Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							35 
    [DeviceA-Ten-GigabitEthernet1/1/2] undo shutdown 
    [DeviceA-Ten-GigabitEthernet1/1/2] save 
    # Create IRF port 1 on Device B, bind Ten-GigabitEthernet 2/1/1 to the IRF port, and save the 
    configuration. 
     system-view 
    [DeviceB] interface ten-gigabitethernet 2/1/1 
    [DeviceB-Ten-GigabitEthernet2/1/1] shutdown 
    [DeviceB] irf-port 2/1 
    [DeviceB-irf-port2/1] port group interface ten-gigabitethernet 2/1/1 
    [DeviceB-irf-port2/1] quit 
    [DeviceB] interface ten-gigabitethernet 2/1/1 
    [DeviceB-Ten-GigabitEthernet2/1/1] undo shutdown 
    [DeviceB-Ten-GigabitEthernet2/1/1] save 
    # Activate IRF port conf iguration on Device A. 
    [DeviceA-Ten-GigabitEthernet1/1/2] quit 
    [DeviceA] irf-port-configuration active 
    # Activate IRF port configuration on Device B. 
    [DeviceB-Ten-GigabitEthernet2/1/1] quit 
    [DeviceB] irf-port-configuration active 
    After the IRF port configuration is activated, the  two devices automatically elect a master. In this 
    example, Device A is the master. Device B auto matically reboots and joins the Device A as a 
    subordinate switch to form an IRF fabric. The system name of the IRF fabric is  DevcieA. 
    4. Configure ARP MAD: 
    # Enable MSTP globally on the IRF fabric to prevent loops. 
     system-view 
    [DeviceA] stp enable 
    # Connect the ARP MAD links as shown in  Figure 16. 
    # Configure the IR
    F fabric to change its brid ge MAC address as soon as the master leaves. 
    [DeviceA] undo irf mac-address persistent 
    # Create VLAN 3, and add port GigabitEthernet  1/0/1 (on Device A) and port GigabitEthernet 
    2/0/1 (on Device B) to VLAN 3. 
    [DeviceA] vlan 3 
    [DeviceA-vlan3] port gigabitethernet 1/0/1 gigabitethernet 2/0/1 
    [DeviceA-vlan3] quit 
    # Create VLAN-interface 3, assign it an IP  address, and enable ARP MAD on the interface. 
    Because ARP MAD is not run between IRF domains, you can use the default value 0. 
    [DeviceA] interface vlan-interface 3 
    [DeviceA-Vlan-interface3] ip address 192.168.2.1 24 
    [DeviceA-Vlan-interface3] mad arp enable 
     You need to assign a domain ID (range: 0-4294967295) 
     [Current domain is: 0]: 
     The assigned  domain ID is: 0 
    5.  Configure Device C: 
    # Enable MSTP globally on Device C to prevent loops. 
     system-view 
    [DeviceC] stp enable  
    						
    							36 
    # Create VLAN 3, and add GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 to VLAN 3. 
    [DeviceC] vlan 3 
    [DeviceC-vlan3] port gigabitethernet 1/0/1 gigabitethernet 1/0/2 
    [DeviceC-vlan3] quit 
      
    						
    							37 
    Index 
    A B C D E F G H I M P S  
    A 
    Accessing the IRF fabric,17 
    A
    
    pplication scenario,1  
    As
    
    signing a member ID to each IRF member switch, 14 
    A
    
    ssigning an IRF domain ID to the IRF fabric, 18 
    B 
    Ba
    
    sic concepts, 2 
    Binding ph
    
    ysical ports to IRF ports, 16 
    C 
    C
    
    onfiguration examples, 29 
    C
    
    onfiguration synchronization mechanism, 6 
    C
    
    onfiguring a member switch description, 19 
    C
    
    onfiguring IRF bridge MAC persistence, 20 
    C
    
    onfiguring IRF link load sharing mode, 19 
    Co
    
    nfiguring MAD, 22 
    C
    
    onnecting physical IRF ports, 15 
    D 
    Displa
    
    ying and maintaining an IRF fabric,28  
    E 
    Enabling so
    
    ftware auto-update for system software 
    image synchronization, 21  F 
    F
    
    ile system naming conventions,
    5 
    G 
    Gene
    
    ral restrictions and configuration guidelines, 11 
    H 
    Har
    
    dware compatibility, 1 
    I 
    In
    
    terface naming conventions,4  
    IRF
    
     benefits, 1 
    I
    
    RF multi-active detection, 6 
    M 
    M
    
    aster election, 6 
    P 
    P
    
    lanning the IRF fabric setup, 13 
    S 
    S
    
    etting the IRF link down report delay, 22 
    S
    
    etup and configuration task list, 12 
    S
    
    pecifying a priority for each member switch, 14 
      
    						
    							i 
    Contents 
    Configuring Ethernet interfaces ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
     1 
    Ethernet interface naming conventions ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ················ 1 
    Performing general configurations ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    · 1 
    Configuring a combo interface  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·  1 
    Configuring basic settings of an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    · 2 
    Shutting down an Et hernet interface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ········· 3 
    Configuring flow control on  an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    · 3 
    Configuring link state change suppres sion on an Ethernet interface ··················\
    ··················\
    ··················\
    ······ ······ 4 
    Configuring loopback testing on  an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    · ··············· 5 
    Configuring the link mode of an Ethernet  interface (available only on the 5500 EI) ··················\
    ··················\
    ···  6 
    Configuring jumbo frame support ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ········· 6 
    Enabling the auto power-down functi on on an Ethernet interface ··················\
    ··················\
    ··················\
    ·········· ······ 7 
    Configuring a Layer 2  Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··············· 7 
    Layer 2 Ethernet interface  configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ···· 7 
    Configuring a  port group ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ················ 8 
    Configuring a MAC Address for an Ethernet  port (available only on the 5500 SI) ··················\
    ··················\
    ·····  9 
    Setting speed options for auto negotiation on an Ethernet interface ··················\
    ··················\
    ··················\
    ····· ······· 9 
    Configuring stor m suppression ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ········· 10 
    Setting the statistics polling in terval ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ············ 11 
    Enabling loopback detection on  an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ·· ··········· 11 
    Setting the MDI mode of  an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ········· ················· 13 
    Enabling bridging on an  Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    · 14 
    Testing the cable connection  of an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    · ·············· 14 
    Configuring storm control on  an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ···· ··············· 15 
    Setting the MTU for a Layer 3 Ethernet inte rface (available only on the 5500 EI) ··················\
    ··················\
    ·········· ··· 16 
    Displaying and maintaining  an Ethernet interface ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ····· 17 
    Configuring loopback an d null interfaces ·················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ········ 18 
    Configuring a loo pback interface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················ 18 
    Introduction to the loopback interface··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ······ 18 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 18 
    Configuring a null interface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ···· 19 
    Introduction to the null interface  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  19 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 19 
    Displaying and maintaining l oopback and null interfaces ··················\
    ··················\
    ··················\
    ················· ················· 19 
    Bulk configuring interfaces ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    · 21 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    ····· 21 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 21 
    Configuring the MAC address table ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········· 22 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  22 
    How a MAC address table entry is created ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  22 
    Types of MAC address table entries ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ····· 23 
    MAC address table-base d frame forwarding ··················\
    ··················\
    ··················\
    ··················\
    ·············· ·············· 23 
    Configuring static, dynamic, and bl ackhole MAC address table entries ··················\
    ··················\
    ··················\
    ···· ······ 23 
    Adding or modifying a static, dynamic, or blackhole MAC address table entry in system view ················  23 
    Adding or modifying a static or dynamic MAC address table entry in interface view ··················\
    ···············  24 
    Disabling MAC address learning ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  24 
    Disabling global MAC address learning ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    · 24  
    						
    							ii 
    Disabling MAC address learning on ports ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
     24 
    Disabling MAC address learning on a VLAN (available only  on the 5500 EI) ··················\
    ··················\
    ········· 25 
    Configuring the aging timer for dynamic MAC address entries  ··················\
    ··················\
    ··················\
    ··················\
    ·······  25 
    Configuring the MAC learning limit on ports ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
     26 
    Enabling MAC addr ess roaming ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ····· 26 
    Displaying and maintainin g MAC address tables ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ·· 28 
    MAC address table conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ······· 28 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  28 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 29 
    Configuring MAC  Information ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············· 30 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  30 
    Introduction to MAC Information ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ········ 30 
    How MAC Inform ation works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ······· 30 
    Configuring MAC Information ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················· 30 
    Enabling MAC Inform ation globally ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ···· 30 
    Enabling MAC Informatio n on an interface ··················\
    ··················\
    ··················\
    ··················\
    ·············· ················· 30 
    Configuring MAC In formation mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ·· 31 
    Configuring the interval for sending Syslog or trap messages  ··················\
    ··················\
    ··················\
    ··················\
    · 31 
    Configuring the MAC Information queue length  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  31 
    MAC Information configuration example ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ········· 32 
    Configuring Ethernet  link aggregation ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ·········· 33 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  33 
    Basic concepts ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······················\
    ··················\
    ··· 33 
    Aggregating links in static mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········· 36 
    Aggregating links in  dynamic mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ···· 37 
    Load-sharing criteria for link aggregatio n groups ··················\
    ··················\
    ··················\
    ··················\
    ····· ················ 38 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 39 
    Ethernet link aggregation configuration task list  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  39 
    Configuring an aggregation group ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ············· 39 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 40 
    Configuring a static  aggregation group ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··· 40 
    Configuring a dynamic  aggregation group ··················\
    ··················\
    ··················\
    ··················\
    ··············· ················ 41 
    Configuring an aggr egate interface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ·············· 43 
    Configuring the description of an aggregate interface  ··················\
    ··················\
    ··················\
    ··················\
    ············· 43 
    Configuring the MTU of a Layer 3 aggregate interface (available only on the 5500 EI) ··················\
    ··········  44 
    Enabling link state traps for an aggregate interface ··················\
    ··················\
    ··················\
    ··················\
    ·· ··············· 44 
    Limiting the number of Selected  ports for an aggregation group ··················\
    ··················\
    ··················\
    ·········· ···· 45 
    Shutting down an a ggregate interface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··· 46 
    Restoring the default settings  for an aggregate interface ··················\
    ··················\
    ··················\
    ··············· ············ 47 
    Configuring load sharing for link aggregation groups  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····  47 
    Configuring load-sharing criteria for link aggregation groups ··················\
    ··················\
    ··················\
    ··········· ······· 47 
    Enabling local-first load shar ing for link aggregation ··················\
    ··················\
    ··················\
    ··················\
     ··············· 48 
    Enabling link-aggregation traffic redirection  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  49 
    Displaying and maintaining Ethernet link aggregation ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    · 50 
    Ethernet link aggregation  configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ····· 50 
    Layer 2 static aggregatio n configuration example ··················\
    ··················\
    ··················\
    ··················\
    ······ ·············· 51 
    Layer 2 dynamic aggregatio n configuration example ··················\
    ··················\
    ··················\
    ··················\
    ····· ········· 53 
    Layer 3 static aggregatio n configuration example ··················\
    ··················\
    ··················\
    ··················\
    ······ ·············· 55 
    Layer 3 dynamic aggregatio n configuration example ··················\
    ··················\
    ··················\
    ··················\
    ····· ········· 56 
    Configuring port isolation  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  58 
    Assigning a port to the isolation group ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 58 
    Displaying and maintainin g the isolation group ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ······ 58 
    Port isolation configuration example··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··············· 59  
    						
    							iii 
    Configuring spanning tree protocols ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··········· 60 
    STP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ··················\
    ·· 60 
    STP protocol packets ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ················· 60 
    Basic concepts in STP  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  61 
    Calculation process of the STP algorithm ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··· 62 
    RSTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ··················\
    · 67 
    PVST ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ··············  67 
    MSTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ·············  68 
    STP, RSTP, and PVST limitations ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ········· 68 
    MSTP features ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ··· 68 
    MSTP basic concepts ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··············· 68 
    How MSTP works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················ 72 
    Implementation of MSTP on devices ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  72 
    Protocols and standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ····· 73 
    Spanning tree configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ················· 73 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 73 
    STP configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················ 73 
    RSTP configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··············· 74 
    PVST configuration task list··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ·············· 75 
    MSTP configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ············· 76 
    Setting the spanning tree mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
     77 
    Configuring an MST region ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    · 78 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 78 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 78 
    Configuring the root bridge or  a secondary root bridge ··················\
    ··················\
    ··················\
    ··················\
     ··················\
     79 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 79 
    Configuring the current device as the root  bridge of a specific spanning tree ··················\
    ··················\
    ··········  80 
    Configuring the current device as a secondary  root bridge of a specific spanning tree ··················\
    ············  80 
    Configuring the device priority ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  80 
    Configuring the maximum hops of an MST region ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    · 81 
    Configuring the network diameter of a switched network  ··················\
    ··················\
    ··················\
    ··················\
    ················· 81 
    Configuring spanning tree timers ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················· 82 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 82 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 83 
    Configuring the timeout factor ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ·· 83 
    Configuring the maximum port rate ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ·············· 84 
    Configuring edge ports ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ····· 84 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 84 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 84 
    Configuring path costs of ports ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    · 85 
    Specifying a standard for the device to use  when it calculates the default path cost ··················\
    ·················  85 
    Configuring path costs of ports ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  87 
    Configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·············· 87 
    Configuring the port priority ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    ···· 88 
    Configuring the port link type ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ··· 88 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 88 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 88 
    Configuring the mode a port uses  to recognize/send MSTP packets ··················\
    ··················\
    ··················\
    ········· ······· 89 
    Enabling outputting port state transition information  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  90 
    Enabling the spanning tree feature ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················ 90 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 90 
    Enabling the spanning tree feat ure (in STP/RSTP/MSTP mode) ··················\
    ··················\
    ··················\
    ·············· ·· 90 
    Enabling the spanning tree  feature (in PVST mode) ··················\
    ··················\
    ··················\
    ··················\
    ····· ············· 91 
    Performing mCheck  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·······  91  
    						
    							iv 
    Performing mCheck globally ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ·········· 92 
    Performing mCheck in interface view ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ···· 92 
    Configuring Dige st Snooping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
     92 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 92 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 93 
    Digest Snooping configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·  93 
    Configuring No Agreement Check ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ············ 94 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············· 95 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 95 
    No Agreement Check co nfiguration example··················\
    ··················\
    ··················\
    ··················\
    ··············· ············· 96 
    Configuring TC  snooping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ··· 96 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 97 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 97 
    Configuring protection functions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
     98 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············· 98 
    Enabling BPDU guard ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ·············· 98 
    Enabling root guard ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ················· 98 
    Enabling loop guard ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ················ 99 
    Enabling TC-BPDU guard··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ········· 100 
    Enabling BPDU drop ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ············· 100 
    Displaying and maintain ing the spanning tree ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ····· 101 
    Spanning tree config uration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ·········· 102 
    MSTP configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ······· 102 
    PVST configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········ 105 
    Configuring BPDU tunneling  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  109 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  109 
    Background ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··························\
    ··················\
    ·· 109 
    BPDU tunneling implementation  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  110 
    Enabling BPDU tunneling ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    · 111 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 111 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 112 
    Enabling BPDU tunneling  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  112 
    Configuring destination multicast MAC address for BPDUs ··················\
    ··················\
    ··················\
    ················· ············· 112 
    BPDU tunneling configuration examples  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  113 
    BPDU tunneling for STP configuration example ··················\
    ··················\
    ··················\
    ··················\
    ·········· ············· 113 
    BPDU tunneling for PVST  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ········· ············ 114 
    Configurin g VLANs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··················\
     116 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  116 
    VLAN fundamentals··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····················\
    ············· 116 
    VLAN types ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ·· 117 
    Protocols and standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············ 118 
    Configuring basic VLAN se ttings··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ·············· 118 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 118 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 118 
    Configuring basic settings  of a VLAN interface ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ····· 119 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 119 
    VLAN interface conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    · 120 
    Configuring port-based VLANs  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  121 
    Introduction to port-based VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ······ 121 
    Assigning an access  port to a VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ·· 122 
    Assigning a trunk port to a VLAN··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ····· 123 
    Assigning a hybrid  port to a VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ···· 124 
    Port-based VLAN conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ················· ················· 125  
    						
    							v 
    Configuring MAC-based VLANs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 127 
    Introduction to MAC-based VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··· 127 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 129 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 129 
    MAC-based VLAN conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ············· 132 
    Configuring protoc ol-based VLANs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··········· 134 
    Introduction to prot ocol-based VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··· 134 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 134 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 135 
    Protocol-based VLAN configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  135 
    Configuring IP subnet-based VLANs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··········· 138 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 138 
    IP subnet-based VLAN  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ············ ············· 139 
    Displaying and maintaining VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··········· 141 
    Configuring a super VLAN (ava ilable only on the 5500 EI) ·················\
    ··················\
    ··················\
    ················· ········· 142 
    Overview  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  142 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ·· 142 
    Displaying and mainta ining super VLAN ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ······· 144 
    Super VLAN configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ·········· 144 
    Configuring an is olate-user-VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ·········· 147 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  147 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 148 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ·· 148 
    Displaying and maintaining isolate-user-VLAN  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  149 
    Isolate-user-VLAN configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ········· 150 
    Configuring a voice VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············· 153 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  153 
    OUI addresses ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······················\
    ··················\
     153 
    Voice VLAN assignment modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ···· 153 
    Security mode and normal  mode of voice VLANs ··················\
    ··················\
    ··················\
    ··················\
    ·········· ········· 155 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ·· 156 
    Configuring QoS priority settings fo r voice traffic on an interface ··················\
    ··················\
    ··················\
    ····· ············· 157 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 157 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 157 
    Configuring a port to operate in au tomatic voice VLAN assignment mode  ··················\
    ··················\
    ··················\
    ···· 157 
    Configuring a port to operate in ma nual voice VLAN assignment mode ··················\
    ··················\
    ··················\
    ······ ·· 158 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 158 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 158 
    Displaying and mainta ining voice VLAN ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ······· 159 
    Voice VLAN configur ation examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ·········· 159 
    Automatic voice VLAN mode  configuration example ··················\
    ··················\
    ··················\
    ··················\
    ······· ······ 159 
    Manual voice VLAN assignment  mode configuration example ··················\
    ··················\
    ··················\
    ···············  161 
    Configuring GVRP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    · 164 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  164 
    GARP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ································\
    ··················\
    ······ 164 
    GVRP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ··  167 
    Protocols and standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············ 167 
    GVRP configuratio n task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ·· 167 
    Configuring GVRP functions  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  168 
    Configuration restrictions and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·· 168 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 168 
    Configuring the GARP timers ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················· 169  
    						
    							vi 
    Displaying and maintaining GVRP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·················  170 
    GVRP configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··············· 170 
    GVRP normal registration mode configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ········· 170 
    GVRP fixed registration mode configuration example ··················\
    ··················\
    ··················\
    ··················\
    ···· ········ 172 
    GVRP forbidden registration mode configurati on example ··················\
    ··················\
    ··················\
    ··················\
     ···· 173 
    Configuring QinQ  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··  176 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  176 
    Background and benefits ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  176 
    How QinQ works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ·············· 176 
    QinQ frame structure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ·············· 177 
    Implementations of QinQ ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·········· 178 
    Modifying the TPID  in a VLAN tag ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ···· 178 
    Protocols and  standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············ 179 
    QinQ configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ·· 179 
    Configuring basic QinQ ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    · 180 
    Enabling basic QinQ ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ············· 180 
    Configuring VLAN trans parent transmission ··················\
    ··················\
    ··················\
    ··················\
    ············· ··············· 180 
    Configuring selective QinQ ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
     181 
    Configuring an outer VL AN tagging policy ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··············· 181 
    Configuring an inner-outer VL AN 802.1p priority mapping  ··················\
    ··················\
    ··················\
    ··················\
    ··  183 
    Configuring inner VLAN ID substitution (available only on the 5500 EI) ··················\
    ··················\
    ·················  184 
    Configuring the TPID value in VLAN tags ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  185 
    Configuring the TPID value on the 5500 EI ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  185 
    Configuring the TPID value on the 5500 SI ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  185 
    QinQ configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··············· 186 
    Basic QinQ configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  186 
    Selective QinQ configuration example (configuring an outer VLAN tagging policy in port-based approach)
     ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
    ············ 188
     
    Selective QinQ configuration example (configuring an  outer VLAN tagging policy in QoS policy-based 
    approach)  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ············  191
     
    Selective QinQ configuration example (inner VLAN ID substitution)··················\
    ··················\
    ··················\
    ·······  194 
    Configuring VLAN mapping (available only on the 5500 EI) ··················\
    ··················\
    ··················\
    ··················\
    ·····  199 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  199 
    Application scenario of one-to-one and many-to-one VLAN mapping ··················\
    ··················\
    ··················\
    ····  199 
    Application scenario of two-to-two VLAN  mapping ··················\
    ··················\
    ··················\
    ··················\
    ······· ········· 200 
    Concepts and terms ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ·············· 201 
    VLAN mapping implementations ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··· 202 
    VLAN mapping conf iguration tasks ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··········· 203 
    Configuring one-to-one VLAN  mapping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ······· 204 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 204 
    Configuring an uplink policy  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      204 
    Configuring a downlink policy ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ······· 204 
    Configuring the customer-side port  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  205 
    Configuring the network-side port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······ 205 
    Configuring many-to-one VLAN  mapping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ····· 206 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 206 
    Enabling DHCP snooping  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  206 
    Enabling ARP detection in SVLANs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··· 207 
    Configuring an uplink policy  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      207 
    Configuring the customer-side port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  207 
    Configuring the network-side port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······ 208 
    Configuring two-to-two VLAN mapping  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  208 
    Configuring an uplink policy for the customer-side port ··················\
    ··················\
    ··················\
    ················· ·········· 209  
    						
    							vii 
    Configuring an uplink policy for the network-side port ··················\
    ··················\
    ··················\
    ··················\
     ··········· 209 
    Configuring a downlink policy  for the customer-side port ··················\
    ··················\
    ··················\
    ················ ········ 210 
    Configuring the customer-side port  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  211 
    Configuring the network-side port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······ 211 
    VLAN mapping config uration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ······ 212 
    One-to-one and many-to-one VLAN mapping configuration example  ··················\
    ··················\
    ··················\
    ····· 212 
    Two-to-two VLAN mapping configuration example ··················\
    ··················\
    ··················\
    ··················\
    ········· ········ 218 
    Configurin g LLDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ··· 221 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  221 
    Background ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··························\
    ··················\
    ·· 221 
    Basic concepts ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    · 221 
    How LLDP works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················ 225 
    Protocols and standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············ 226 
    LLDP configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ···· 226 
    Performing basic LLDP configuration  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  227 
    Enabling LLDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    · 227 
    Setting the LLDP operating mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ······ 227 
    Setting the LLDP re-i nitialization delay ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ······ 227 
    Enabling LLDP polling··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ·············· 228 
    Configuring the adv ertisable TLVs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······ 228 
    Configuring the management addre ss and its encoding format ··················\
    ··················\
    ··················\
    ··············  229 
    Setting other LLDP parameters  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  230 
    Setting an encapsulation format for LLDPDUs ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··············· 230 
    Configuring CDP compatibility ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ················ 231 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 231 
    Configuring CDP compatibility ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ······· 231 
    Enabling LLDP to automatically discover IP phones  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  232 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 232 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 233 
    Configuring LLDP to advertis e a specific voice VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    · 233 
    Configuration  guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 233 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 234 
    Dynamically advertising server-assigned VLANs th rough LLDP ··················\
    ··················\
    ··················\
    ·············· ··········· 235 
    Configuring LLDP  trapping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    · 235 
    Displaying and maintaining LLDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ·············· 235 
    LLDP configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················· 236 
    Basic LLDP configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ····· 236 
    CDP-compatible LLDP configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  239 
    Configuring a service loopback group (available only on the 5500 EI) ··················\
    ··················\
    ··················\
    ···· ·· 241 
    Overview  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  241 
    Service types of service loopback groups ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
     241 
    Requirements on serv ice loopback ports ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
     241 
    States of servic e loopback ports ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········ 241 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 242 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ·· 242 
    Displaying and maintainin g service loopback groups  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  243 
    Service loopback group configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  243 
    Network requirements ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  243 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 243 
    Configuring MVRP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
     245 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  245 
    Introduction to MRP ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ················ 245 
    MVRP registration modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·········· 247  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide