 187 enabling PBB L2VPN, 247
creating PBB VSI, 247 enabling QinQ, 215
creating super VLAN sub-VLAN, 160 enabling SNMP notification for MAC address
disabling global MAC address learning, 26 table, 33
disabling LLDP PVID inconsistency enabling spanning tree BPDU drop, 119
check, 266 enabling spanning tree BPDU guard, 116
disabling MAC address learning, 26
311
enabling spanning tree feature, 108 setting LAN switching LLDP parameters, 265
enabling spanning tree loop guard, 117 setting LAN switching LLDP reinitialization
enabling spanning tree port state transition delay, 261
information output, 108 setting Layer 3 aggregate interface (MTU), 54
enabling spanning tree root guard, 117 setting loop detection interval, 132
enabling spanning tree SNMP notification setting MAC address table dynamic aging
(new-root election, topology change timer, 27
events), 120 setting MAC address table learning limit on
enabling spanning tree TC-BPDU guard, 119 interface, 27
enabling VLAN mapping M\1 ARP detection setting QinQ SVLAN tag 802.1p priority, 217
(dynamic IP address assignment), 230 setting spanning tree mode, 96
enabling VLAN mapping M\1 ARP snooping setting subinterface MTU (Layer 3 Ethernet), 15
(static IP address assignment), 232 shutting down Ethernet link aggregate
enabling VLAN mapping M\1 DHCP snooping interface, 58
(dynamic IP address assignment), 230 specifying Layer 2 aggregate interface (ignored
enabling voice VLAN LLDP, 190 VLAN), 54
forcing interface fiber port (Layer 2 specifying link aggregation management
Ethernet), 9 VLAN+management port, 59, 59
maintaining Ethernet link aggregation, 63 specifying spanning tree port path cost calculation
maintaining interface, 18 standard, 103
maintaining interface (Ethernet), 15 splitting interface (Ethernet 40-GE), 2
maintaining MVRP, 202 testing interface cable connection (Layer 2
maintaining PBB, 250 Ethernet), 13
maintaining spanning tree, 121 troubleshooting PBB customer frames cannot be
maintaining VLAN, 150 transmitted, 252
modifying MAC address table blackhole promiscuous
entry, 24 private VLAN promiscuous port configuration, 168
modifying MAC address table multiport private VLAN trunk promiscuous port
unicast entry, 24 configuration, 171
performing interface loopback test private VLAN trunk promiscuous+trunk
(Ethernet), 5 secondary port configuration, 174
performing spanning tree mCheck, 109 protecting
restoring Ethernet link aggregate interface disabling the device to reactivate the shutdown
default settings, 58 edge ports, 120
setting Ethernet aggregate interface spanning tree protection functions, 115
(description), 53 spanning tree SNMP notification (new-root
setting Ethernet link aggregate group election, topology change events), 120
Selected ports min/max, 55 protocol-based VLAN
setting Ethernet link aggregate interface configuration, 149, 156
(expected bandwidth), 56 protocols and standards
setting Ethernet link aggregation load sharing Ethernet link aggregation protocol
mode for MAC-in-MAC traffic (global), 62 configuration, 41
setting interface connection distance (Layer 2 LAN switching LLDP, 259
Ethernet), 15 MSTP, 92
setting interface MDIX mode (Layer 2 MVRP, 199
Ethernet), 13
PBB, 246
setting interface MTU (Layer 3 Ethernet), 15
QinQ, 214
setting interface statistics polling interval
STP protocol packets, 80
(Ethernet), 9
VLAN, 137
setting LAN switching LLDP frame
encapsulation format, 265 provider
setting LAN switching LLDP operating backbone bridge. Use PBB
mode, 261 backbone bridge network. See PBBN
312
backbone network. See PBN MST, 89
PVID (port-based VLAN), 139 MST region configuration, 97
PVST, 80, See also STP MST region max hops, 99
configuration, 94, 125 MST regional root, 90
feature enable, 109 registering
mode set, 96 MVRP registration fixed mode, 199
port links, 87 MVRP registration forbidden mode, 199
Q MVRP registration mode, 201
MVRP registration normal mode, 199
QinQ
reinitialization delay (LLDP), 261
basic configuration, 219
restoring
configuration, 213, 219
Ethernet link aggregate interface default
configuration restrictions, 215 settings, 58
CVLAN tag, 213 restrictions
CVLAN tag TPID value, 217 bulk interface configuration, 19
display, 219 Ethernet link aggregation group, 48
enable, 215 Ethernet link aggregation traffic redirection, 62
how it works, 213 interface dampening (Ethernet), 6
implementation, 214 interface fiber port (Layer 2 Ethernet), 6
loop detection configuration, 129, 131, 133 interface loopback test (Ethernet), 6
protocols and standards, 214 interface PFC configuration (Ethernet), 6
SVLAN tag, 213 interface storm control (Layer 2 Ethernet), 6
SVLAN tag 802.1p priority, 217 interface storm suppression (Layer 2 Ethernet), 6
SVLAN tag TPID value, 217 LAN switching STP Digest Snooping
VLAN tag TPID value, 216 configuration, 111
VLAN transparent transmission, 215 LAN switching STP edge port configuration, 102
VLAN transparent transmission LAN switching STP mCheck configuration, 110
configuration, 221 LAN switching STP port link type
QoS configuration, 107
LAN switching LLDP 802.1p-to-local priority LAN switching STP TC Snooping
mapping, 272 configuration, 115
LAN switching LLDP APP parameters, 270 LAN switching STP timer configuration, 101
LAN switching LLDP ETS parameters, 271 MAC-based VLAN dynamic assignment, 146
LAN switching LLDP group-based WRR MVRP configuration, 199
queuing, 272 QinQ configuration, 215
LAN switching LLDP PFC parameters, 273 spanning tree port role restriction, 118
QinQ SVLAN tag 802.1p priority, 217 spanning tree TC-BPDU transmission
voice VLAN QoS priority setting restriction, 118
configuration, 187 voice VLAN LLDP enable, 190
queuing voice VLAN port operation configuration
MAC Information queue length, 37 restrictions (automatic assignment), 188
R voice VLAN port operation configuration
restrictions (manual assignment), 189
Rapid Spanning Tree Protocol. Use RSTP root
rate MST common root bridge, 90
spanning tree BPDU transmission rate, 102 MST regional root, 90
receiving MST root port role, 90
LAN switching LLDP frames, 259 spanning tree root bridge, 97
recovering spanning tree root bridge (device), 98
loop detection port status auto recovery, 130 spanning tree root guard, 117
reference port (Ethernet link aggregation), 42, 44 spanning tree secondary root bridge (device), 98
region
313
STP algorithm calculation, 81 Ethernet link aggregation member port
STP root bridge, 80 state, 42, 45
STP root port, 81 interface connection distance (Layer 2
routing Ethernet), 15
IP subnet-based VLAN interface MDIX mode (Layer 2 Ethernet), 13
configuration, 148, 154 interface MTU (Layer 3 Ethernet), 15
MAC-based VLAN configuration, 143, 152 interface statistics polling interval (Ethernet), 9
MAC-based VLAN dynamic assignment, 147 LAN switching LLDP frame encapsulation
MAC-based VLAN server assignment, 147 format, 265
MAC-based VLAN static assignment, 146 LAN switching LLDP operating mode, 261
protocol-based VLAN configuration, 149, 156 LAN switching LLDP parameters, 265
voice VLAN configuration, 182, 192 LAN switching LLDP reinitialization delay, 261
voice VLAN IP phone access method, 184 Layer 3 aggregate interface (MTU), 54
RSTP, 80, See also STP loop detection interval, 132
configuration, 94 MAC address table dynamic aging timer, 27
feature enable, 109 MAC address table learning limit on interface, 27
mode set, 96 QinQ SVLAN tag 802.1p priority, 217
MSTP device implementation, 92 spanning tree mode, 96
network convergence, 87 subinterface MTU (Layer 3 Ethernet), 15
rule shutting down
MAC address table unknown frame Ethernet link aggregate interface, 58
forwarding rule, 28 loop detection shutdown action, 130
SNAP
S
LAN switching LLDP frame encapsulated in
security SNAP format, 254
voice VLAN mode, 186 LAN switching LLDP frame encapsulation
selecting format, 265
Ethernet link aggregation Selected ports SNMP
min/max, 55 MAC Information configuration, 36, 37
Ethernet link aggregation selected state, 41 snooping
Ethernet link aggregation unselected state, 41 spanning tree Digest Snooping, 110, 111
series spanning tree TC Snooping, 114
voice VLAN host+IP phone connection (in spanning tree, 80, See also STP, RSTP, PVST, MSTP
series), 184 BPDU drop, 119
server BPDU guard enable, 116
MAC-based VLAN server BPDU transmission rate configuration, 102
assignment, 145, 147
configuration, 80, 92, 121
service
device priority configuration, 99
LAN switching LLDP service bridge
Digest Snooping, 110, 111
mode, 260
disabling the device to reactivate the shutdown
service loopback group
edge ports, 120
configuration, 287, 287, 288
displaying, 121
display, 288
edge port configuration, 102
setting
feature enable, 108
Ethernet aggregate interface (description), 53
loop guard enable, 117
Ethernet link aggregate group Selected ports
maintaining, 121
min/max, 55
mCheck, 109
Ethernet link aggregate interface (expected
bandwidth), 56 mode set, 96
Ethernet link aggregation load sharing mode MST region max hops, 99
for MAC-in-MAC traffic (global), 62 MSTP, 87, See also MSTP
No Agreement Check, 112, 114
314
port link type configuration, 107 interface statistics polling interval (Ethernet), 9
port mode configuration, 107 storm
port path cost calculation standard, 103 interface storm control (Layer 2 Ethernet), 11
port path cost configuration, 103, 105 STP
port priority configuration, 106 algorithm calculation, 81
port role restriction, 118 basic concepts, 80
port state transition output, 108 BPDU forwarding, 86
protection functions, 115 configuration, 93
PVST, 87, See also PVST designated bridge, 81
root bridge configuration, 97 designated port, 81
root bridge configuration (device), 98 Digest Snooping configuration restrictions, 111
root guard enable, 117 edge port configuration restrictions, 102
RSTP, 87, See also RSTP feature enable, 109
secondary root bridge configuration loop detection, 80
(device), 98 mCheck configuration restrictions, 110
SNMP notification enable (new-root election, mode set, 96
topology change events), 120 MSTP device implementation, 92
switched network diameter, 100 path cost, 81
TC Snooping, 114 port link type configuration restrictions, 107
TC-BPDU guard, 119 protocol packets, 80
TC-BPDU transmission restriction, 118 root bridge, 80
timeout factor configuration, 101 root port, 81
timer configuration, 100 TC Snooping configuration restrictions, 115
specifying timer configuration restrictions, 101
Layer 2 aggregate interface (ignored timers, 86
VLAN), 54
subinterface. See Ethernet subinterface
link aggregation management
subnetting
VLAN+management port, 59
IP subnet-based VLAN configuration, 148, 154
spanning tree port path cost calculation
standard, 103 sub-VLAN
splitting creation, 160
interface (Ethernet 40-GE), 2 super VLAN
state configuration, 160, 160, 162
Ethernet link aggregation member port display, 161
state, 41, 42, 45 interface configuration, 161
interface state change suppression sub-VLAN creation, 160
(Ethernet), 4 suppressing
static interface physical state change suppression
Ethernet link aggregation group, 49 (Ethernet), 4
Ethernet link aggregation mode, 42 interface storm control configuration (Layer 2
Ethernet link aggregation static mode, 42 Ethernet), 11
Layer 2 Ethernet link aggregation, 64 SVLAN
Layer 2 Ethernet link aggregation group, 49 QinQ basic configuration, 219
Layer 3 Ethernet link aggregation, 72 QinQ configuration, 213, 219
Layer 3 Ethernet link aggregation group, 49 QinQ SVLAN tag 802.1p priority, 217
MAC address table entry, 21 QinQ VLAN transparent transmission
configuration, 221
MAC-based VLAN static
assignment, 143, 146 VLAN mapping configuration, 223, 228, 235
static MAC address entry VLAN mapping implementation, 225
static source check disable, 32 switching
statistics interface configuration (Ethernet), 1
interface configuration (inloopback), 17, 18
315
interface configuration (loopback), 17, 17 spanning tree forward delay, 100
interface configuration (null), 17, 17 spanning tree hello, 100
MAC address table configuration, 21, 22, 34 spanning tree max age, 100
spanning tree switched network diameter, 100 STP forward delay, 86
synchronizing STP hello, 86
MAC addresses, 29 STP max age, 86
system TLV
interface bulk configuration, 19 LAN switching LLDP advertisable TLV
configuration, 262
T
LAN switching LLDP management address
table configuration, 264
LAN switching LLDP priority mapping LAN switching LLDP management address
table, 272 encoding format, 264
MAC address, 21, 22, 34 LAN switching LLDP parameters, 265
MSTP VLAN-to-instance mapping table, 89 LAN switching LLDP+DCBX TLV
tag advertisement, 269
QinQ CVLAN, 213 LAN switching LLDPDU basic management
QinQ CVLAN tag TPID value, 217 types, 255
QinQ SVLAN, 213 LAN switching LLDPDU LLDP-MED types, 255
QinQ SVLAN tag 802.1p priority, 217 LAN switching LLDPDU management address
QinQ SVLAN tag TPID value, 217 TLV, 258
QinQ VLAN tag TPID value, 216 LAN switching LLDPDU organization-specific
types, 255
VLAN mapping configuration, 223, 228, 235
topology
VLAN mapping configuration (1\1), 229, 235
STP TCN BPDU protocol packets, 80
VLAN mapping configuration (1\2), 234, 240
traffic
VLAN mapping configuration (2\2), 234, 240
Ethernet link aggregation traffic redirection, 62
VLAN mapping configuration (M\1), 229, 235
PBB configuration, 243, 246, 250
VLAN mapping configuration (M\1) (dynamic
IP address assignment), 230 voice VLAN QoS priority setting
configuration, 187
VLAN mapping configuration (M\1) (static IP
address assignment), 232 transmitting
TC Snooping (spanning tree), 114 LAN switching LLDP frames, 258
TC-BPDU QinQ VLAN transparent transmission, 215, 221
spanning tree TC-BPDU guard, 119 spanning tree TC-BPDU transmission
restriction, 118
spanning tree TC-BPDU transmission
restriction, 118 transparent transmission (QinQ for VLAN), 215, 221
testing trapping
interface cable connection (Layer 2 LAN switching LLDP configuration, 274
Ethernet), 13 LAN switching LLDP-MED configuration, 274
time MAC Information configuration, 36, 37
Ethernet link aggregation LACP timeout MAC Information mode configuration, 36
interval, 43 troubleshooting
timeout PBB, 252
spanning tree timeout factor, 101 PBB customer frames cannot be transmitted, 252
timer trunk port
LAN switching LLDP reinitialization delay, 261 port-based VLAN assignment (trunk port), 141
MAC address table dynamic aging timer, 27 U
MRP Join, 198
unicast
MRP Leave, 198
MAC address table configuration, 21, 22, 34
MRP LeaveAll, 198
MAC address table multiport unicast entry, 21
MRP Periodic, 198
uplink port
MVRP configuration, 201
316
PBB configuration, 247 QinQ CVLAN tag, 213
V QinQ CVLAN tag TPID value, 217
QinQ implementation, 214
Virtual Local Area Network. Use VLAN
QinQ SVLAN tag, 213
VLAN
QinQ SVLAN tag 802.1p priority, 217
basic configuration, 137
QinQ SVLAN tag TPID value, 217
configuration, 136, 151
QinQ transparent transmission, 215
display, 150
QinQ VLAN tag TPID value, 216
frame encapsulation, 136
QinQ VLAN transparent transmission
group configuration, 150 configuration, 221
interface basics configuration, 138 super VLAN configuration, 160, 160, 162
IP subnet-based configuration, 148, 154 super VLAN interface configuration, 161
LAN switching LLDP CDP compatibility, 266 voice VLAN assignment mode, 184
LAN switching LLDP configuration voice VLAN CDP advertisement
(CDP-compatible), 279 configuration, 190
Layer 2 Ethernet aggregate interface (ignored voice VLAN configuration, 182, 192
VLAN), 54
voice VLAN host+IP phone connection (in
link aggregation management series), 184
VLAN+management port, 59
voice VLAN IP phone access method, 184
loop detection configuration, 129, 131, 133
voice VLAN IP phone connection (device), 184
MAC-based configuration, 152
voice VLAN LLDP advertisement
MAC-based dynamic assignment, 147 configuration, 190
MAC-based server assignment, 147 voice VLAN LLDP enable, 190
MAC-based static assignment, 146 voice VLAN LLDP enable restrictions, 190
MAC-based VLAN configuration, 143 voice VLAN port mode, 186
MAC-based VLAN dynamic assignment, 143 voice VLAN port operation configuration
MAC-based VLAN server assignment, 145 (automatic assignment), 188, 192
MAC-based VLAN static assignment, 143 voice VLAN port operation configuration (manual
maintain, 150 assignment), 189, 194
mapping. See VLAN mapping voice VLAN port operation configuration
MRP implementation, 196 restrictions (automatic assignment), 188
MSTP VLAN-to-instance mapping table, 89 voice VLAN port operation configuration
MVRP configuration, 196, 199, 202 restrictions (manual assignment), 189
MVRP GVRP compatibility, 202 voice VLAN QoS priority setting
configuration, 187
PBB data encapsulation, 249
VLAN mapping
port isolation configuration, 77
1\1 application scenario, 223
port link type, 139
1\1 configuration, 229, 235
port-based configuration, 139, 151
1\1 implementation, 225, 226
port-based VLAN assignment (access
port), 140 1\2 application scenario, 225
port-based VLAN assignment (hybrid 1\2 configuration, 234, 240
port), 142 1\2 implementation, 225, 227
port-based VLAN assignment (trunk port), 141 2\2 application scenario, 225
port-based VLAN frame handling, 139 2\2 configuration, 234, 240
private VLAN configuration, 165, 166 2\2 implementation, 225, 227
protocol-based configuration, 149, 156 ARP detection (M\1) (dynamic IP address
protocols and standards, 137 assignment), 230
PVID, 139 ARP snooping (M\1) (static IP address
assignment), 232
PVST, 87
configuration, 223, 228, 235
QinQ basic configuration, 219
DHCP snooping (M\1) (dynamic IP address
QinQ configuration, 213, 219 assignment), 230
317
displaying, 235 voice VLAN information advertisement to IP
M\1 application scenario, 223 phones, 183
M\1 configuration, 229, 235 voice VLAN IP phone access method, 184
M\1 configuration (dynamic IP address voice VLAN IP phone identification method
assignment), 230 (LLDP), 183
M\1 configuration (static IP address voice VLAN IP phone identification method (OUI
assignment), 232 address), 182
M\1 customer-side port (dynamic IP address VPN
assignment), 231 PBB configuration, 243, 246, 250
M\1 customer-side port (static IP address QinQ basic configuration, 219
assignment), 233 QinQ configuration, 213, 219
M\1 implementation, 225, 226 QinQ VLAN transparent transmission
M\1 network-side port (dynamic IP address configuration, 221
assignment), 231 VSI
M\1 network-side port (static IP address PBB B-VLAN configuration, 247
assignment), 233 PBB creation, 247
voice traffic
W
LAN switching LLDP CDP compatibility, 266
LAN switching LLDP configuration WRR queuing
(CDP-compatible), 279 LAN switching LLDP group-based WRR
voice VLAN queuing, 272
assignment mode, 184
assignment mode (automatic), 184
assignment mode (manual), 185
assignment mode+IP phone cooperation, 185
CDP advertisement configuration, 190
configuration, 182, 192
display, 191
host+IP phone connection (in series), 184
information advertisement to IP phone, 183
IP phone access method, 184
IP phone connection (device), 184
IP phone identification method, 182
IP phone identification method (LLDP), 183
IP phone identification method (OUI
address), 182
LLDP advertisement configuration, 190
LLDP enable, 190
LLDP enable restrictions, 190
port mode, 186
port operation configuration (automatic
assignment), 188, 192
port operation configuration (manual
assignment), 189, 194
port operation configuration restrictions
(automatic assignment), 188
port operation configuration restrictions
(manual assignment), 189
QoS priority setting configuration, 187
VoIP
voice VLAN configuration, 182, 192
318