188
C
HAPTER
13: MSTP C
ONFIGURATION
Configuring Loop
Prevention
Configuration procedure
Configuration example
Enable the loop prevention function on port Ethernet1/0/1.
<S5500> system-view
System View: return to User View with Ctrl+Z.
[S5500] interface ethernet1/0/1
[S5500-Ethernet1/0/1] stp loop-protection
Configuring TC-BPDU
Attack Prevention
Configuration procedure
Configuration example
Enable the TC-BPDU attack prevention function.
<S5500> system-view
System View: return to User View with Ctrl+Z.
[S5500] stp tc-protection enable
BPDU Tunnel
Configuration
This section contains configuration information for BPDU Tunnel.
Introduction to BPDU
Tunnel
The BPDU tunnel function enables BPDUs to be transparently transmitted between
geographically dispersed user networks through specified VLAN VPNs in operator’s
networks, allowing spanning trees to be generated across these user networks and
keep independent of those of the operator’s networks.
As shown in Figure 44, the upper part is the operator’s network, and the lower part is
the user network. The operator’s network comprises packet ingress/egress devices,
and the user network consists of networks A and B. On the operator’s network,
configure the arriving BPDU packets at the ingress to have MAC addresses in a special
format, and reconvert them back to their original formats at the egress. This is how
transparent transmission is implemented on the operator’s network.
Table 171
Enable the loop prevention function
Operation
Command
Description
Enter system view
system-view
-
Enter Ethernet port view
interface
interface-type
interface-number
-
Enable the loop prevention
function
stp loop-protection
Required
The loop prevention function is
disabled by default.
Table 172
Enable the TC-BPDU attack prevention function
Operation
Command
Description
Enter system view
system-view
-
Enable the TC-BPDU attack
prevention function
stp tc-protection enable
Required
The TC-BPDU attack prevention
function is disabled by default.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...