114
Configuration restrictions and guidelines
When you configure Digest Snooping, follow these restrictions and guidelines:
•
Before you enable Digest Snooping, make sure associated devices of different vendors are
connected and run spanning tree protocols.
•
With Digest Snooping enabled, in-the-same-region verification does not require comparison of
configuration digest. The VLAN-to-instance mappings must be the same on associated ports.
•
To make Digest Snooping take effect, you must enable Digest Snooping both globally and on
associated ports. As a best practice, enable Digest Snooping on all associated ports first and
then enable it globally. This will make the configuration take effect on all configured ports and
reduce impact on the network.
•
To prevent loops, do not enable Digest Snooping on MST region edge ports.
•
As a best practice, enable Digest Snooping first and then enable the spanning tree feature. To
avoid traffic interruption, do not configure Digest Snooping when the network is already working
well.
Configuration procedure
Use this feature on when your H3C device is connected to a third-party device that uses its private
key to calculate the configuration digest.
To configure Digest Snooping:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter Layer 2 Ethernet
interface or Layer 2
aggregate interface view.
interface interface-type
interface-number
N/A
3.
Enable Digest Snooping on
the interface.
stp config-digest-snooping
By default, Digest Snooping is
disabled on ports.
4.
Return to system view.
quit
N/A
5.
Enable Digest Snooping
globally.
stp global
config-digest-snooping
By default, Digest Snooping is
disabled globally.
Digest Snooping configuration example
Network requirements
As shown in
, Device A and Device B connect to Device C, which is a third-party device. All
these devices are in the same region.
Enable Digest Snooping on the ports of Device A and Device B that connect to Device C, so that the
three devices can communicate with one another.