
118
Figure 41 TC Snooping application scenario
To avoid traffic interruption, you can enable TC Snooping on the IRF fabric. After receiving a
TC-BPDU through a port, the IRF fabric updates MAC address table and ARP table entries
associated with the port's VLAN. In this way, TC Snooping prevents topology change from
interrupting traffic forwarding in the network. For more information about the MAC address table and
the ARP table, see "Configuring the MAC address table" and
Layer 3—IP Services Configuration
Guide
.
Configuration restrictions and guidelines
When you configure TC Snooping, follow these restrictions and guidelines:
•
TC Snooping and the spanning tree feature are mutually exclusive. You must globally disable
the spanning tree feature before enabling TC Snooping.
•
TC Snooping does not support the PVST mode.
Configuration procedure
To enable TC Snooping:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Globally disable the spanning
tree feature.
undo stp global enable
By default, the spanning tree
feature is globally disabled.
3.
Enable TC Snooping.
stp tc-snooping
By default, TC Snooping is
disabled.
Configuring protection features
A spanning tree device supports the following protection features:
•
BPDU guard
•
Root guard
•
Loop guard
•
Port role restriction