47
Figure 18 TC Snooping application scenario
To avoid traffic interruption, you can enable TC Snooping on the IRF fabric. After receiving a
TC-BPDU through a port, the IRF fabric updates MAC address table and ARP table entries
associated with the port's VLAN. In this way, TC Snooping prevents topology change from
interrupting traffic forwarding in the network. For more information about the MAC address table and
the ARP table, see "Configuring the MAC address table" and
Layer 3—IP Services Configuration
Guide
.
Restrictions and guidelines
•
TC Snooping and the spanning tree feature are mutually exclusive. You must globally disable
the spanning tree feature before enabling TC Snooping.
•
The priority of BPDU tunneling is higher than that of TC Snooping. When BPDU tunneling is
enabled on a port, the TC Snooping feature does not take effect on the port.
•
TC Snooping does not support the PVST mode.
Procedure
1.
Enter system view.
system-view
2.
Globally disable the spanning tree feature.
undo stp global enable
When the device starts up with initial settings, the spanning tree feature is globally disabled.
When the device starts up with factory defaults, the spanning tree feature is globally enabled.
For more information about the initial settings and factory defaults, see
Fundamentals
Configuration Guide
.
3.
Enable TC Snooping.
stp tc-snooping
By default, TC Snooping is disabled.
Configuring protection features
Spanning tree protection tasks at a glance
All spanning tree protection tasks are optional.
•
Summary of Contents for S6850 Series
Page 108: ...48 WGE1 0 3 32768 49153 50100 0x7b 0001 0001 0001 ACDEF...
Page 259: ...21 6 N A 200 6...
Page 337: ...ii...