Configuration Guide
TPP Configuration
TPP Configuration
TPP Overview
The Topology Protection Protocol (TPP) is a topology stability protection protocol. The
network topology is rather fragile. Illegal attacks in the network may cause abnormal
CPU utilization on network devices, frame path blocked, etc. These are apt to cause
network topology turbulence. The topology protection aims to stabilize the network
topology by detecting the abnormalities (high CPU utilization, frame buffer abnormal,
etc.) and detecting the abnormalities of neighbor devices. The interaction with
neighbor devices is implemented by sending specific abnormity advertisement. This
function has rather high priority and can effectively prevent network topology
turbulence.
TPP Application
The topology protection is generated to address the network topology turbulence that
my be caused in the MSTP or VRRP and other distributed network protocol. The
MSTP, VRRP and other protocols work with the message notification mechanism to
automatically maintain the network topological structure and automatically adapt to the
topological change in the network. This on the other hand results in the aptness to
attacks. When malicious network attacks arrive, transient interruption of timed
messages may be caused due to high CPU utilization or frame path blocking, causing
error fluctuation of the network topology and great harm to the normal communication
in the network. The topology protection function minimizes such unnecessary
fluctuations. It works with the other distributed protocols (MSTP, VRRP, etc.) to make
the network more stable and reliable.
Figure-1:
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...