You are on page 1of 19

S1720, S2700, S5700, and S6720 Series Ethernet

Switches
Configuration Guide - Ethernet Switching Contents

Contents

About This Document................................................................................................................ ii


1 Ethernet Switching Features Supported in This Version................................................1
2 Ethernet Switching..................................................................................................................9
2.1 Overview of Ethernet Switching.........................................................................................................................................9
2.2 Basic Concepts of Ethernet................................................................................................................................................ 10
2.2.1 Ethernet Network Layers................................................................................................................................................ 10
2.2.2 Overview of Ethernet Cable Standards...................................................................................................................... 11
2.2.3 CSMA/CD.............................................................................................................................................................................. 14
2.2.4 Minimum Frame Length and Maximum Transmission Distance...................................................................... 15
2.2.5 Duplex Modes of Ethernet............................................................................................................................................. 15
2.2.6 Auto-Negotiation of Ethernet....................................................................................................................................... 16
2.2.7 Collision Domain and Broadcast Domain................................................................................................................. 18
2.2.8 MAC Sub-layer....................................................................................................................................................................18
2.2.9 LLC Sub-layer...................................................................................................................................................................... 23
2.3 Switching on the Ethernet................................................................................................................................................. 24
2.3.1 Layer 2 Switching.............................................................................................................................................................. 24
2.3.2 Layer 3 Switching.............................................................................................................................................................. 25
2.4 Application Scenarios for Ethernet Switching............................................................................................................. 28
2.4.1 Building an Enterprise Network................................................................................................................................... 28

3 MAC Address Table Configuration.................................................................................... 30


3.1 Overview of MAC Address Tables................................................................................................................................... 31
3.2 Understanding MAC Address Tables.............................................................................................................................. 31
3.2.1 Definition and Classification of MAC Address Entries.......................................................................................... 31
3.2.2 Elements and Functions of a MAC Address Table..................................................................................................33
3.2.3 MAC Address Entry Learning and Aging................................................................................................................... 34
3.2.4 MAC Address Learning Control.....................................................................................................................................36
3.2.5 MAC Address Flapping.....................................................................................................................................................37
3.2.6 MAC Address-Triggered ARP Entry Update.............................................................................................................. 40
3.3 Application Scenarios for MAC Address Tables.......................................................................................................... 41
3.3.1 Configuring MAC Address Flapping Prevention to Block User Attacks.......................................................... 41
3.3.2 Configuring MAC Address Flapping Detection to Quickly Detect Loops....................................................... 42

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. vi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

3.3.3 Configuring MAC Address-Triggered ARP Entry Update to Improve VRRP Switchover Performance
............................................................................................................................................................................................................ 43
3.4 Summary of MAC Address Table Configuration Tasks.............................................................................................44
3.5 Licensing Requirements and Limitations for MAC Address Tables...................................................................... 48
3.6 Default Settings for MAC Address Tables.....................................................................................................................50
3.7 Configuring MAC Address Tables.................................................................................................................................... 51
3.7.1 Configuring a Static MAC Address Entry................................................................................................................... 51
3.7.2 Configuring a Blackhole MAC Address Entry...........................................................................................................52
3.7.3 Setting the Aging Time of Dynamic MAC Address Entries................................................................................. 53
3.7.4 Disabling MAC Address Learning.................................................................................................................................53
3.7.5 Configuring the MAC Address Limiting Function................................................................................................... 62
3.7.6 Enabling MAC Address Trap Functions...................................................................................................................... 63
3.7.7 Configuring a MAC Hash Algorithm........................................................................................................................... 65
3.7.8 Configuring the Extended MAC Entry Resource Mode.........................................................................................67
3.8 Configuring MAC Address Flapping Prevention......................................................................................................... 67
3.8.1 Configuring a MAC Address Learning Priority for an Interface.........................................................................68
3.8.2 Preventing MAC Address Flapping Between Interfaces with the Same Priority..........................................69
3.9 Configuring MAC Address Flapping Detection........................................................................................................... 70
3.10 Configuring the Switch to Discard Packets with an All-0 MAC Address......................................................... 72
3.11 Enabling MAC Address-triggered ARP Entry Update............................................................................................. 73
3.12 Enabling Port Bridge..........................................................................................................................................................74
3.13 Configuring Re-marking of Destination MAC Addresses......................................................................................75
3.14 Maintaining MAC Address Tables................................................................................................................................. 82
3.14.1 Displaying MAC Address Entries................................................................................................................................ 82
3.14.2 Deleting MAC Address Entries.................................................................................................................................... 83
3.14.3 Displaying MAC Address Flapping Information....................................................................................................83
3.15 Configuration Examples for MAC Address Tables................................................................................................... 83
3.15.1 Example for Configuring Static MAC Address Entries........................................................................................ 83
3.15.2 Example for Configuring Blackhole MAC Address Entries................................................................................ 85
3.15.3 Example for Configuring MAC Address Limiting on an Interface.................................................................. 87
3.15.4 Example for Configuring MAC Address Limiting in a VLAN............................................................................ 88
3.15.5 Example for Configuring MAC Address Flapping Prevention.......................................................................... 90
3.15.6 Example for Configuring MAC Address Flapping Detection............................................................................ 92
3.16 Troubleshooting MAC Address Tables......................................................................................................................... 94
3.16.1 MAC Address Entries Failed to Be Learned on an Interface............................................................................ 94
3.17 FAQ About MAC Address Tables................................................................................................................................... 98
3.17.1 How Do I Enable and Disable MAC Address Flapping Detection?................................................................ 98
3.17.2 How Do I Check MAC Address Flapping Information?...................................................................................... 98
3.17.3 What Should I Do When Finding a MAC Address Flapping Alarm?..............................................................98
3.17.4 How Do I Rapidly Determine a Loop?..................................................................................................................... 99
3.17.5 How Do I Configure VLAN-based Blackhole MAC Address Entries?............................................................. 99

4 Link Aggregation Configuration......................................................................................101

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. vii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

4.1 Overview of Link Aggregation....................................................................................................................................... 102


4.2 Understanding Link Aggregation.................................................................................................................................. 102
4.2.1 Basic Concepts of Link Aggregation......................................................................................................................... 102
4.2.2 Link Aggregation in Manual Mode........................................................................................................................... 105
4.2.3 Link Aggregation in LACP Mode................................................................................................................................ 106
4.2.4 Load Balancing Modes of Link Aggregation......................................................................................................... 111
4.2.5 Link Aggregation in Stack Scenarios........................................................................................................................ 113
4.2.6 E-Trunk................................................................................................................................................................................ 115
4.3 Application Scenarios for Link Aggregation.............................................................................................................. 119
4.3.1 Switches Are Directly Connected Using Link Aggregation............................................................................... 119
4.3.2 Switches Are Connected Across a Transmission Device Using Link Aggregation..................................... 120
4.3.3 Switches Connect to Transmission Devices Using Link Aggregation............................................................ 120
4.3.4 A Switch Connects to a Server Using Link Aggregation.................................................................................... 121
4.3.5 A Switch Connects to a Stack Using Link Aggregation......................................................................................122
4.3.6 Using E-Trunk to Implement Link Aggregation Across Devices...................................................................... 123
4.4 Summary of Link Aggregation Configuration Tasks.............................................................................................. 124
4.5 Licensing Requirements and Limitations for Link Aggregation..........................................................................125
4.6 Default Settings for Link Aggregation........................................................................................................................ 130
4.7 Configuring Link Aggregation in Manual Mode...................................................................................................... 131
4.7.1 (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member
Interfaces in Each LAG............................................................................................................................................................. 131
4.7.2 Creating an LAG.............................................................................................................................................................. 132
4.7.3 Setting the Manual Load Balancing Mode............................................................................................................ 132
4.7.4 Adding Member Interfaces to an Eth-Trunk.......................................................................................................... 133
4.7.5 (Optional) Setting the Lower Threshold for the Number of Active Interfaces......................................... 134
4.7.6 (Optional) Configuring a Load Balancing Mode................................................................................................. 135
4.7.7 Verifying the Configuration of Link Aggregation in Manual Mode.............................................................. 138
4.8 Configuring Link Aggregation in LACP Mode...........................................................................................................138
4.8.1 (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member
Interfaces in Each LAG............................................................................................................................................................. 138
4.8.2 Creating an LAG.............................................................................................................................................................. 139
4.8.3 Setting the LACP Mode................................................................................................................................................. 140
4.8.4 Adding Member Interfaces to an Eth-Trunk.......................................................................................................... 140
4.8.5 (Optional) Setting the Upper and Lower Thresholds for the Number of Active Interfaces................. 142
4.8.6 (Optional) Configuring a Load Balancing Mode................................................................................................. 143
4.8.7 (Optional) Setting the LACP System Priority........................................................................................................ 146
4.8.8 (Optional) Setting the LACP Interface Priority..................................................................................................... 147
4.8.9 (Optional) Configuring LACP Preemption.............................................................................................................. 147
4.8.10 (Optional) Setting the Timeout Interval for Receiving LACPDUs................................................................ 148
4.8.11 (Optional) Configuring an Eth-Trunk Member Interface on a Switch Directly Connected to a Server
to Forward Packets.................................................................................................................................................................... 149
4.8.12 Verifying the Configuration of Link Aggregation in LACP Mode................................................................. 150

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. viii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

4.9 Associating the Secondary Member Interface of an Eth-Trunk Interface in LACP Mode with Its Primary
Member Interface...................................................................................................................................................................... 151
4.10 Configuring Preferential Forwarding of Local Traffic in a Stack..................................................................... 152
4.11 Creating an Eth-Trunk Sub-interface......................................................................................................................... 153
4.12 Configuring an E-Trunk.................................................................................................................................................. 155
4.12.1 Setting the LACP System ID and LACP Priority of an E-Trunk...................................................................... 155
4.12.2 Creating an E-Trunk and Setting the E-Trunk Priority......................................................................................156
4.12.3 Configuring Local and Remote IP Addresses of an E-Trunk.......................................................................... 156
4.12.4 Binding an E-Trunk to a BFD Session.....................................................................................................................157
4.12.5 Adding an Eth-Trunk to an E-Trunk........................................................................................................................ 158
4.12.6 (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk............................................. 158
4.12.7 (Optional) Setting the Password for Encrypting Packets............................................................................... 159
4.12.8 (Optional) Setting the Timeout Interval of Hello Packets............................................................................. 160
4.12.9 (Optional) Setting the Revertive Switching Delay............................................................................................ 161
4.12.10 (Optional) Disabling Revertive Switching on an E-Trunk.............................................................................161
4.12.11 (Optional) Configuring the E-Trunk Sequence Number Check Function............................................... 162
4.12.12 Verifying the E-Trunk Configuration.................................................................................................................... 162
4.13 Maintaining Link Aggregation..................................................................................................................................... 162
4.14 Configuration Examples for Link Aggregation.......................................................................................................163
4.14.1 Example for Configuring Link Aggregation in Manual Mode....................................................................... 163
4.14.2 Example for Configuring Link Aggregation in LACP Mode............................................................................ 166
4.14.3 Example for Configuring an Inter-Chassis Eth-Trunk to Forward Traffic Preferentially Through Local
Member Interfaces (Stack).....................................................................................................................................................170
4.15 Troubleshooting Link Aggregation............................................................................................................................. 174
4.15.1 Traffic Is Unevenly Load Balanced Among Eth-Trunk Member Interfaces Because the Load
Balancing Mode Is Incorrect.................................................................................................................................................. 174
4.15.2 Eth-Trunk at Both Ends Cannot Be Up Because the Lower Threshold for the Number of Active
Interfaces Is Incorrect............................................................................................................................................................... 175
4.16 FAQ About Link Aggregation....................................................................................................................................... 175
4.16.1 Can an Eth-Trunk Be Configured with an IP Address?.....................................................................................175
4.16.2 How Do I Add Member Interfaces to an Eth-Trunk?........................................................................................175
4.16.3 How Do I Delete Member Interfaces from an Eth-Trunk?............................................................................. 176
4.16.4 What Is the Function of the Delay for LACP Preemption?.............................................................................176
4.16.5 Which Switches Are Recommended for Link Aggregation in FTTx Scenarios of MAN?...................... 176

5 VLAN Configuration........................................................................................................... 178


5.1 Overview of VLANs............................................................................................................................................................ 178
5.2 Understanding VLANs....................................................................................................................................................... 179
5.2.1 VLAN Tags......................................................................................................................................................................... 180
5.2.2 Link and Interface Types............................................................................................................................................... 181
5.2.3 Default VLAN....................................................................................................................................................................183
5.2.4 Adding and Removing VLAN Tags............................................................................................................................ 184
5.2.5 LNP....................................................................................................................................................................................... 189
5.2.6 VLAN Assignment........................................................................................................................................................... 192

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. ix


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

5.2.7 Intra-VLAN Communication........................................................................................................................................ 197


5.2.8 Inter-VLAN Communication........................................................................................................................................ 200
5.2.9 Intra-VLAN Layer 2 Isolation....................................................................................................................................... 205
5.2.10 Inter-VLAN Layer 3 Isolation.....................................................................................................................................205
5.2.11 mVLAN............................................................................................................................................................................. 206
5.2.12 Protocol Packet Transparent Transmission in a VLAN..................................................................................... 206
5.3 Application Scenarios for VLANs................................................................................................................................... 207
5.3.1 Using VLAN Assignment to Implement Layer 2 Isolation................................................................................ 207
5.3.2 Using VLANIF Interfaces to Implement Inter-VLAN Layer 3 Connectivity.................................................. 209
5.3.3 Using a Traffic Policy to Implement Inter-VLAN Access Control.................................................................... 210
5.3.4 Using a VLANIF Interface to Implement Layer 3 Connectivity Between the Switch and Router........211
5.4 Summary of VLAN Configuration Tasks..................................................................................................................... 212
5.5 Licensing Requirements and Limitations for VLANs.............................................................................................. 214
5.6 Default Settings for VLANs............................................................................................................................................. 218
5.7 Configuring VLANs............................................................................................................................................................. 219
5.7.1 Configuring Interface-based VLAN Assignment (Statically Configured Interface Type)........................219
5.7.2 Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)..........222
5.7.3 Configuring MAC Address-based VLAN Assignment.......................................................................................... 224
5.7.4 Configuring IP Subnet-based VLAN Assignment................................................................................................. 227
5.7.5 Configuring Protocol-based VLAN Assignment.................................................................................................... 229
5.7.6 Configuring Policy-based VLAN Assignment......................................................................................................... 231
5.7.7 Configuring Inter-VLAN Communication................................................................................................................ 233
5.7.8 Configuring a Traffic Policy to Implement Intra-VLAN Layer 2 Isolation....................................................235
5.7.9 Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation.................................................... 235
5.7.10 Configuring an mVLAN.............................................................................................................................................. 236
5.7.11 Configuring Transparent Transmission of Protocol Packets in a VLAN......................................................238
5.8 Maintaining VLANs............................................................................................................................................................ 239
5.8.1 Collecting VLAN Traffic Statistics.............................................................................................................................. 239
5.8.2 Clearing VLAN Traffic Statistics................................................................................................................................. 240
5.8.3 Clearing Packet Statistics on a VLANIF Interface................................................................................................ 241
5.8.4 Clearing LNP Packet Statistics.................................................................................................................................... 241
5.8.5 Enabling GMAC Ping to Detect Layer 2 Network Connectivity...................................................................... 241
5.8.6 Enabling GMAC Trace to Locate Faults................................................................................................................... 242
5.9 Configuration Examples for VLANs.............................................................................................................................. 243
5.9.1 Example for Configuring Interface-based VLAN Assignment (Statically Configured Link Type)........243
5.9.2 Example for Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link
Type).............................................................................................................................................................................................. 245
5.9.3 Example for Configuring MAC Address-based Assignment (the Switch Connects to Downstream
Terminals).....................................................................................................................................................................................249
5.9.4 Example for Configuring IP Subnet-based VLAN Assignment........................................................................ 251
5.9.5 Example for Configuring Protocol-based VLAN Assignment........................................................................... 253
5.9.6 Example for Configuring VLANIF Interfaces to Implement Inter-VLAN Communication...................... 257
5.9.7 Example for Configuring VLANIF Interfaces to Implement Intra-VLAN Communication......................259

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. x


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

5.9.8 Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different
Network Segments in the Same VLAN.............................................................................................................................. 262
5.9.9 Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation...........................265
5.9.10 Example for Configuring an mVLAN to Implement Remote Management.............................................271
5.9.11 Example for Configuring Transparent Transmission of Protocol Packets in a VLAN.............................274
5.10 Troubleshooting VLANs..................................................................................................................................................276
5.10.1 A VLANIF Interface Fails to Be Created................................................................................................................ 277
5.10.2 A VLANIF Interface Goes Down...............................................................................................................................278
5.10.3 Users in a VLAN Cannot Communicate................................................................................................................ 279
5.10.4 IP Addresses of the Connected Interfaces Between Switches Cannot Be Pinged.................................. 280
5.11 FAQ About VLANs............................................................................................................................................................ 282
5.11.1 How Do I Create VLANs in a Batch?...................................................................................................................... 282
5.11.2 How Do I Add Interfaces to a VLAN in a Batch?............................................................................................... 282
5.11.3 How Do I Restore the Default VLAN Configuration of an Interface?........................................................ 283
5.11.4 How Do I Change the Link Type of an Interface?............................................................................................. 283
5.11.5 How Do I Rapidly Query the Link Types and Default VLANs of All Interfaces?..................................... 285
5.11.6 How Do I Delete a Single VLAN or VLANs in a Batch?................................................................................... 286
5.11.7 Can Multiple Network Segments Be Configured in a VLAN?....................................................................... 286
5.11.8 How Is the Inter-VLAN Communication Fault Rectified?................................................................................287
5.11.9 Do VLANs Need to Be Assigned on the Intermediate Device That Transparently Transmits Packets?
......................................................................................................................................................................................................... 289
5.11.10 Why Are MAC-VLAN Entries Invalid?.................................................................................................................. 289
5.11.11 Can the Switch Collect Statistics on Only Traffic Destined for the VLANIF Interface Enabled with
Traffic Statistics?........................................................................................................................................................................ 290

6 VLAN Aggregation Configuration................................................................................... 291


6.1 Overview of VLAN Aggregation.................................................................................................................................... 291
6.2 Understanding VLAN Aggregation............................................................................................................................... 293
6.3 Application Scenarios for VLAN Aggregation........................................................................................................... 298
6.4 Licensing Requirements and Limitations for VLAN Aggregation.......................................................................299
6.5 Default Settings for VLAN Aggregation..................................................................................................................... 302
6.6 Configuring VLAN Aggregation..................................................................................................................................... 302
6.6.1 Creating a Sub-VLAN..................................................................................................................................................... 302
6.6.2 Creating a Super-VLAN................................................................................................................................................. 303
6.6.3 Configuring a VLANIF Interface Corresponding to a Super-VLAN................................................................. 304
6.6.4 (Optional) Enabling Proxy ARP on the VLANIF Interface Corresponding to a Super-VLAN................. 305
6.6.5 Verifying the VLAN Aggregation Configuration................................................................................................... 305
6.7 Example for Configuring VLAN Aggregation............................................................................................................ 306
6.8 FAQ About VLAN Aggregation...................................................................................................................................... 309
6.8.1 How Do I Implement Communication Between Specific Sub-VLANs in a Super-VLAN......................... 309
6.8.2 How Can a Traffic Policy Be Configured in a Super-VLAN or Sub-VLAN to Make the Traffic Policy
Take Effect.................................................................................................................................................................................... 310

7 MUX VLAN Configuration................................................................................................. 311


7.1 Overview of MUX VLANs................................................................................................................................................. 311

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

7.2 Licensing Requirements and Limitations for MUX VLANs................................................................................... 314


7.3 Default Settings for MUX VLANs.................................................................................................................................. 317
7.4 Configuring MUX VLANs..................................................................................................................................................317
7.4.1 Configuring a Principal VLAN for MUX VLANs..................................................................................................... 317
7.4.2 Configuring a Group VLAN for a Subordinate VLAN..........................................................................................318
7.4.3 Configuring a Separate VLAN for a Subordinate VLAN.................................................................................... 319
7.4.4 Enabling the MUX VLAN Function on an Interface............................................................................................ 319
7.4.5 Verifying the MUX VLAN Configuration................................................................................................................. 320
7.5 Configuration Examples for MUX VLANs................................................................................................................... 321
7.5.1 Example for Configuring MUX VLAN on the Access Device............................................................................ 321
7.5.2 Example for Configuring MUX VLAN on the Aggregation Device................................................................. 323

8 VLAN Termination Configuration................................................................................... 327


8.1 Overview of VLAN Termination..................................................................................................................................... 327
8.2 Application Scenarios for VLAN Termination........................................................................................................... 329
8.2.1 Using a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication..........................329
8.2.2 Using a Dot1q Termination Sub-interface to Connect to a VPN....................................................................330
8.2.3 Using a QinQ Termination Sub-interface to Connect to a VPN..................................................................... 332
8.3 Summary of VLAN Termination Configuration Tasks............................................................................................ 334
8.4 Licensing Requirements and Limitations for VLAN Termination....................................................................... 336
8.5 Default Settings for VLAN Termination...................................................................................................................... 338
8.6 Configuring a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication................. 338
8.7 Configuring a Dot1q Termination Sub-interface and Connecting It to an L2VPN...................................... 339
8.7.1 Configuring a Dot1q Termination Sub-interface..................................................................................................340
8.7.2 Configuring L2VPN......................................................................................................................................................... 340
8.7.3 Verifying the Configuration of a Dot1q Termination Sub-interface and Its Connection to an L2VPN
......................................................................................................................................................................................................... 341
8.8 Configuring a Dot1q Termination Sub-interface and Connecting It to an L3VPN...................................... 341
8.8.1 Configuring a Dot1q Termination Sub-interface..................................................................................................342
8.8.2 Configuring L3VPN......................................................................................................................................................... 343
8.8.3 Verifying the Configuration of a Dot1q Termination Sub-interface and Its Connection to an L3VPN
......................................................................................................................................................................................................... 343
8.9 Configuring a QinQ Termination Sub-interface and Connecting It to an L2VPN........................................343
8.9.1 Configuring a QinQ Sub-interface............................................................................................................................ 344
8.9.2 Configuring L2VPN......................................................................................................................................................... 350
8.9.3 Verifying the Configuration of a QinQ Termination Sub-interface and Its Connection to an L2VPN
......................................................................................................................................................................................................... 351
8.10 Configuring a QinQ Termination Sub-interface and Connecting It to an L3VPN..................................... 351
8.10.1 Configuring a QinQ Sub-interface.......................................................................................................................... 351
8.10.2 Configuring L3VPN....................................................................................................................................................... 353
8.10.3 Verifying the Configuration of QinQ Termination Sub-interface and Its Connection to an L3VPN
......................................................................................................................................................................................................... 353
8.11 Configuration Examples for VLAN Termination.................................................................................................... 353

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

8.11.1 Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN


Communication.......................................................................................................................................................................... 353
8.11.2 Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN
Communication Across Different Networks..................................................................................................................... 356
8.11.3 Example for Connecting Dot1q Sub-interfaces to a VLL Network.............................................................. 360
8.11.4 Example for Connecting QinQ Termination Sub-interfaces to a VLL Network...................................... 369
8.11.5 Example for Connecting Dot1q Termination Sub-interfaces to a VPLS Network.................................. 380
8.11.6 Example for Connecting QinQ Termination Sub-interfaces to a VPLS Network....................................390
8.11.7 Example for Connecting Dot1q Termination Sub-interfaces to an L3VPN...............................................401
8.11.8 Example for Connecting QinQ Termination Sub-interfaces to an L3VPN................................................ 415

9 Voice VLAN Configuration................................................................................................ 431


9.1 Overview of Voice VLANs................................................................................................................................................ 431
9.2 Voice VLAN Typical Networking.................................................................................................................................... 432
9.3 Understanding Voice VLANs........................................................................................................................................... 432
9.4 Application Scenarios for Voice VLANs....................................................................................................................... 434
9.5 Licensing Requirements and Limitations for Voice VLAN.................................................................................... 435
9.6 Default Settings for Voice VLANs................................................................................................................................. 438
9.7 Configuring a MAC Address-based Voice VLAN...................................................................................................... 439
9.7.1 Enabling the Voice VLAN Function........................................................................................................................... 439
9.7.2 Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on MAC Addresses
......................................................................................................................................................................................................... 440
9.7.3 Configuring an OUI for a Voice VLAN..................................................................................................................... 440
9.7.4 Configuring a Mode in Which an Interface Is Added to a Voice VLAN........................................................441
9.7.5 (Optional) Configuring the Secure or Normal Mode of a Voice VLAN....................................................... 442
9.7.6 (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN.................................... 444
9.7.7 Verifying the MAC Address-based Voice VLAN Configuration........................................................................ 445
9.8 Configuring a VLAN ID-based Voice VLAN............................................................................................................... 445
9.8.1 Enabling the Voice VLAN Function........................................................................................................................... 445
9.8.2 Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on VLAN IDs............ 446
9.8.3 Configuring a Mode in Which an Interface Is Added to a Voice VLAN........................................................446
9.8.4 Configuring the Switch to Advertise Voice VLAN Information to an IP Phone......................................... 447
9.8.5 (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN.................................... 448
9.8.6 Verifying the VLAN ID-based Voice VLAN Configuration................................................................................. 448
9.9 Configuration Examples for Voice VLANs.................................................................................................................. 449
9.9.1 Example for Configuring a MAC Address-based Voice VLAN (IP Phones Send Untagged Voice
Packets)......................................................................................................................................................................................... 449
9.9.2 Example for Configuring a VLAN ID-based Voice VLAN (IP Phones Send Tagged Voice Packets).... 451

10 QinQ Configuration.......................................................................................................... 454


10.1 Overview of QinQ............................................................................................................................................................ 454
10.2 Understanding QinQ....................................................................................................................................................... 455
10.2.1 QinQ Fundamentals.................................................................................................................................................... 455
10.2.2 Basic QinQ...................................................................................................................................................................... 458
10.2.3 Selective QinQ............................................................................................................................................................... 460

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xiii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

10.2.4 VLAN Stacking on a VLANIF Interface.................................................................................................................. 461


10.2.5 TPID................................................................................................................................................................................... 462
10.2.6 QinQ Mapping............................................................................................................................................................... 463
10.3 Application Scenarios for QinQ................................................................................................................................... 465
10.3.1 Public User Services on a Metro Ethernet Network......................................................................................... 466
10.3.2 Enterprise Network Connection Through Private Lines.................................................................................. 467
10.4 Summary of QinQ Configuration Tasks................................................................................................................... 468
10.5 Licensing Requirements and Limitations for QinQ.............................................................................................. 469
10.6 Configuring Basic QinQ................................................................................................................................................. 474
10.7 Configuring Selective QinQ.......................................................................................................................................... 475
10.7.1 Configuring VLAN ID-based Selective QinQ....................................................................................................... 475
10.7.2 Configuring MQC-based Selective QinQ.............................................................................................................. 477
10.8 Configuring the TPID Value in an Outer VLAN Tag.............................................................................................484
10.9 Configuring QinQ Stacking on a VLANIF Interface..............................................................................................484
10.10 Configuring the Device to Add Double VLAN Tags to Untagged Packets................................................. 486
10.11 Configuring QinQ Mapping....................................................................................................................................... 488
10.11.1 Configuring 1-to-1 QinQ Mapping...................................................................................................................... 488
10.11.2 Configuring 2-to-1 QinQ Mapping...................................................................................................................... 489
10.12 Displaying VLAN Translation Resource Usage.....................................................................................................490
10.13 Configuration Examples for QinQ........................................................................................................................... 490
10.13.1 Example for Configuring Basic QinQ...................................................................................................................490
10.13.2 Example for Configuring Selective QinQ........................................................................................................... 493
10.13.3 Example for Configuring Selective QinQ and VLAN Mapping................................................................... 496
10.13.4 Example for Configuring Flow-based Selective QinQ................................................................................... 499
10.13.5 Example for Connecting a Single-Tag VLAN Mapping Sub-Interface to a VLL Network..................502
10.13.6 Example for Connecting a Double-Tag VLAN Mapping Sub-Interface to a VLL Network................512
10.13.7 Example for Connecting a VLAN Stacking Sub-interface to a VLL Network........................................ 522
10.13.8 Example for Connecting a Single-tag VLAN Mapping Sub-interface to a VPLS Network................533
10.13.9 Example for Connecting a Double-tag VLAN Mapping Sub-interface to a VPLS Network............. 543
10.13.10 Example for Connecting a VLAN Stacking Sub-interface to a VPLS Network................................... 554
10.13.11 Example for Configuring QinQ Stacking on a VLANIF Interface............................................................ 566
10.14 Troubleshooting QinQ..................................................................................................................................................569
10.14.1 QinQ Traffic Forwarding Fails Because the Outer VLAN Is Not Created................................................569
10.14.2 QinQ Traffic Forwarding Fails Because the Interface Does Not Transparently Transmit the Outer
VLAN ID........................................................................................................................................................................................ 569
10.15 FAQ About QinQ............................................................................................................................................................ 570
10.15.1 Does the Switch Support QinQ?........................................................................................................................... 570
10.15.2 What Are Causes for QinQ Traffic Forwarding Failures?............................................................................. 570
10.15.3 Can I Rapidly Delete All QinQ Configurations of an Interface?................................................................ 571
10.15.4 Can I Directly Delete Inner VLAN IDs from QinQ Configuration?............................................................ 571
10.15.5 Can the Switch Add Double VLAN Tags to Untagged Packets?................................................................ 571
10.15.6 Which Tag Does the TPID Configured by the qinq protocol Command Match?................................571

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xiv


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

10.15.7 Which VLAN Does the Interface Enabled with VLAN Mapping or QinQ Obtain Through MAC
Address Learning?..................................................................................................................................................................... 571

11 VLAN Mapping Configuration....................................................................................... 572


11.1 Overview of VLAN Mapping........................................................................................................................................ 572
11.2 Understanding VLAN Mapping................................................................................................................................... 573
11.3 Application Scenarios for VLAN Mapping............................................................................................................... 575
11.4 Licensing Requirements and Limitations for VLAN Mapping........................................................................... 577
11.5 Configuring VLAN ID-based VLAN Mapping..........................................................................................................584
11.5.1 Configuring 1:1 VLAN Mapping...............................................................................................................................584
11.5.2 Configuring 2:1 VLAN Mapping...............................................................................................................................585
11.5.3 Configuring 2:2 VLAN Mapping...............................................................................................................................586
11.5.4 Verifying the VLAN ID-based VLAN Mapping Configuration........................................................................587
11.6 Configuring MQC-based VLAN Mapping.................................................................................................................587
11.7 Displaying VLAN Translation Resource Usage....................................................................................................... 594
11.8 Configuration Examples for VLAN Mapping.......................................................................................................... 595
11.8.1 Example for Configuring VLAN ID-based 1:1 VLAN Mapping...................................................................... 595
11.8.2 Example for Configuring VLAN ID-based N:1 VLAN Mapping..................................................................... 598
11.8.3 Example for Configuring VLAN ID-based 2 to 1 VLAN Mapping................................................................ 599
11.8.4 Example for Configuring VLAN ID-based 2:2 VLAN Mapping...................................................................... 604
11.9 Troubleshooting VLAN Mapping.................................................................................................................................608
11.9.1 Communication Failure After VLAN Mapping Configuration....................................................................... 608

12 GVRP Configuration......................................................................................................... 611


12.1 Overview of GVRP........................................................................................................................................................... 611
12.2 Understanding GVRP...................................................................................................................................................... 612
12.2.1 Basic Concepts of GVRP............................................................................................................................................. 612
12.2.2 Packet Format................................................................................................................................................................ 616
12.2.3 Working Mechanism....................................................................................................................................................617
12.3 Application Scenarios for GVRP.................................................................................................................................. 620
12.4 Licensing Requirements and Limitations for GVRP.............................................................................................. 621
12.5 Default Settings for GVRP............................................................................................................................................. 624
12.6 Configuring GVRP............................................................................................................................................................ 625
12.6.1 Enabling GVRP............................................................................................................................................................... 625
12.6.2 (Optional) Setting the Registration Mode for a GVRP Interface................................................................. 626
12.6.3 (Optional) Setting GARP Timers............................................................................................................................. 627
12.6.4 Verifying the GVRP Configuration.......................................................................................................................... 629
12.7 Clearing GVRP Statistics................................................................................................................................................ 629
12.8 Example for Configuring GVRP................................................................................................................................... 629
12.9 FAQ About GVRP.............................................................................................................................................................. 633
12.9.1 Why Is the CPU Usage High When VLANs Are Created or Deleted Through GVRP in Default
Configuration?............................................................................................................................................................................ 633

13 VCMP Configuration.........................................................................................................635
13.1 Overview of VCMP...........................................................................................................................................................635

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xv


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

13.2 Understanding VCMP..................................................................................................................................................... 636


13.2.1 Basic Concepts of VCMP.............................................................................................................................................636
13.2.2 VCMP Implementation............................................................................................................................................... 638
13.3 Application Scenarios for VCMP................................................................................................................................. 645
13.4 Licensing Requirements and Limitations for VCMP............................................................................................. 646
13.5 Default Settings for VCMP............................................................................................................................................ 649
13.6 Configuring VCMP........................................................................................................................................................... 649
13.7 Maintaining VCMP........................................................................................................................................................... 652
13.7.1 Displaying VCMP Running Information................................................................................................................ 653
13.7.2 Clearing VCMP Running Information.................................................................................................................... 653
13.8 Example for Configuring VCMP to Implement Centralized VLAN Management...................................... 653

14 STP/RSTP Configuration.................................................................................................. 659


14.1 Overview of STP/RSTP.................................................................................................................................................... 659
14.2 Understanding STP/RSTP.............................................................................................................................................. 660
14.2.1 Background..................................................................................................................................................................... 660
14.2.2 Basic Concepts of STP/RSTP......................................................................................................................................661
14.2.3 BPDU Format................................................................................................................................................................. 668
14.2.4 STP Topology Calculation.......................................................................................................................................... 670
14.2.5 Improvements in RSTP................................................................................................................................................ 678
14.2.6 RSTP Technology Details............................................................................................................................................ 684
14.3 Application Scenarios for STP...................................................................................................................................... 686
14.4 Summary of STP/RSTP Configuration Tasks........................................................................................................... 687
14.5 Licensing Requirements and Limitations for STP/RSTP...................................................................................... 688
14.6 Default Settings for STP/RSTP..................................................................................................................................... 691
14.7 Configuring STP/RSTP.................................................................................................................................................... 691
14.7.1 Configuring the STP/RSTP Mode.............................................................................................................................691
14.7.2 (Optional) Configuring the Root Bridge and Secondary Root Bridge........................................................692
14.7.3 (Optional) Setting a Priority for a Switching Device........................................................................................693
14.7.4 (Optional) Setting a Path Cost for a Port............................................................................................................ 693
14.7.5 (Optional) Setting a Priority for a Port................................................................................................................. 694
14.7.6 Enabling STP/RSTP....................................................................................................................................................... 695
14.7.7 Verifying the STP/RSTP Configuration.................................................................................................................. 696
14.8 Setting STP Parameters That Affect STP Convergence....................................................................................... 697
14.8.1 Setting the STP Network Diameter........................................................................................................................ 697
14.8.2 Setting the STP Timeout Interval............................................................................................................................ 698
14.8.3 Setting the STP Timers............................................................................................................................................... 698
14.8.4 Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree
Calculation................................................................................................................................................................................... 699
14.8.5 Verifying the Configuration of STP Parameters that Affect STP Convergence....................................... 701
14.9 Setting RSTP Parameters that Affect RSTP Convergence...................................................................................701
14.9.1 Setting the RSTP Network Diameter..................................................................................................................... 701
14.9.2 Setting the RSTP Timeout Interval......................................................................................................................... 702

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xvi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

14.9.3 Setting RSTP Timers.....................................................................................................................................................702


14.9.4 Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree
Calculation................................................................................................................................................................................... 704
14.9.5 Setting the Link Type for a Port.............................................................................................................................. 705
14.9.6 Setting the Maximum Transmission Rate of an Interface.............................................................................. 705
14.9.7 Switching to the RSTP Mode.................................................................................................................................... 706
14.9.8 Configuring Edge Ports and BPDU Filter Ports...................................................................................................707
14.9.9 Verifying the Configuration of RSTP Parameters that Affect RSTP Convergence.................................. 708
14.10 Configuring RSTP Protection Functions................................................................................................................. 708
14.10.1 Configuring BPDU Protection on a Switching Device....................................................................................708
14.10.2 Configuring TC Protection on a Switching Device.......................................................................................... 709
14.10.3 Configuring Root Protection on a Port............................................................................................................... 710
14.10.4 Configuring Loop Protection on a Port...............................................................................................................710
14.10.5 Verifying the Configuration of RSTP Protection Functions.......................................................................... 711
14.11 Setting Parameters for Interoperation Between Huawei and Non-Huawei Devices............................. 711
14.12 Maintaining STP/RSTP................................................................................................................................................. 712
14.12.1 Clearing STP/RSTP Statistics................................................................................................................................... 712
14.12.2 Monitoring STP/RSTP Topology Change Statistics......................................................................................... 713
14.13 Configuration Examples for STP/RSTP................................................................................................................... 713
14.13.1 Example for Configuring Basic STP Functions..................................................................................................713
14.13.2 Example for Configuring Basic RSTP Functions............................................................................................... 717
14.14 FAQ About STP/RSTP....................................................................................................................................................722
14.14.1 How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?................................ 722
14.14.2 Can Switches Using RSTP and STP Be Connected?........................................................................................ 722
14.14.3 Why Is the Recommended Value of STP Network Radius Within 7?.......................................................723
14.14.4 Why Does the STP Convergence Fail for a Switch?........................................................................................723
14.14.5 In What Condition Do I Need to Configure STP Edge Ports?..................................................................... 723
14.14.6 What Are Precautions for Configuring the Formats of Sent and Received BPDUs on an STP
Interface?...................................................................................................................................................................................... 723
14.14.7 How Do I Configure a User-Side Interface on an STP Switch?.................................................................. 724
14.14.8 How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP
Addresses When They Connect to an STP Network?.................................................................................................... 724
14.14.9 Can the Switch Work with the Non-Huawei Devices Running STP or RSTP?....................................... 724
14.14.10 What Is the Function of the Automatic Edge-port Detecting?................................................................725

15 MSTP Configuration......................................................................................................... 726


15.1 Overview of MSTP........................................................................................................................................................... 726
15.2 Understanding MSTP...................................................................................................................................................... 727
15.2.1 MSTP Background........................................................................................................................................................ 727
15.2.2 Basic Concepts of MSTP............................................................................................................................................. 729
15.2.3 MST BPDUs..................................................................................................................................................................... 735
15.2.4 MSTP Topology Calculation...................................................................................................................................... 738
15.2.5 MSTP Fast Convergence............................................................................................................................................. 740
15.2.6 MSTP Multi-Process..................................................................................................................................................... 741

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xvii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

15.3 Application Scenarios for MSTP.................................................................................................................................. 749


15.4 Summary of MSTP Configuration Tasks...................................................................................................................750
15.5 Licensing Requirements and Limitations for MSTP..............................................................................................752
15.6 Default Settings for MSTP............................................................................................................................................ 754
15.7 Configuring MSTP............................................................................................................................................................ 755
15.7.1 Configuring the MSTP Mode.................................................................................................................................... 755
15.7.2 Configuring and Activating an MST Region........................................................................................................ 756
15.7.3 (Optional) Configuring the Root Bridge and Secondary Root Bridge........................................................758
15.7.4 (Optional) Configuring a Priority for a Switch in an MSTI............................................................................ 759
15.7.5 (Optional) Configuring a Path Cost of a Port in an MSTI..............................................................................759
15.7.6 (Optional) Configuring a Port Priority in an MSTI........................................................................................... 760
15.7.7 Enabling MSTP...............................................................................................................................................................760
15.7.8 Verifying the Basic MSTP Configuration...............................................................................................................762
15.8 Configuring MSTP Multi-Process................................................................................................................................ 762
15.8.1 Creating an MSTP Process......................................................................................................................................... 762
15.8.2 Adding a Port to an MSTP Process......................................................................................................................... 763
15.8.3 (Optional) Configuring the Root Bridge and Secondary Root Bridge........................................................764
15.8.4 (Optional) Configuring a Priority for a Switch in an MSTI............................................................................ 765
15.8.5 (Optional) Configuring a Path Cost of a Port in an MSTI..............................................................................766
15.8.6 (Optional) Configuring a Port Priority in an MSTI........................................................................................... 767
15.8.7 Configuring TC Notification in MSTP Multi-process.........................................................................................767
15.8.8 Enabling MSTP...............................................................................................................................................................768
15.8.9 Verifying the MSTP Multi-Process Configuration.............................................................................................. 769
15.9 Configuring MSTP Parameters on an Interface..................................................................................................... 770
15.9.1 Setting the MSTP Network Diameter.................................................................................................................... 770
15.9.2 Setting the MSTP Timeout Interval........................................................................................................................ 771
15.9.3 Setting the Values of MSTP Timers........................................................................................................................ 771
15.9.4 Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree
Calculation................................................................................................................................................................................... 773
15.9.5 Setting the Link Type for a Port.............................................................................................................................. 774
15.9.6 Setting the Maximum Transmission Rate of an Interface.............................................................................. 774
15.9.7 Switching to the MSTP Mode................................................................................................................................... 775
15.9.8 Configuring a Port as an Edge Port and BPDU Filter Port............................................................................. 776
15.9.9 Setting the Maximum Number of Hops in an MST Region...........................................................................777
15.9.10 Verifying the Configuration of MSTP Parameters on an Interface........................................................... 778
15.10 Configuring MSTP Protection Functions................................................................................................................ 778
15.10.1 Configuring BPDU Protection on a Switch........................................................................................................ 778
15.10.2 Configuring TC Protection on a Switch...............................................................................................................779
15.10.3 Configuring Root Protection on an Interface................................................................................................... 780
15.10.4 Configuring Loop Protection on an Interface................................................................................................... 781
15.10.5 Configuring Shared-Link Protection on a Switch............................................................................................ 782
15.10.6 Verifying the MSTP Protection Function Configuration................................................................................782
15.11 Configuring MSTP Interoperability Between Huawei and Non-Huawei Devices.................................... 782

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xviii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

15.11.1 Configuring a Proposal/Agreement Mechanism............................................................................................. 782


15.11.2 Configuring the MSTP Protocol Packet Format on an Interface............................................................... 783
15.11.3 Enabling the Digest Snooping Function............................................................................................................. 784
15.11.4 Verifying the Configuration of MSTP Interoperability Between Huawei and Non-Huawei Devices
......................................................................................................................................................................................................... 785
15.12 Maintaining MSTP......................................................................................................................................................... 785
15.12.1 Clearing MSTP Statistics.......................................................................................................................................... 785
15.12.2 Monitoring the Statistics on MSTP Topology Changes................................................................................. 785
15.13 Configuration Examples for MSTP........................................................................................................................... 786
15.13.1 Example for Configuring MSTP............................................................................................................................. 786
15.13.2 Example for Configuring MSTP + VRRP Network........................................................................................... 795
15.13.3 Example for Connecting CEs to the VPLS in Dual-Homing Mode Through MSTP..............................806
15.13.4 Example for Configuring MSTP Multi-Process for Layer 2 Single-Access Rings and Layer 2 Multi-
Access Rings................................................................................................................................................................................. 823
15.14 FAQ About MSTP........................................................................................................................................................... 829
15.14.1 Can a Huawei STP Switch Work with a Non-Huawei STP Device?.......................................................... 829
15.14.2 How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?................................ 829
15.14.3 How Do I Configure a User-Side Interface on an STP Switch?.................................................................. 830
15.14.4 How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP
Addresses When They Connect to an STP Network?.................................................................................................... 830

16 VBST Configuration.......................................................................................................... 831


16.1 Overview of VBST............................................................................................................................................................ 831
16.2 Understanding VBST....................................................................................................................................................... 834
16.3 Application Scenarios for VBST................................................................................................................................... 839
16.4 Summary of VBST Configuration Tasks....................................................................................................................841
16.5 Licensing Requirements and Limitations for VBST............................................................................................... 843
16.6 Default Settings for VBST..............................................................................................................................................847
16.7 Configuring VBST............................................................................................................................................................. 848
16.7.1 (Optional) Setting the Device Priority...................................................................................................................848
16.7.2 (Optional) Setting the Path Cost for a Port........................................................................................................ 849
16.7.3 (Optional) Configuring Port Priorities................................................................................................................... 850
16.7.4 (Optional) Manually Configuring the Mapping between MSTIs and VLANs.......................................... 851
16.7.5 Enabling VBST................................................................................................................................................................ 852
16.7.6 Verifying the Basic VBST Configuration................................................................................................................ 854
16.8 Setting VBST Parameters That Affect VBST Convergence................................................................................. 854
16.8.1 Setting the Network Diameter................................................................................................................................ 855
16.8.2 Setting Values of VBST Timers.................................................................................................................................855
16.8.3 Setting the VBST Timeout Interval......................................................................................................................... 857
16.8.4 Setting the Link Type for a Port.............................................................................................................................. 857
16.8.5 Setting the Maximum Transmission Rate of a Port.......................................................................................... 858
16.8.6 Manually Switching to the VBST Mode................................................................................................................ 859
16.8.7 Configuring a VBST Convergence Mode...............................................................................................................859
16.8.8 Configuring a Port as an Edge Port and BPDU Filter Port............................................................................. 860

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xix


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

16.8.9 Verifying the Configuration of VBST Parameters That Affect VBST Convergence.................................861
16.9 Configuring Protection Functions of VBST.............................................................................................................. 862
16.9.1 Configuring BPDU Protection on the Switch.......................................................................................................862
16.9.2 Configuring TC Protection on the Switch............................................................................................................. 863
16.9.3 Configuring Root Protection on a Port................................................................................................................. 864
16.9.4 Configuring Loop Protection on a Port................................................................................................................. 864
16.9.5 Verifying the Configuration of VBST Protection Functions............................................................................ 865
16.10 Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
......................................................................................................................................................................................................... 866
16.11 Maintaining VBST.......................................................................................................................................................... 867
16.11.1 Displaying VBST Running Information and Statistics.................................................................................... 867
16.11.2 Clearing VBST Statistics........................................................................................................................................... 868
16.12 Example for Configuring VBST.................................................................................................................................. 868

17 SEP Configuration............................................................................................................. 878


17.1 Overview of SEP............................................................................................................................................................... 878
17.2 Understanding SEP.......................................................................................................................................................... 879
17.2.1 SEP Implementation.................................................................................................................................................... 879
17.2.2 Basic Concepts of SEP................................................................................................................................................. 882
17.2.3 SEP Implementation Mechanisms.......................................................................................................................... 886
17.3 Application Scenarios for SEP...................................................................................................................................... 900
17.3.1 Open Ring Networking............................................................................................................................................... 900
17.3.2 Closed Ring Networking.............................................................................................................................................901
17.3.3 Multi-Ring Networking............................................................................................................................................... 902
17.3.4 Hybrid SEP+MSTP Ring Networking...................................................................................................................... 903
17.3.5 Hybrid SEP+RRPP Ring Networking....................................................................................................................... 904
17.3.6 SEP Multi-Instance....................................................................................................................................................... 905
17.3.7 Association Between SEP and CFM........................................................................................................................ 906
17.4 Summary of SEP Configuration Tasks.......................................................................................................................907
17.5 Licensing Requirements and Limitations for SEP..................................................................................................909
17.6 Configuring SEP................................................................................................................................................................ 912
17.6.1 Configuring a SEP Segment...................................................................................................................................... 912
17.6.2 Configuring a Control VLAN..................................................................................................................................... 913
17.6.3 Configuring a Protected Instance............................................................................................................................914
17.6.4 Adding a Layer 2 Interface to a SEP Segment and Configuring a Role for the Interface................... 915
17.6.5 Verifying the Basic SEP Configuration................................................................................................................... 918
17.7 Specifying an Interface to Block................................................................................................................................. 918
17.7.1 Setting an Interface Blocking Mode.......................................................................................................................918
17.7.2 Configuring the Preemption Mode.........................................................................................................................920
17.7.3 Verifying the Configuration of Specifying an Interface to Block................................................................. 921
17.8 Configuring SEP Multi-Instance.................................................................................................................................. 921
17.9 Configuring the Topology Change Notification Function.................................................................................. 923
17.9.1 Reporting Topology Changes in a Lower-Layer Network - SEP Topology Change Notification....... 924

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xx


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

17.9.2 Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment
to Process SmartLink Flush Packets.................................................................................................................................... 925
17.9.3 Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP
and CFM........................................................................................................................................................................................ 926
17.9.4 Verifying the Configuration of the Topology Change Notification Function........................................... 927
17.10 Clearing SEP Statistics.................................................................................................................................................. 927
17.11 Configuration Examples for SEP............................................................................................................................... 927
17.11.1 Example for Configuring SEP on a Closed Ring Network............................................................................ 927
17.11.2 Example for Configuring SEP on a Multi-Ring Network.............................................................................. 934
17.11.3 Example for Configuring a Hybrid SEP+MSTP Ring Network.....................................................................946
17.11.4 Example for Configuring a Hybrid SEP+RRPP Ring Network......................................................................955
17.11.5 Example for Configuring SEP Multi-Instance................................................................................................... 967

18 RRPP Configuration.......................................................................................................... 976


18.1 Overview of RRPP............................................................................................................................................................ 976
18.2 Understanding RRPP....................................................................................................................................................... 979
18.2.1 Basic Concepts of RRPP.............................................................................................................................................. 979
18.2.2 RRPP Packets.................................................................................................................................................................. 983
18.2.3 Implementation of a Single RRPP Ring (When the Ring is Complete)......................................................986
18.2.4 Implementation of a Single RRPP Ring (When the Ring is Faulty)............................................................ 988
18.2.5 Implementation of a Single RRPP Ring (When the Fault is Rectified)...................................................... 990
18.2.6 Implementation of Multiple Rings..........................................................................................................................992
18.2.7 RRPP Multi-Instance.................................................................................................................................................. 1001
18.3 Application Scenarios for RRPP.................................................................................................................................1003
18.3.1 Application of a Single Ring................................................................................................................................... 1003
18.3.2 Application of Tangent RRPP Rings..................................................................................................................... 1004
18.3.3 Application of Intersecting RRPP Rings.............................................................................................................. 1005
18.3.4 Application of RRPP and STP................................................................................................................................. 1006
18.3.5 Application of Intersecting RRPP Rings of Multi-Instance on a MAN..................................................... 1006
18.3.6 Application of Tangent RRPP Rings of Multi-Instance on a MAN............................................................ 1008
18.3.7 Application of Multiple Instances Single-homed to an RRPP Aggregation Ring................................. 1009
18.3.8 Application of the RRPP Multi-instance Ring and Smart Link Network................................................. 1010
18.3.9 Application of RRPP Snooping............................................................................................................................... 1011
18.4 Summary of RRPP Configuration Tasks................................................................................................................. 1014
18.5 Licensing Requirements and Limitations for RRPP............................................................................................ 1015
18.6 Default Settings for RRPP........................................................................................................................................... 1018
18.7 Configuring RRPP...........................................................................................................................................................1018
18.7.1 Configuring Interfaces on an RRPP Ring............................................................................................................1019
18.7.2 Creating an RRPP Domain and the Control VLAN..........................................................................................1019
18.7.3 Creating an Instance................................................................................................................................................. 1021
18.7.4 Configuring a Protected VLAN.............................................................................................................................. 1021
18.7.5 Creating and Enabling an RRPP Ring.................................................................................................................. 1022
18.7.6 Enabling RRPP............................................................................................................................................................. 1023
18.7.7 (Optional) Creating a Ring Group........................................................................................................................1024

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

18.7.8 (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain.................... 1024
18.7.9 (Optional) Setting the Value of the Link-Up Timer....................................................................................... 1025
18.7.10 Verifying the RRPP Configuration...................................................................................................................... 1026
18.8 Configuring RRPP Snooping....................................................................................................................................... 1026
18.8.1 Enabling RRPP Snooping......................................................................................................................................... 1026
18.8.2 Configuring the VSI Associated with RRPP Snooping....................................................................................1027
18.8.3 Verifying the RRPP Snooping Configuration..................................................................................................... 1028
18.9 Clearing RRPP Statistics............................................................................................................................................... 1028
18.10 Configuration Examples for RRPP......................................................................................................................... 1029
18.10.1 Example for Configuring a Single RRPP Ring with a Single Instance....................................................1029
18.10.2 Example for Configuring Intersecting RRPP Rings with a Single Instance...........................................1033
18.10.3 Example for Configuring Tangent RRPP Rings.............................................................................................. 1044
18.10.4 Example for Configuring a Single RRPP Ring with Multiple Instances................................................. 1052
18.10.5 Example for Configuring Intersecting RRPP Rings with Multiple Instances........................................ 1061
18.10.6 Example for Configuring Tangent RRPP Rings with Multiple Instances............................................... 1078
18.11 Troubleshooting RRPP............................................................................................................................................... 1088
18.11.1 A Loop Occurs After the RRPP Configuration is Complete....................................................................... 1088
18.12 FAQ About RRPP.......................................................................................................................................................... 1089
18.12.1 Why Does a Broadcast Storm Occur When the Secondary Port of the Master Node Is Blocked?
....................................................................................................................................................................................................... 1089
18.12.2 Can Data Packets Be Blocked in the Control VLAN of RRPP?.................................................................. 1089

19 ERPS (G.8032) Configuration.......................................................................................1091


19.1 Overview of ERPS.......................................................................................................................................................... 1091
19.2 Understanding ERPS..................................................................................................................................................... 1093
19.2.1 Basic Concepts of ERPS............................................................................................................................................ 1093
19.2.2 RAPS PDUs....................................................................................................................................................................1100
19.2.3 ERPS Single-ring Implementation........................................................................................................................ 1102
19.2.4 ERPS Multi-ring Implementation.......................................................................................................................... 1106
19.2.5 ERPS Multi-instance.................................................................................................................................................. 1110
19.3 Application Scenarios for ERPS................................................................................................................................. 1111
19.4 Summary of ERPS Configuration Tasks..................................................................................................................1113
19.5 Licensing Requirements and Limitations for ERPS.............................................................................................1113
19.6 Default Settings for ERPS........................................................................................................................................... 1116
19.7 Configuring ERPSv1...................................................................................................................................................... 1116
19.7.1 Creating an ERPS Ring..............................................................................................................................................1116
19.7.2 Configuring the Control VLAN...............................................................................................................................1117
19.7.3 Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN1118
19.7.4 Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role................................................. 1119
19.7.5 (Optional) Configuring Timers in an ERPS Ring............................................................................................. 1121
19.7.6 (Optional) Configuring the MEL Value.............................................................................................................. 1122
19.7.7 (Optional) Configuring Association Between ERPS and Ethernet CFM.................................................. 1123
19.7.8 Verifying the ERPSv1 Configuration.................................................................................................................... 1123

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

19.8 Configuring ERPSv2...................................................................................................................................................... 1124


19.8.1 Creating an ERPS Ring..............................................................................................................................................1124
19.8.2 Configuring the Control VLAN...............................................................................................................................1125
19.8.3 Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN1126
19.8.4 Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role................................................. 1127
19.8.5 Configuring the Topology Change Notification Function............................................................................ 1129
19.8.6 (Optional) Configuring ERPS Protection Switching........................................................................................1130
19.8.7 (Optional) Configuring Timers in an ERPS Ring............................................................................................. 1131
19.8.8 (Optional) Configuring Association Between ERPS and Ethernet CFM.................................................. 1131
19.8.9 Verifying the ERPSv2 Configuration.................................................................................................................... 1132
19.9 Configuring the ERPS over VPLS Function............................................................................................................ 1133
19.10 Clearing ERPS Statistics............................................................................................................................................. 1134
19.11 Configuration Examples for ERPS.......................................................................................................................... 1135
19.11.1 Example for Configuring ERPS Multi-instance.............................................................................................. 1135
19.11.2 Example for Configuring Intersecting ERPS Rings........................................................................................1144
19.11.3 Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs
(Through Ethernet Sub-interfaces)................................................................................................................................... 1152
19.11.4 Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs
(Through VLANIF Interfaces).............................................................................................................................................. 1162
19.12 Troubleshooting ERPS................................................................................................................................................ 1173
19.12.1 Traffic Forwarding Fails in an ERPS Ring.........................................................................................................1173

20 LBDT Configuration........................................................................................................ 1174


20.1 Overview of LBDT.......................................................................................................................................................... 1174
20.2 Understanding LDT and LBDT................................................................................................................................... 1175
20.3 Application Scenarios for LDT and LBDT............................................................................................................... 1178
20.4 Licensing Requirements and Limitations for LDT and LBDT.......................................................................... 1180
20.5 Default Settings for LDT and LBDT......................................................................................................................... 1183
20.6 Configuring Automatic LBDT..................................................................................................................................... 1184
20.6.1 Enabling Automatic LBDT....................................................................................................................................... 1184
20.6.2 (Optional) Setting the Interval for Sending LBDT Packets.......................................................................... 1185
20.6.3 (Optional) Setting the Recovery Time of an Interface................................................................................. 1185
20.6.4 Verifying the Automatic LBDT Configuration...................................................................................................1186
20.7 Configuring Manual LBDT.......................................................................................................................................... 1186
20.7.1 Enabling Manual LBDT.............................................................................................................................................1186
20.7.2 (Optional) Setting the Interval for Sending LBDT Packets.......................................................................... 1188
20.7.3 Configuring an Action Taken After a Loop Is Detected................................................................................ 1189
20.7.4 (Optional) Setting the Recovery Time of an Interface................................................................................. 1190
20.7.5 Verifying the Manual LBDT Configuration........................................................................................................ 1191
20.8 Configuration Examples for LBDT............................................................................................................................ 1191
20.8.1 Example for Configuring LBDT to Detect Loopbacks on an Interface..................................................... 1191
20.8.2 Example for Configuring LBDT to Detect Loops on the Downstream Network.................................. 1193
20.8.3 Example for Configuring LBDT to Detect Loops on the Local Network................................................. 1195

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxiii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

21 Layer 2 Protocol Transparent Transmission Configuration...................................1199


21.1 Overview of Layer 2 Protocol Transparent Transmission................................................................................. 1199
21.2 Understanding Layer 2 Protocol Transparent Transmission............................................................................1201
21.3 Application Scenarios for Layer 2 Protocol Transparent Transmission........................................................1206
21.4 Summary of Layer 2 Protocol Transparent Transmission Configuration Tasks........................................ 1207
21.5 Licensing Requirements and Limitations for Layer 2 Protocol Transparent Transmission................... 1208
21.6 Configuring Interface-based Layer 2 Protocol Transparent Transmission..................................................1212
21.6.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1212
21.6.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1213
21.6.3 Enabling Layer 2 Protocol Transparent Transmission on an Interface.....................................................1214
21.6.4 Verifying the Configuration of Interface-based Layer 2 Protocol Transparent Transmission.......... 1215
21.7 Configuring VLAN-based Layer 2 Protocol Transparent Transmission........................................................ 1215
21.7.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1215
21.7.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1216
21.7.3 Enabling VLAN-based Layer 2 Protocol Transparent Transmission on an Interface........................... 1218
21.7.4 Verifying the Layer 2 Protocol Transparent Transmission Configuration................................................1218
21.8 Configuring QinQ-based Layer 2 Protocol Transparent Transmission........................................................ 1219
21.8.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1219
21.8.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1220
21.8.3 Enabling QinQ-based Layer 2 Transparent Transmission on an Interface............................................. 1221
21.8.4 Verifying the Layer 2 Protocol Transparent Transmission Configuration................................................1222
21.9 Configuring VPLS-based Layer 2 Protocol Transparent Transmission......................................................... 1222
21.9.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1222
21.9.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1223
21.9.3 Enabling VPLS-based Layer 2 Protocol Transparent Transmission on an Interface............................ 1224
21.9.4 Verifying the Layer 2 Protocol Transparent Transmission Configuration................................................1226
21.10 Configuration Examples for Layer 2 Protocol Transparent Transmission................................................ 1226
21.10.1 Example for Configuring Interface-based Layer 2 Protocol Transparent Transmission...................1226
21.10.2 Example for Configuring VLAN-based Layer 2 Protocol Transparent Transmission......................... 1229
21.10.3 Example for Configuring QinQ-based Layer 2 Protocol Transparent Transmission..........................1234
21.10.4 Example for Configuring VPLS-based Layer 2 Protocol Transparent Transmission.......................... 1240
21.11 FAQ About Layer 2 Protocol Transparent Transmission.................................................................................1248
21.11.1 How Can I Configure BPDU Tunnel to Transparently Transmit BPDUs?.............................................. 1248
21.11.2 Can the Interfaces Not Enabled with the BPDU Function Send BPDUs?............................................. 1249
21.11.3 How to View and Change MAC Addresses of BPDUs?............................................................................... 1249
21.11.4 How Does a Switch Process BPDUs?.................................................................................................................1249

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxiv

You might also like