ii
Configuration Prerequisites ···········································································································1-33
Configuration Procedure················································································································1-33
Configuration Example ··················································································································1-34
Configuring the VLAN Ignore Feature···································································································1-34
Configuration Procedure················································································································1-34
Configuration Example ··················································································································1-35
Configuring Digest Snooping ················································································································1-35
Configuration Prerequisites ···········································································································1-36
Configuration Procedure················································································································1-36
Configuration Example ··················································································································1-36
Configuring No Agreement Check ········································································································1-37
Configuration Prerequisites ···········································································································1-38
Configuration Procedure················································································································1-38
Configuration Example ··················································································································1-39
Configuring Protection Functions··········································································································1-39
Configuration prerequisites ···········································································································1-40
Enabling BPDU Guard···················································································································1-40
Enabling Root Guard ·····················································································································1-41
Enabling Loop Guard·····················································································································1-42
Enabling TC-BPDU Attack Guard ·································································································1-42
Displaying and Maintaining MSTP ········································································································1-43
MSTP Configuration Example···············································································································1-44
Содержание S5810 Series
Страница 307: ...ii Configured Multicast Group Policy Fails to Take Effect 1 32...
Страница 648: ...1 8 Return to the upper directory Sysname cd Display the current working directory Sysname pwd flash...
Страница 812: ...1 7 Role Slave Sysname stack_3 DeviceD Device type S5810 50S MAC address 000f e200 1003...