beautypg.com

No agreement check configuration example, Network requirements, Configuration procedure – H3C Technologies H3C S5560 Series Switches User Manual

Page 132: Configuring tc snooping

background image

98

No Agreement Check configuration example

Network requirements

As shown in

Figure 29

, Device A connects to a third-party device that has a different spanning tree

implementation. Both devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream device.

Figure 29 Network diagram

Configuration procedure

# Enable No Agreement Check on GigabitEthernet 1/0/1 of Device A.

system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] stp no-agreement-check

Configuring TC Snooping

As shown in

Figure 30

, an IRF fabric connects to two user networks through double links.

Device A and Device B form an IRF fabric.

The spanning tree feature is disabled on Device A and Device B and enabled on all devices in user
network 1 and user network 2.

The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.

When the network topology changes, it takes time for the IRF fabric to update its MAC address table and

ARP table. During this period, traffic in the network might be interrupted.