116
No Agreement Check configuration example
Network requirements
As shown in
:
•
Device A connects to a third-party device that has a different spanning tree implementation. Both
devices are in the same region.
•
The third-party device (Device B) is the regional root bridge, and Device A is the downstream
device.
Figure 29
Network diagram
Configuration procedure
# Enable No Agreement Check on Ten-GigabitEthernet 1/0/1 of Device A.
<DeviceA> system-view
[DeviceA] interface ten-gigabitethernet 1/0/1
[DeviceA-Ten-GigabitEthernet1/0/1] stp no-agreement-check
Configuring TC Snooping
As shown in
:
•
Device A and Device B form an IRF fabric.
•
The spanning tree feature is disabled on Device A and Device B and enabled on all devices in user
network 1 and user network 2.
•
User network 1 and user network 2 are connected to the IRF fabric through double links.
•
The IRF fabric transparently transmits BPDUs for both user networks and is not involved in the
calculation of spanning trees.
When the network topology changes, it takes time for the IRF fabric to update its MAC address table and
ARP table. During this period, traffic in the network might be interrupted.