No agreement check configuration example, Network requirements, Configuration procedure – H3C Technologies H3C S5560 Series Switches User Manual
Page 132: Configuring tc snooping
98
No Agreement Check configuration example
Network requirements
As shown in
, Device A connects to a third-party device that has a different spanning tree
implementation. Both devices are in the same region.
The third-party device (Device B) is the regional root bridge, and Device A is the downstream device.
Figure 29 Network diagram
Configuration procedure
# Enable No Agreement Check on GigabitEthernet 1/0/1 of Device A.
[DeviceA] interface gigabitethernet 1/0/1
[DeviceA-GigabitEthernet1/0/1] stp no-agreement-check
Configuring TC Snooping
As shown in
, an IRF fabric connects to two user networks through double links.
•
Device A and Device B form an IRF fabric.
•
The spanning tree feature is disabled on Device A and Device B and enabled on all devices in user
network 1 and user network 2.
•
The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.
When the network topology changes, it takes time for the IRF fabric to update its MAC address table and
ARP table. During this period, traffic in the network might be interrupted.
- H3C S5130 Series Switches H3C S5120 Series Switches H3C SR8800 H3C SR6600-X H3C SR6600 H3C MSR 5600 H3C MSR 50 H3C MSR 3600 H3C MSR 30 H3C MSR 2600 H3C MSR 20-2X[40] H3C MSR 20-1X H3C MSR 930 H3C MSR 900 H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C WX3000 Series Unified Switches H3C LSWM1WCM10 Access Controller Module H3C LSWM1WCM20 Access Controller Module H3C LSQM1WCMB0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module H3C LSBM1WCM2A0 Access Controller Module