- About This Document
- Ethernet Switching Overview
- MAC Address Table Configuration
- Introduction to the MAC Address
- Principles
- Application
- Configuration Task Summary
- Licensing Requirements and Limitations for MAC Address Tables
- Default Configuration
- Configuring a MAC Address Table
- Configuring a Static MAC Address Entry
- Configuring a Blackhole MAC Address Entry
- Setting the Aging Time of Dynamic MAC Address Entries
- Disabling MAC Address Learning
- Configuring the MAC Address Limiting Function
- Enabling MAC Address Alarm Functions
- Configuring a MAC Hash Algorithm
- Configuring the Extended MAC Entry Resource Mode
- Configuring MAC Address Flapping Prevention
- Configuring MAC Address Flapping Detection
- Configuring the Switch to Discard Packets with an All-0 MAC Address
- Configuring the Switch to Discard Packets That Do Not Match Any MAC Address Entry
- Enabling MAC Address-Triggered ARP Entry Update
- Enabling Port Bridge
- Configuring Re-marking of Destination MAC Addresses
- Maintaining the MAC Address Table
- Configuration Examples
- Example for Configuring Static MAC Address Entries
- Example for Configuring Blackhole MAC Address Entries
- Example for Configuring MAC Address Limiting on an Interface
- Example for Configuring MAC Address Limiting in a VLAN
- Example for Configuring MAC Address Limiting in a VSI
- Example for Configuring MAC Address Flapping Prevention
- Example for Configuring MAC Address Flapping Detection
- Common Misconfigurations
- FAQs
- Link Aggregation Configuration
- Introduction to Link Aggregation
- Principles
- Applications
- Switches Directly Connected Through Link Aggregation
- Switches Connected Across a Transmission Device Through Link Aggregation
- Switches Connecting to Transmission Devices Through Link Aggregation
- A Switch Connecting to a Server Through Link Aggregation
- A Switch Connecting to a CSS Through Link Aggregation
- Using E-Trunk to Implement Link Aggregation Across Devices
- Configuration Task Summary
- Licensing Requirements and Limitations for Link Aggregation
- Default Settings
- Configuring Link Aggregation in Manual Mode
- (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member Interfaces in Each LAG
- Creating an LAG
- Setting the Manual Load Balancing Mode
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Lower Threshold for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- Checking the Configuration
- Configuring Link Aggregation in LACP Mode
- (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member Interfaces in Each LAG
- Creating an LAG
- Setting the LACP Mode
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Upper and Lower Thresholds for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- (Optional) Setting the LACP System Priority
- (Optional) Setting the LACP Interface Priority
- (Optional) Configuring LACP Preemption
- (Optional) Setting the Timeout Interval for Receiving LACPDUs
- (Optional) Configuring an Eth-Trunk Member Interface on a Switch Directly Connected to a Server to Forward Packets
- Checking the Configuration
- Configuring Preferential Forwarding of Local Traffic in a CSS
- Creating an Eth-Trunk Sub-interface
- Configuring an E-Trunk
- Setting the LACP System ID and LACP Priority of an E-Trunk
- Creating an E-Trunk and Setting the E-Trunk Priority
- Configuring Local and Remote IP Addresses of an E-Trunk
- Binding an E-Trunk to a BFD Session
- Adding an Eth-Trunk to an E-Trunk
- (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk
- (Optional) Setting the Password for Encrypting Packets
- (Optional) Setting the Timeout Interval of Hello Packets
- (Optional) Setting the Revertive Switching Delay
- (Optional) Disabling Revertive Switching on an E-Trunk
- (Optional) Configuring the E-Trunk Sequence Number Check Function
- Checking the Configuration
- Maintaining Link Aggregation
- Configuration Examples
- Common Configuration Errors
- FAQ
- VLAN Configuration
- VLAN Overview
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for VLANs
- Default Configuration
- Configuring VLAN Technology
- Configuring Interface-based VLAN Assignment (Statically Configured Interface Type)
- Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)
- Configuring MAC Address-based VLAN Assignment
- Configuring IP Subnet-based VLAN Assignment
- Configuring Protocol-based VLAN Assignment
- Configuring Policy-based VLAN Assignment
- Configuring Inter-VLAN Communication
- Configuring a Traffic Policy to Implement Intra-VLAN Layer 2 Isolation
- Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Configuring an mVLAN
- Configuring Transparent Transmission of Protocol Packets in a VLAN
- Maintaining VLANs
- Configuration Examples
- Example for Configuring Interface-based VLAN Assignment (Statically Configured Link Type)
- Example for Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)
- Example for Configuring MAC Address-based Assignment(the Switch Connects to Downstream Terminals)
- Example for Configuring MAC Address-based VLAN Assignment (the Switch Connects to Downstream Layer 2 Switching Devices)
- Example for Configuring IP Subnet-based VLAN Assignment
- Example for Configuring Protocol-based VLAN Assignment
- Example for Configuring VLANIF Interfaces to Implement Inter-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Intra-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different Network Segments in the Same VLAN
- Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Example for Configuring an mVLAN to Implement Remote Management
- Example for Configuring Transparent Transmission of Protocol Packets in a VLAN
- Common Misconfigurations
- FAQ
- How Do I Create VLANs in a Batch?
- How Do I Add Interfaces to a VLAN in a Batch?
- How Do I Restore the Default VLAN Configuration of an Interface?
- How Do I Change the Link Type of an Interface?
- How Do I Rapidly Query the Link Types and Default VLANs of All Interfaces?
- How Do I Delete a Single VLAN or VLANs in a Batch?
- Can Multiple Network Segments Be Configured in a VLAN?
- How Is the Inter-VLAN Communication Fault Rectified?
- Do VLANs Need to Be Assigned on the Intermediate Device That Transparently Transmits Packets?
- Why Are MAC-VLAN Entries Invalid?
- Can the Switch Collect Statistics on Only Traffic Destined for the VLANIF Interface Enabled with Traffic Statistics?
- VLAN Aggregation Configuration
- VLAN Switch Configuration
- MUX VLAN Configuration
- VLAN Termination Configuration
- Introduction to VLAN Termination
- Application Scenario
- Configuration Task Summary
- Licensing Requirements and Limitations for VLAN Termination
- Default Configuration
- Using a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication
- Configuring a Dot1q Termination Sub-interface and Connecting It to an L2VPN
- Configuring a Dot1q Termination Sub-interface and Connecting It to an L3VPN
- Configuring a QinQ Termination Sub-interface and Connecting It to an L2VPN
- Configuring a QinQ Termination Sub-interface and Connecting It to an L3VPN
- Configuration Examples
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication Across Different Networks
- Example for Connecting Dot1q Sub-interfaces to a VLL Network
- Example for Connecting QinQ Termination Sub-interfaces to a VLL Network
- Example for Connecting Dot1q Termination Sub-interfaces to a VPLS Network
- Example for Connecting QinQ Termination Sub-interfaces to a VPLS Network
- Example for Connecting Dot1q Termination Sub-interfaces to an L3VPN
- Example for Connecting QinQ Termination Sub-interfaces to an L3VPN
- Voice VLAN Configuration
- Introduction to Voice VLAN
- Typical Networking
- Principles
- Applicable Scenario
- Licensing Requirements and Limitations for Voice VLAN
- Default Configuration
- Configuring a MAC Address-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on MAC Addresses
- Configuring an OUI for a Voice VLAN
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- (Optional) Configuring the Secure or Normal Mode of a Voice VLAN
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Checking the Configuration
- Configuring a VLAN ID-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on VLAN IDs
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- Configuring the Switch to Advertise Voice VLAN Information to an IP Phone
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Checking the Configuration
- Configuration Examples
- QinQ Configuration
- Introduction to QinQ
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for QinQ
- Configuring Basic QinQ
- Configuring Selective QinQ
- Configuring the TPID Value in an Outer VLAN Tag
- Configuring the Device to Add Double VLAN Tags to Untagged Packets
- Configuring QinQ Mapping
- Maintaining QinQ
- Configuration Examples
- Example for Configuring Basic QinQ
- Example for Configuring Selective QinQ
- Example for Configuring Selective QinQ and VLAN Mapping
- Example for Configuring Traffic Selective QinQ and Traffic Policy
- Example for Configuring Flow-based Selective QinQ
- Example for Connecting a Single-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a Double-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a VLAN Stacking Sub-interface to a VLL Network
- Example for Connecting a Single-tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a Double-tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a VLAN Stacking Sub-interface to a VPLS Network
- Common Misconfigurations
- FAQ
- VLAN Mapping Configuration
- GVRP Configuration
- VCMP Configuration
- STP/RSTP Configuration
- Introduction to STP/RSTP
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for STP/RSTP
- Default Configuration
- Configuring Basic STP/RSTP Functions
- Setting STP Parameters that Affect STP Convergence
- Setting RSTP Parameters that Affect RSTP Convergence
- Setting the RSTP Network Diameter
- Setting the RSTP Timeout Interval
- Setting RSTP Timers
- Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree Calculation
- Setting the Link Type for a Port
- Setting the Maximum Transmission Rate of an Interface
- Switching to the RSTP Mode
- Configuring Edge Ports and BPDU Filter Ports
- Checking the Configuration
- Configuring RSTP Protection Functions
- Setting Parameters for Interoperation Between Huawei and Non-Huawei Devices
- Maintaining STP/RSTP
- Configuration Examples
- FAQ
- How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?
- Can Switches Using RSTP and STP Be Connected?
- Why Is the Recommended Value of STP Network Radius Within 7?
- In What Condition Do I Need to Configure STP Edge Ports?
- What Are Precautions for Configuring the Formats of Sent and Received BPDUs on an STP Interface?
- How Do I Configure a User-Side Interface on an STP Switch?
- How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP Addresses When They Connect to an STP Network?
- Can the Switch Work with Non-Huawei Devices Running STP or RSTP?
- What Is the Function of Automatic Edge-port Detecting?
- MSTP Configuration
- Introduction to MSTP
- MSTP Principles
- Application Environment
- Configuration Task Summary
- Licensing Requirements and Limitations for MSTP
- Default Configuration
- Configuring Basic MSTP Functions
- Configuring the MSTP Mode
- Configuring and Activating an MST Region
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Enabling MSTP
- Checking the Configuration
- Configuring MSTP Multi-Process
- Creating an MSTP Process
- Adding a Port to an MSTP Process
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Configuring TC Notification in MSTP Multi-process
- Enabling MSTP
- Checking the Configuration
- Configuring MSTP Parameters on an Interface
- Setting the MSTP Network Diameter
- Setting the MSTP Timeout Interval
- Setting the Values of MSTP Timers
- Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree Calculation
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of an Interface
- Switching to the MSTP Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Setting the Maximum Number of Hops in an MST Region
- Checking the Configuration
- Configuring MSTP Protection Functions
- Configuring MSTP Interoperability Between Huawei and Non-Huawei Devices
- Maintaining MSTP
- Configuration Examples
- FAQ
- How to Configure the MSTP Region?
- Can a Huawei STP Switch Work with a Non-Huawei STP Device?
- Why Cannot Information About an STP Instance with a Non-Zero ID Be Displayed?
- How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?
- How Do I Configure a User-Side Interface on an STP Switch?
- How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP Addresses When They Connect to an STP Network?
- VBST Configuration
- Introduction to VBST
- Principles
- Applicable Scenario
- Configuration Task Summary
- Licensing Requirements and Limitations for VBST
- Default Configuration
- Configuring Basic VBST Functions
- Setting VBST Parameters That Affect VBST Convergence
- Setting the Network Diameter
- Setting Values of VBST Timers
- Setting the VBST Timeout Interval
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of a Port
- Manually Switching to the VBST Mode
- Configuring a VBST Convergence Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Checking the Configuration
- Configuring Protection Functions of VBST
- Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
- Maintaining VBST
- Configuration Examples
- SEP Configuration
- Introduction to SEP
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for SEP
- Configuring Basic SEP Functions
- Specifying an Interface to Block
- Configuring SEP Multi-Instance
- Configuring the Topology Change Notification Function
- Reporting Topology Changes in a Lower-Layer Network - SEP Topology Change Notification
- Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment to Process SmartLink Flush Packets
- Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP and CFM
- Checking the Configuration
- Maintaining SEP
- Configuration Examples
- Example for Configuring SEP on a Closed Ring Network
- Example for Configuring SEP on a Multi-Ring Network
- Example for Configuring a Hybrid SEP+MSTP Ring Network
- Example for Configuring a Hybrid SEP+RRPP Ring Network
- Example for Configuring SEP Multi-Instance
- Example for Configuring Association Between SEP and VPLS (Reporting Topology Changes of a Lower-Layer Network)
- RRPP Configuration
- Introduction to RRPP
- Principles
- Application Scenarios
- Application of a Single Ring
- Application of Tangent RRPP Rings
- Application of Intersecting RRPP Rings
- Application of RRPP and STP
- Application of Intersecting RRPP Rings of Multi-Instance on a MAN
- Application of Tangent RRPP Rings of Multi-Instance on a MAN
- Application of Multiple Instances Single-homed to an RRPP Aggregation Ring
- Application of the RRPP Multi-instance Ring and Smart Link Network
- Application of RRPP Snooping
- Configuration Task Summary
- Licensing Requirements and Limitations for RRPP
- Default Configuration
- Configuring RRPP
- Configuring Interfaces on an RRPP Ring
- Creating an RRPP Domain and the Control VLAN
- Creating an Instance
- Configuring a Protected VLAN
- (Optional) Setting the RRPP Working Mode
- Creating and Enabling an RRPP Ring
- Enabling RRPP
- (Optional) Creating a Ring Group
- (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain
- (Optional) Setting the Value of the Link-Up Timer
- Checking the Configuration
- Configuring RRPP Snooping
- Maintaining RRPP
- Configuration Examples
- Example for Configuring a Single RRPP Ring with a Single Instance
- Example for Configuring Intersecting RRPP Rings with a Single Instance When Huawei Devices and Third-Party Devices Are Used
- Example for Configuring Intersecting RRPP Rings with a Single Instance When Only Huawei Devices Are Used
- Example for Configuring Tangent RRPP Rings
- Example for Configuring a Single RRPP Ring with Multiple Instances
- Example for Configuring Intersecting RRPP Rings with Multiple Instances When Huawei Devices and Third-Party Devices Are Used
- Example for Configuring Intersecting RRPP Rings with Multiple Instances When Only Huawei Devices Are Used
- Example for Configuring Tangent RRPP Rings with Multiple Instances
- Common Configuration Errors
- FAQ
- ERPS (G.8032) Configuration
- Introduction to ERPS
- Principles
- Applicable Scenario
- Configuration Task Summary
- Licensing Requirements and Limitations for ERPS
- Default Settings
- Configuring ERPSv1
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring the MEL Value
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Checking the Configuration
- Configuring ERPSv2
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- Configuring the Topology Change Notification Function
- (Optional) Configuring ERPS Protection Switching
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Checking the Configuration
- Maintaining ERPS
- Configuration Examples
- Common Configuration Errors
- LDT and LBDT Configuration
- Introduction to LBDT and LDT
- Principles
- Applicable Scenario
- Licensing Requirements and Limitations for LDT and LBDT
- Default Configuration
- Configuring LDT to Detect Loops
- Configuring Automatic LBDT
- Configuring Manual LBDT
- Configuration Examples
- Example for Configuring LDT to Detect Loops on the Downstream Network
- Example for Configuring LDT to Detect Loops on the Local Network
- Example for Configuring LBDT to Detect Loopbacks on an Interface
- Example for Configuring LBDT to Detect Loops on the Downstream Network
- Example for Configuring LBDT to Detect Loops on the Local Network
- Layer 2 Protocol Transparent Transmission Configuration
- Introduction to Layer 2 Protocol Transparent Transmission
- Principles
- Application Environment
- Configuration Task Summary
- Licensing Requirements and Limitations for Layer 2 Protocol Transparent Transmission
- Configuring Interface-based Layer 2 Protocol Transparent Transmission
- Configuring VLAN-based Layer 2 Protocol Transparent Transmission
- Configuring QinQ-based Layer 2 Protocol Transparent Transmission
- Configuration Examples
- FAQ