Professional Documents
Culture Documents
Switches
Configuration Guide - Ethernet Switching Contents
Contents
3.3.3 Configuring MAC Address-Triggered ARP Entry Update to Improve VRRP Switchover Performance
............................................................................................................................................................................................................ 43
3.4 Summary of MAC Address Table Configuration Tasks.............................................................................................44
3.5 Licensing Requirements and Limitations for MAC Address Tables...................................................................... 48
3.6 Default Settings for MAC Address Tables.....................................................................................................................50
3.7 Configuring MAC Address Tables.................................................................................................................................... 51
3.7.1 Configuring a Static MAC Address Entry................................................................................................................... 51
3.7.2 Configuring a Blackhole MAC Address Entry...........................................................................................................52
3.7.3 Setting the Aging Time of Dynamic MAC Address Entries................................................................................. 53
3.7.4 Disabling MAC Address Learning.................................................................................................................................53
3.7.5 Configuring the MAC Address Limiting Function................................................................................................... 62
3.7.6 Enabling MAC Address Trap Functions...................................................................................................................... 63
3.7.7 Configuring a MAC Hash Algorithm........................................................................................................................... 65
3.7.8 Configuring the Extended MAC Entry Resource Mode.........................................................................................67
3.8 Configuring MAC Address Flapping Prevention......................................................................................................... 67
3.8.1 Configuring a MAC Address Learning Priority for an Interface.........................................................................68
3.8.2 Preventing MAC Address Flapping Between Interfaces with the Same Priority..........................................69
3.9 Configuring MAC Address Flapping Detection........................................................................................................... 70
3.10 Configuring the Switch to Discard Packets with an All-0 MAC Address......................................................... 72
3.11 Enabling MAC Address-triggered ARP Entry Update............................................................................................. 73
3.12 Enabling Port Bridge..........................................................................................................................................................74
3.13 Configuring Re-marking of Destination MAC Addresses......................................................................................75
3.14 Maintaining MAC Address Tables................................................................................................................................. 82
3.14.1 Displaying MAC Address Entries................................................................................................................................ 82
3.14.2 Deleting MAC Address Entries.................................................................................................................................... 83
3.14.3 Displaying MAC Address Flapping Information....................................................................................................83
3.15 Configuration Examples for MAC Address Tables................................................................................................... 83
3.15.1 Example for Configuring Static MAC Address Entries........................................................................................ 83
3.15.2 Example for Configuring Blackhole MAC Address Entries................................................................................ 85
3.15.3 Example for Configuring MAC Address Limiting on an Interface.................................................................. 87
3.15.4 Example for Configuring MAC Address Limiting in a VLAN............................................................................ 88
3.15.5 Example for Configuring MAC Address Flapping Prevention.......................................................................... 90
3.15.6 Example for Configuring MAC Address Flapping Detection............................................................................ 92
3.16 Troubleshooting MAC Address Tables......................................................................................................................... 94
3.16.1 MAC Address Entries Failed to Be Learned on an Interface............................................................................ 94
3.17 FAQ About MAC Address Tables................................................................................................................................... 98
3.17.1 How Do I Enable and Disable MAC Address Flapping Detection?................................................................ 98
3.17.2 How Do I Check MAC Address Flapping Information?...................................................................................... 98
3.17.3 What Should I Do When Finding a MAC Address Flapping Alarm?..............................................................98
3.17.4 How Do I Rapidly Determine a Loop?..................................................................................................................... 99
3.17.5 How Do I Configure VLAN-based Blackhole MAC Address Entries?............................................................. 99
4.9 Associating the Secondary Member Interface of an Eth-Trunk Interface in LACP Mode with Its Primary
Member Interface...................................................................................................................................................................... 151
4.10 Configuring Preferential Forwarding of Local Traffic in a Stack..................................................................... 152
4.11 Creating an Eth-Trunk Sub-interface......................................................................................................................... 153
4.12 Configuring an E-Trunk.................................................................................................................................................. 155
4.12.1 Setting the LACP System ID and LACP Priority of an E-Trunk...................................................................... 155
4.12.2 Creating an E-Trunk and Setting the E-Trunk Priority......................................................................................156
4.12.3 Configuring Local and Remote IP Addresses of an E-Trunk.......................................................................... 156
4.12.4 Binding an E-Trunk to a BFD Session.....................................................................................................................157
4.12.5 Adding an Eth-Trunk to an E-Trunk........................................................................................................................ 158
4.12.6 (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk............................................. 158
4.12.7 (Optional) Setting the Password for Encrypting Packets............................................................................... 159
4.12.8 (Optional) Setting the Timeout Interval of Hello Packets............................................................................. 160
4.12.9 (Optional) Setting the Revertive Switching Delay............................................................................................ 161
4.12.10 (Optional) Disabling Revertive Switching on an E-Trunk.............................................................................161
4.12.11 (Optional) Configuring the E-Trunk Sequence Number Check Function............................................... 162
4.12.12 Verifying the E-Trunk Configuration.................................................................................................................... 162
4.13 Maintaining Link Aggregation..................................................................................................................................... 162
4.14 Configuration Examples for Link Aggregation.......................................................................................................163
4.14.1 Example for Configuring Link Aggregation in Manual Mode....................................................................... 163
4.14.2 Example for Configuring Link Aggregation in LACP Mode............................................................................ 166
4.14.3 Example for Configuring an Inter-Chassis Eth-Trunk to Forward Traffic Preferentially Through Local
Member Interfaces (Stack).....................................................................................................................................................170
4.15 Troubleshooting Link Aggregation............................................................................................................................. 174
4.15.1 Traffic Is Unevenly Load Balanced Among Eth-Trunk Member Interfaces Because the Load
Balancing Mode Is Incorrect.................................................................................................................................................. 174
4.15.2 Eth-Trunk at Both Ends Cannot Be Up Because the Lower Threshold for the Number of Active
Interfaces Is Incorrect............................................................................................................................................................... 175
4.16 FAQ About Link Aggregation....................................................................................................................................... 175
4.16.1 Can an Eth-Trunk Be Configured with an IP Address?.....................................................................................175
4.16.2 How Do I Add Member Interfaces to an Eth-Trunk?........................................................................................175
4.16.3 How Do I Delete Member Interfaces from an Eth-Trunk?............................................................................. 176
4.16.4 What Is the Function of the Delay for LACP Preemption?.............................................................................176
4.16.5 Which Switches Are Recommended for Link Aggregation in FTTx Scenarios of MAN?...................... 176
5.9.8 Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different
Network Segments in the Same VLAN.............................................................................................................................. 262
5.9.9 Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation...........................265
5.9.10 Example for Configuring an mVLAN to Implement Remote Management.............................................271
5.9.11 Example for Configuring Transparent Transmission of Protocol Packets in a VLAN.............................274
5.10 Troubleshooting VLANs..................................................................................................................................................276
5.10.1 A VLANIF Interface Fails to Be Created................................................................................................................ 277
5.10.2 A VLANIF Interface Goes Down...............................................................................................................................278
5.10.3 Users in a VLAN Cannot Communicate................................................................................................................ 279
5.10.4 IP Addresses of the Connected Interfaces Between Switches Cannot Be Pinged.................................. 280
5.11 FAQ About VLANs............................................................................................................................................................ 282
5.11.1 How Do I Create VLANs in a Batch?...................................................................................................................... 282
5.11.2 How Do I Add Interfaces to a VLAN in a Batch?............................................................................................... 282
5.11.3 How Do I Restore the Default VLAN Configuration of an Interface?........................................................ 283
5.11.4 How Do I Change the Link Type of an Interface?............................................................................................. 283
5.11.5 How Do I Rapidly Query the Link Types and Default VLANs of All Interfaces?..................................... 285
5.11.6 How Do I Delete a Single VLAN or VLANs in a Batch?................................................................................... 286
5.11.7 Can Multiple Network Segments Be Configured in a VLAN?....................................................................... 286
5.11.8 How Is the Inter-VLAN Communication Fault Rectified?................................................................................287
5.11.9 Do VLANs Need to Be Assigned on the Intermediate Device That Transparently Transmits Packets?
......................................................................................................................................................................................................... 289
5.11.10 Why Are MAC-VLAN Entries Invalid?.................................................................................................................. 289
5.11.11 Can the Switch Collect Statistics on Only Traffic Destined for the VLANIF Interface Enabled with
Traffic Statistics?........................................................................................................................................................................ 290
10.15.7 Which VLAN Does the Interface Enabled with VLAN Mapping or QinQ Obtain Through MAC
Address Learning?..................................................................................................................................................................... 571
13 VCMP Configuration.........................................................................................................635
13.1 Overview of VCMP...........................................................................................................................................................635
16.8.9 Verifying the Configuration of VBST Parameters That Affect VBST Convergence.................................861
16.9 Configuring Protection Functions of VBST.............................................................................................................. 862
16.9.1 Configuring BPDU Protection on the Switch.......................................................................................................862
16.9.2 Configuring TC Protection on the Switch............................................................................................................. 863
16.9.3 Configuring Root Protection on a Port................................................................................................................. 864
16.9.4 Configuring Loop Protection on a Port................................................................................................................. 864
16.9.5 Verifying the Configuration of VBST Protection Functions............................................................................ 865
16.10 Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
......................................................................................................................................................................................................... 866
16.11 Maintaining VBST.......................................................................................................................................................... 867
16.11.1 Displaying VBST Running Information and Statistics.................................................................................... 867
16.11.2 Clearing VBST Statistics........................................................................................................................................... 868
16.12 Example for Configuring VBST.................................................................................................................................. 868
17.9.2 Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment
to Process SmartLink Flush Packets.................................................................................................................................... 925
17.9.3 Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP
and CFM........................................................................................................................................................................................ 926
17.9.4 Verifying the Configuration of the Topology Change Notification Function........................................... 927
17.10 Clearing SEP Statistics.................................................................................................................................................. 927
17.11 Configuration Examples for SEP............................................................................................................................... 927
17.11.1 Example for Configuring SEP on a Closed Ring Network............................................................................ 927
17.11.2 Example for Configuring SEP on a Multi-Ring Network.............................................................................. 934
17.11.3 Example for Configuring a Hybrid SEP+MSTP Ring Network.....................................................................946
17.11.4 Example for Configuring a Hybrid SEP+RRPP Ring Network......................................................................955
17.11.5 Example for Configuring SEP Multi-Instance................................................................................................... 967
18.7.8 (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain.................... 1024
18.7.9 (Optional) Setting the Value of the Link-Up Timer....................................................................................... 1025
18.7.10 Verifying the RRPP Configuration...................................................................................................................... 1026
18.8 Configuring RRPP Snooping....................................................................................................................................... 1026
18.8.1 Enabling RRPP Snooping......................................................................................................................................... 1026
18.8.2 Configuring the VSI Associated with RRPP Snooping....................................................................................1027
18.8.3 Verifying the RRPP Snooping Configuration..................................................................................................... 1028
18.9 Clearing RRPP Statistics............................................................................................................................................... 1028
18.10 Configuration Examples for RRPP......................................................................................................................... 1029
18.10.1 Example for Configuring a Single RRPP Ring with a Single Instance....................................................1029
18.10.2 Example for Configuring Intersecting RRPP Rings with a Single Instance...........................................1033
18.10.3 Example for Configuring Tangent RRPP Rings.............................................................................................. 1044
18.10.4 Example for Configuring a Single RRPP Ring with Multiple Instances................................................. 1052
18.10.5 Example for Configuring Intersecting RRPP Rings with Multiple Instances........................................ 1061
18.10.6 Example for Configuring Tangent RRPP Rings with Multiple Instances............................................... 1078
18.11 Troubleshooting RRPP............................................................................................................................................... 1088
18.11.1 A Loop Occurs After the RRPP Configuration is Complete....................................................................... 1088
18.12 FAQ About RRPP.......................................................................................................................................................... 1089
18.12.1 Why Does a Broadcast Storm Occur When the Secondary Port of the Master Node Is Blocked?
....................................................................................................................................................................................................... 1089
18.12.2 Can Data Packets Be Blocked in the Control VLAN of RRPP?.................................................................. 1089