background image

 

7-17 

z

 

When the root bridge of an instance fails or is shut down, the secondary root bridge (if you have 
specified one) can take over the role of the primary root bridge. However, if you specify a new 
primary root bridge for the instance then, the secondary root bridge will not become the root bridge. 
If you have specified multiple secondary root bridges for an instance, when the root bridge fails, 
MSTP will select the secondary root bridge with the lowest MAC address as the new root bridge. 

Configuring the AP as the root bridge of a spanning tree 

Follow these steps to configure the AP as the root bridge of a spanning tree: 

To do... 

Use the command... 

Remarks 

Enter system view 

system-view

 — 

Configure the AP as the 
root bridge of a spanning 
tree 

 

stp 

[

 instance instance-id 

root 

primary

 

Required 
By default, the AP does not function as the 
root bridge of any spanning tree. 

 

Configuring the AP as a secondary root bridge of a spanning tree 

Follow these steps to configure the AP as a secondary root bridge of a spanning tree: 

To do... 

Use the command... 

Remarks 

Enter system view 

system-view

 — 

Configure the AP as a 
secondary root bridge of a 
spanning tree

 

stp 

[

 instance instance-id 

root secondary

 

Required 
By default, the AP does not function as a 
secondary root bridge.

 

 

 

z

 

After specifying the AP as the root bridge or a secondary root bridge, you cannot change the 
priority of the AP. 

z

 

Alternatively, you can also configure the AP as the root bridge by setting the priority of the AP to 0. 
For more information about AP priority configuration, see 

Configuring the Priority of the AP

 

Configuring the MSTP Work Mode of the AP 

Being mutually compatible, MSTP and RSTP can recognize each other’s protocol packets. However, 
STP cannot recognize MSTP packets. For hybrid networking with legacy STP devices and for full 
interoperability with RSTP-enabled devices, MSTP supports three work modes: STP-compatible mode, 
RSTP mode, and MSTP mode.

 

z

 

In STP-compatible mode, all ports of the device send out STP BPDUs, 

z

 

In RSTP mode, all ports of the device send out RSTP BPDUs. If the device detects that it is 
connected with a legacy STP device, the port connecting with the legacy STP device will 
automatically migrate to STP-compatible mode. 

z

 

In MSTP mode, all ports of the device send out MSTP BPDUs. If the device detects that it is 
connected with a legacy STP device, the port connecting with the legacy STP device will 
automatically migrate to STP-compatible mode. 

Make this configuration on the root bridge and on the leaf nodes separately.  

Summary of Contents for WA Series

Page 1: ...H3C WA Series WLAN Access Points Layer 2 LAN Switching Configuration Guide Hangzhou H3C Technologies Co Ltd http www h3c com Document Version 6W100 20100910...

Page 2: ...re Secware Storware NQA VVG V2 G Vn G PSPT XGbus N Bus TiGem InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co Ltd All other trademarks that may be mentioned in this manual are the...

Page 3: ...A series Conventions This section describes the conventions used in this documentation set Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter...

Page 4: ...uments Purposes Marketing brochures Describe product specifications and benefits Product description and specifications Technology white papers Provide an in depth description of software features and...

Page 5: ...tation on the World Wide Web at http www h3c com Click the links on the top navigation bar to obtain different categories of product documentation Technical Support Documents Technical Documents Provi...

Page 6: ...nd Null Interface Configuration 5 1 Loopback Interface 5 1 Introduction to Loopback Interface 5 1 Configuring a Loopback Interface 5 1 Null Interface 5 2 Introduction to Null Interface 5 2 Configuring...

Page 7: ...nfiguring the Mode a Port Uses to Recognize Send MSTP Packets 7 25 Enabling MSTP 7 26 Performing mCheck 7 27 Configuring Digest Snooping 7 28 Configuring No Agreement Check 7 30 Configuring Protection...

Page 8: ...ess points include the WA2200 series and WA2600 series Table 1 1 shows the applicable models and software versions Table 1 1 Applicable models and software versions Series Model Software version WA221...

Page 9: ...Not supported Supported 802 11n radio mode Not supported Supported 802 11n bandwidth mode Not supported Supported WLAN Configuration Guide 802 11n rate configuration Not supported Supported Optical E...

Page 10: ...that support the 802 11b g radio mode support this command Only APs that support the 802 11b g radio mode support this command radio type Keywords dot11an and dot11gn not supported Supported WLAN serv...

Page 11: ...hing Command Reference The maximum number of unknown unicast packets allowed on an Ethernet interface per second unicast suppression ratio pps max pps pps max pps ranges from 1 to 148810 pps max pps r...

Page 12: ...enting Layer 2 fast forwarding This document describes Layer 2 Ethernet interface attributes and configuration on the AP Configuring Basic Settings of an Ethernet Interface You can set an Ethernet int...

Page 13: ...d sending packets In this way flow control helps avoid packet drops Follow these steps to enable flow control on an Ethernet interface To do Use the command Remarks Enter system view system view Enter...

Page 14: ...ace Task Remarks Configuring Storm Suppression Optional Applicable to Layer 2 Ethernet interfaces Setting the Interface Statistics Polling Interval Optional Applicable to Layer 2 Ethernet interfaces E...

Page 15: ...terfaces Enabling Loopback Detection on an Ethernet Interface If an interface receives a packet that it sent out a loop has occurred Loops may cause broadcast storms which degrade network performance...

Page 16: ...oopback detection control on a trunk or hybrid port loopback detection control enable Optional Disabled by default z To use loopback detection on an Ethernet interface you must enable the function bot...

Page 17: ...4 6 To do Use the command Remarks Display the information about the loopback function display loopback detection Available in any view...

Page 18: ...an AP you can streamline the rule by configuring it to permit or deny packets carrying the loopback interface address identifying the AP Note that when a loopback interface is used for source address...

Page 19: ...of a static route to a specific network segment any packets routed to the network segment are dropped The null interface provides you a simpler way to filter packets than ACL In other words you can fi...

Page 20: ...s display interface loopback interface number Available in any view Display information about the null interface display interface null 0 Available in any view Clear the statistics on a loopback inter...

Page 21: ...s document covers only the configuration of static dynamic and blackhole unicast MAC address table entries Overview An AP maintains a MAC address table for frame forwarding Each entry in this table in...

Page 22: ...port different from the one where the real MAC address is connected to the AP will create an entry for the forged MAC address and forward frames destined for the legal user to the hacker instead To en...

Page 23: ...be performed in any order Configuring MAC Address Entries Usually an AP can populate its MAC address table automatically by learning the source MAC addresses of incoming frames To improve port securi...

Page 24: ...rce MAC addresses Disabling MAC address learning globally Disabling MAC address learning globally disables the learning function on all ports Follow these steps to disable MAC address learning globall...

Page 25: ...ivity for a long time all the dynamic entries in the MAC address table maintained by the AP will be deleted When it happens the AP broadcasts a large amount of data packets which may be listened to by...

Page 26: ...ciously on the network you can add a destination blackhole MAC address entry for the MAC address to drop all packets destined for the host for security sake z Set the aging timer for dynamic MAC addre...

Page 27: ...agement protocol the Spanning Tree Protocol STP eliminates Layer 2 loops by selectively blocking redundant links in a network and in the mean time allows for link redundancy Like many other protocols...

Page 28: ...e root bridge after network convergence only the root bridge generates and sends out configuration BPDUs at a certain interval and the other bridges just forward the BPDUs 2 Root port On a non root br...

Page 29: ...anning tree calculation Important fields in a configuration BPDU include z Root bridge ID consisting of the priority and MAC address of the root bridge z Root path cost the cost of the path to the roo...

Page 30: ...nfiguration BPDU of this port z If the received configuration BPDU has a higher priority than that of the configuration BPDU generated by the port the bridge replaces the content of the configuration...

Page 31: ...h the port role is to be defined and acts depending on the comparison result z If the calculated configuration BPDU is superior the bridge considers this port as the designated port and replaces the c...

Page 32: ...y change to the configuration BPDU of each port and starts sending out configuration BPDUs periodically AP1 0 0 0 AP1 AP2 0 0 0 AP2 z Port BP1 receives the configuration BPDU of Device A 0 0 0 AP1 Dev...

Page 33: ...z Then port CP2 receives the updated configuration BPDU of Device B 0 5 1 BP2 Because the received configuration BPDU is superior to its own configuration BPDU Device C launches a BPDU update process...

Page 34: ...mes faulty the root port on this path will no longer receive new configuration BPDUs and the old configuration BPDUs will be discarded due to timeout In this case the bridge will generate a configurat...

Page 35: ...port or a port connected with a point to point link If the designated port is an edge port it can enter the forwarding state directly if the designated port is connected with a point to point link it...

Page 36: ...to instance 1 VLAN2 mapped to instance 2 Other VLANs mapped to CIST Region B0 VLAN1 mapped to instance 1 VLAN2 mapped to instance 2 Other VLANs mapped to CIST Region C0 VLAN1 mapped to instance 1 VLA...

Page 37: ...ction is the IST in the respective MST region 4 CST The CST is a single spanning tree that connects all MST regions in a switched network If you regard each MST region as a bridge the CST is a spannin...

Page 38: ...ata to the root bridge z Designated port a port responsible for forwarding data to the downstream network segment or bridge z Master port A port on the shortest path from the current region to the com...

Page 39: ...rt roles Port role right Port state below Root port master port Designated port Alternate port Backup port Forwarding Learning Discarding How MSTP works MSTP divides an entire Layer 2 network into mul...

Page 40: ...z Loop guard z TC BPDU guard z Support for hot swapping of interface cards and active standby changeover Protocols and Standards MSTP is documented in z IEEE 802 1d Spanning Tree Protocol z IEEE 802 1...

Page 41: ...ts Optional Configuring the leaf nodes Enabling MSTP Required Performing mCheck Optional Configuring Digest Snooping Optional Configuring No Agreement Check Optional Configuring Protection Functions O...

Page 42: ...nning tree calculation process which may result in network topology instability To reduce the possibility of topology instability caused by configuration MSTP will not immediately launch a new spannin...

Page 43: ...instance id root secondary Required By default the AP does not function as a secondary root bridge z After specifying the AP as the root bridge or a secondary root bridge you cannot change the priori...

Page 44: ...uring the AP as the root bridge or a secondary root bridge you cannot change the priority of the AP z During root bridge selection if all bridges in a spanning tree have the same priority the one with...

Page 45: ...network diameter you configured MSTP automatically sets an optimal hello time forward delay and max age for the bridge z The configured network diameter is effective for the CIST only and not for MST...

Page 46: ...cally the larger the network diameter is the longer the forward delay time should be Note that if the forward delay setting is too small temporary redundant paths may be introduced if the forward dela...

Page 47: ...idge is busy A spanning tree calculation that occurs in this case not only is unnecessary but also wastes the network resources In a very stable network you can avoid such unwanted spanning tree calcu...

Page 48: ...mmand Remarks Enter system view system view Enter Ethernet interface view or WLAN Mesh interface view interface interface type interface number Enter interface view or port group view Enter port group...

Page 49: ...state 802 1d 1998 802 1t Private standard 0 65535 200 000 000 200 000 10 Mbps Single Port Aggregate Link 2 Ports Aggregate Link 3 Ports Aggregate Link 4 Ports 100 100 100 100 2 000 000 1 000 000 666...

Page 50: ...the root port of a bridge If all other conditions are the same the port with the highest priority will be elected as the root port On an MSTP enabled bridge a port can have different priorities in dif...

Page 51: ...ystem view system view Enter Ethernet interface view or WLAN Mesh interface view interface interface type interface number Enter interface view or port group view Enter port group view port group manu...

Page 52: ...the MSTP packet format incompatibility guard function In MSTP mode if a port is configured to recognize send MSTP packets in a mode other than auto and receives a packet in a format different from th...

Page 53: ...TP or RSTP mode but will remain in the STP compatible mode under the following circumstances z The bridge running STP is shut down or removed z The bridge running STP migrates to the MSTP or RSTP mode...

Page 54: ...ling the Digest Snooping feature on the port connecting the local bridge to a third party device in the same MST region can make the two devices communicate with each other Before enabling digest snoo...

Page 55: ...lly to disable it on all associated ports z To avoid loops do not enable Digest Snooping on MST region edge ports z It is recommended that you enable Digest Snooping first and then MSTP To avoid traff...

Page 56: ...P the down stream bridge sends an agreement packet regardless of whether an agreement packet from the upstream bridge is received Figure 7 7 shows the rapid state transition mechanism on MSTP designat...

Page 57: ...on name revision level and VLAN to instance mappings on the two bridges thus assigning them to the same region Configuring No Agreement To make the No Agreement Check feature take effect enable it on...

Page 58: ...Under normal conditions these ports should not receive configuration BPDUs However if someone forges configuration BPDUs maliciously to attack the devices the network will become instable MSTP provid...

Page 59: ...e forwarding delay it will revert to its original state Make this configuration on a designated port Follow these steps to enable root guard To do Use the command Remarks Enter system view system view...

Page 60: ...immediate forwarding address entry flushes that the AP can perform within a certain period of time after receiving the first TC BPDU For TC BPDUs received in excess of the limit the AP performs forwar...

Page 61: ...of all MSTIs display stp root Available in any view Clear the statistics information of MSTP reset stp interface interface list Available in user view MSTP Configuration Example Network requirements C...

Page 62: ...P B Enter MST region view AP B system view AP B stp region configuration Configure the region name VLAN to instance mappings and revision level of the MST region AP B mst region region name example AP...

Page 63: ...ion revision level 0 Activate MST region configuration manually AP C mst region active region configuration AP C mst region quit Enable MSTP globally AP C stp enable View the MST region configuration...

Page 64: ...ettings z Configuring Basic Settings of a VLAN Interface z Port Based VLAN Configuration z MAC Based VLAN Configuration z VLAN Configuration Example Introduction to VLAN VLAN Overview Ethernet is a ne...

Page 65: ...3 Flexible virtual workgroup creation As users from the same workgroup can be assigned to the same VLAN regardless of their physical locations network construction and maintenance is much easier and m...

Page 66: ...the frame belongs to The VLAN ID range is 0 to 4095 As 0 and 4095 are reserved by the protocol a VLAN ID actually ranges from 1 to 4094 When receiving a frame a network device looks at its VLAN tag t...

Page 67: ...interfaces are virtual interfaces used for Layer 3 communication between different VLANs They do not exist as physical entities on network devices For each VLAN you can create one VLAN interface After...

Page 68: ...the default VLAN traffic passing through a trunk port will be VLAN tagged Usually ports connecting network devices are configured as trunk ports to allow members of the same VLAN to communicate with...

Page 69: ...e frame Trunk z Remove the tag and send the frame if the frame carries the default VLAN tag and the port belongs to the default VLAN z Send the frame without removing the tag if its VLAN is carried on...

Page 70: ...lan vlan id Optional By default all access ports belong to VLAN 1 Before assigning an access port to a VLAN create the VLAN first Assigning a Trunk Port to a VLAN A trunk port can carry multiple VLANs...

Page 71: ...quired Assign the hybrid port to the specified VLAN s port hybrid vlan vlan id list tagged untagged Required By default a hybrid port allows packets from only VLAN 1 to pass through untagged Configure...

Page 72: ...d VLAN applied Approaches to creating MAC address to VLAN mappings In addition to creating MAC address to VLAN mappings at the CLI you can use an authentication server to automatically issue MAC addre...

Page 73: ...display interface vlan interface vlan interface id Available in any view Display MAC address to VLAN entries display mac vlan all dynamic mac address mac address mask mac mask static vlan vlan id Ava...

Page 74: ...om VLAN 2 VLAN 6 through VLAN 50 and VLAN 100 to pass through AP Ethernet1 0 1 port trunk permit vlan 2 6 to 50 100 Please wait Done AP Ethernet1 0 1 quit AP quit 2 Configure Device B as you configure...

Page 75: ...throttles 0 CRC 0 frame 0 overruns 0 aborts 0 ignored 0 parity errors Output total 0 packets 0 bytes 0 broadcasts 0 multicasts 0 pauses Output normal 0 packets 0 bytes 0 broadcasts 0 multicasts 0 pau...

Page 76: ...nd Maintaining Loopback and Null Interfaces 5 3 Displaying and Maintaining MAC Address Tables 6 6 Displaying and Maintaining MSTP 7 34 Displaying and Maintaining VLAN 8 10 G General Ethernet Interface...

Reviews: