beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 7

background image

ii

Configuration guidelines ······································································································································ 29

Configuring a static aggregation group ············································································································· 30

Configuring a dynamic aggregation group ······································································································· 31

Configuring an aggregate interface ···························································································································· 32

Configuring the description of an aggregate interface ····················································································· 32

Enabling link state traps for an aggregate interface ························································································· 32

Shutting down an aggregate interface ··············································································································· 33

Configuring load sharing for link aggregation groups ······························································································ 33

Displaying and maintaining Ethernet link aggregation ····························································································· 34

Ethernet link aggregation configuration examples ····································································································· 34

Layer 2 static aggregation configuration example ···························································································· 34

Layer 2 dynamic aggregation configuration example ······················································································ 36

Port isolation configuration ········································································································································ 39

Introduction to port isolation ········································································································································· 39

Configuring an isolation group ···································································································································· 39

Adding a port to an isolation group ··················································································································· 39

Displaying and maintaining isolation groups ············································································································· 40

Port isolation configuration example···························································································································· 40

Spanning tree configuration ······································································································································ 42

STP ··················································································································································································· 42

STP protocol packets ············································································································································· 42

Basic concepts in STP ············································································································································ 43

Calculation process of the STP algorithm ··········································································································· 44

RSTP ················································································································································································· 49

MSTP ················································································································································································ 50

STP and RSTP limitations ······································································································································· 50

MSTP features ························································································································································ 50

MSTP basic concepts ············································································································································ 50

How MSTP works ·················································································································································· 54

Implementation of MSTP on devices ···················································································································· 55

Protocols and standards ················································································································································ 55

Spanning tree configuration task list ···························································································································· 55

Configuring the spanning tree ······································································································································ 57

Setting the spanning tree mode ··························································································································· 57

Configuring an MST region ································································································································· 58

Configuring the root bridge or a secondary root bridge ·················································································· 58

Configuring the device priority ···························································································································· 59

Configuring the maximum hops of an MST region ··························································································· 60

Configuring the network diameter of a switched network ················································································ 60

Configuring spanning tree timers ························································································································ 61

Configuring the timeout factor ····························································································································· 62

Configuring the maximum port rate ···················································································································· 62

Configuring edge ports ········································································································································· 63

Configuring path costs of ports ···························································································································· 64

Configuring the port priority ································································································································ 66

Configuring the port link type ······························································································································ 66

Configuring the mode a port uses to recognize/send MSTP packets ····························································· 67

Enabling the output of port state transition information ···················································································· 68

Enabling the spanning tree feature ····················································································································· 68

Performing mCheck ··············································································································································· 69

Configuring the VLAN Ignore feature ················································································································· 70

Configuring Digest Snooping ······························································································································· 71

Configuring No Agreement Check······················································································································ 73