192
C
HAPTER
13: MSTP C
ONFIGURATION
C
OMMANDS
This configuration takes effect on the CIST and all the MSTIs. The settings of a port
whether to connect the point-to-point link will be applied to all the MSTIs where
the port belongs. Note that a temporary loop may be redistributed if you configure
a port not physically connected with the point-to-point link as connected to such a
link by force.
Related command:
stp point-to-point
.
Example
# Configure Ethernet2/1/3 to be connected to the point-to-point link.
<SW8800>system-view
System View: return to User View with Ctrl+Z.
[SW8800] stp interface Ethernet2/1/3 point-to-point force-true
stp interface
root-protection
Syntax
stp interface
interface-list
root-protection
undo stp interface
interface-list
root-protection
View
System view
Parameter
interface-list
: Ethernet port list, containing multiple Ethernet ports and expressed
as
interface-list
= {
interface-type interface-number
[
to
interface-type
interface-number
] }&<1-10>. For detail descriptions of
interface-type
and
i
nterface-number
parameters, refer to the corresponding descriptions in
Port
Command Manual
. &<1-10> means that the preceding parameters can be
entered up to 10 times.
Description
Use the
stp interface root-protection
command to enable Root protection on
the switch in system view.
Use the
undo stp interface root-protection
command to restore the default
Root protection state.
By default, Root protection is disabled.
In case of configuration error or malicious attack, the legal primary root may
receive the BPDU with a higher priority and then loose its place, which causes
network topology change errors. Due to the illegal change, the traffic supposed to
travel over the high-speed link may be pulled to the low-speed link and congestion
will occur on the network.
Root protection function is used against such problem. The port configured with
Root protection only plays a role of designated port on every instance. Whenever
such port receives a higher-priority BPDU, that is, it is about to turn into
non-designated port, it will be set to listening state and not forward packets any
more (as if the link to the port is disconnected). So, Root protection takes effect
only when it is enabled on a designated port. If the port has not received any
Summary of Contents for Switch 8807
Page 30: ......
Page 68: ...66 CHAPTER 2 COMMANDS USED TO LOG IN TO SWITCH ...
Page 78: ...76 CHAPTER 3 CONFIGURATION FILE MANAGEMENT COMMANDS ...
Page 96: ...94 CHAPTER 5 SUPER VLAN CONFIGURATION COMMANDS ...
Page 122: ...120 CHAPTER 8 IP PERFORMANCE CONFIGURATION COMMANDS ...
Page 130: ...128 CHAPTER 9 GARP GVRP CONFIGURATION COMMANDS ...
Page 162: ...160 CHAPTER 11 ETHERNET LINK AGGREGATION CONFIGURATION COMMANDS ...
Page 212: ...210 CHAPTER 13 MSTP CONFIGURATION COMMANDS ...
Page 234: ...232 CHAPTER 16 ACL COMMANDS ...
Page 282: ...280 CHAPTER 18 ACL CONTROL COMMANDS TO CONTROL LOGIN USERS ...
Page 293: ......
Page 294: ...292 CHAPTER 19 VLAN ACL CONFIGURATION COMMANDS ...
Page 310: ...308 CHAPTER 20 802 1X CONFIGURATION COMMANDS ...
Page 370: ...368 CHAPTER 21 AAA AND RADIUS HWTACACS PROTOCOL CONFIGURATION COMMANDS ...
Page 398: ...396 CHAPTER 23 STATIC ROUTE CONFIGURATION COMMANDS ...
Page 462: ...460 CHAPTER 25 OSPF CONFIGURATION COMMANDS ...
Page 498: ...496 CHAPTER 26 INTEGRATED IS IS CONFIGURATION COMMANDS ...
Page 548: ...546 CHAPTER 27 BGP CONFIGURATION COMMANDS ...
Page 570: ...568 CHAPTER 30 RECURSIVE ROUTING CONFIGURATION ...
Page 584: ...582 CHAPTER 32 MULTICAST VLAN CONFIGURATION COMMANDS ...
Page 600: ...598 CHAPTER 33 MULTICAST COMMON CONFIGURATION COMMANDS ...
Page 604: ...602 CHAPTER 34 STATIC MULTICAST MAC ADDRESS CONFIGURATION COMMAND ...
Page 656: ...654 CHAPTER 37 MSDP CONFIGURATION COMMANDS ...
Page 682: ...680 CHAPTER 38 MBGP MULTICAST EXTENSION CONFIGURATION COMMANDS ...
Page 762: ...760 CHAPTER 40 BGP MPLS VPN CONFIGURATION COMMANDS ...
Page 808: ...806 CHAPTER 44 HA CONFIGURATION COMMANDS_HA_CONFIGURATION ...
Page 820: ...818 CHAPTER 45 ARP CONFIGURATION COMMANDS ...
Page 824: ...822 CHAPTER 46 ARP TABLE SIZE CONFIGURATION COMMANDS max arp entry config of slot 13 8192 ...
Page 862: ...860 CHAPTER 47 DHCP CONFIGURATION COMMANDS ...
Page 870: ...868 CHAPTER 48 DNS CONFIGURATION COMMANDS ...
Page 972: ...970 CHAPTER 56 SSH TERMINAL SERVICE CONFIGURATION COMMANDS ...
Page 982: ...980 CHAPTER 57 FILE SYSTEM MANAGEMENT COMMANDS ...
Page 1026: ...1024 CHAPTER 60 INFORMATION CENTER ...
Page 1046: ...1044 CHAPTER 63 PORT PACKET STATISTICS COMMANDS ...
Page 1051: ...Ethernet Port Detection Configuration Commands 1049 ...
Page 1052: ...1050 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1053: ...Ethernet Port Detection Configuration Commands 1051 ...
Page 1054: ...1052 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1055: ......
Page 1056: ...1054 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1057: ......
Page 1058: ...1056 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1059: ...Ethernet Port Detection Configuration Commands 1057 ...
Page 1060: ...1058 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1061: ......
Page 1062: ...1060 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1063: ...Ethernet Port Detection Configuration Commands 1061 ...
Page 1064: ...1062 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1065: ......
Page 1066: ...1064 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1090: ...1088 CHAPTER 66 NQA CONFIGURATION COMMANDS ...