98
Figure 27 TC Snooping application scenario
To avoid traffic interruption, you can enable TC Snooping on the IRF fabric. After receiving a
TC-BPDU through a port, the IRF fabric updates MAC address table and ARP table entries
associated with the port's VLAN. In this way, TC Snooping prevents topology change from
interrupting traffic forwarding in the network. For more information about the MAC address table and
the ARP table, see "
Configuring the MAC address table
" and
Layer 3—IP Services Configuration
Guide
.
Configuration restrictions and guidelines
When you configure TC Snooping, follow these restrictions and guidelines:
•
TC Snooping and the spanning tree feature are mutually exclusive. You must globally disable
the spanning tree feature before enabling TC Snooping.
•
TC Snooping does not support the PVST mode.
Configuration procedure
To enable TC Snooping:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Globally disable the
spanning tree feature.
undo stp global enable
•
If the device starts up with the initial
settings, the spanning tree feature is
disabled globally by default.
•
If the device starts up with the factory
defaults, the spanning tree feature is
enabled globally by default.
For more information about the startup
configuration, see
Fundamentals
Configuration Guide
.
3.
Enable TC Snooping.
stp tc-snooping
By default, TC Snooping is disabled.
Configuring protection functions
A spanning tree device supports the following protection functions: