- About This Document
Ethernet Switching Overview
MAC Address Table Configuration
- Introduction to the MAC Address
Principles
Application
- Configuration Task Summary
- Licensing Requirements and Limitations for MAC Address Tables
- Default Configuration
Configuring a MAC Address Table
- Configuring a Static MAC Address Entry
- Configuring a Blackhole MAC Address Entry
- Setting the Aging Time of Dynamic MAC Address Entries
- Disabling MAC Address Learning
- Configuring the MAC Address Limiting Function
- Enabling MAC Address Alarm Functions
- Configuring a MAC Hash Algorithm
- Configuring the Extended MAC Entry Resource Mode
Configuring MAC Address Flapping Prevention
- Configuring MAC Address Flapping Detection
- Configuring the Switch to Discard Packets with an All-0 MAC Address
- Configuring the Switch to Discard Packets That Do Not Match Any MAC Address Entry
- Enabling MAC Address-Triggered ARP Entry Update
- Enabling Port Bridge
- Configuring Re-marking of Destination MAC Addresses
Maintaining the MAC Address Table
Configuration Examples
- Example for Configuring Static MAC Address Entries
- Example for Configuring Blackhole MAC Address Entries
- Example for Configuring MAC Address Limiting on an Interface
- Example for Configuring MAC Address Limiting in a VLAN
- Example for Configuring MAC Address Limiting in a VSI
- Example for Configuring MAC Address Flapping Prevention
- Example for Configuring MAC Address Flapping Detection
Common Misconfigurations
FAQs
Link Aggregation Configuration
- Introduction to Link Aggregation
Principles
Applications
- Switches Directly Connected Through Link Aggregation
- Switches Connected Across a Transmission Device Through Link Aggregation
- Switches Connecting to Transmission Devices Through Link Aggregation
- A Switch Connecting to a Server Through Link Aggregation
- A Switch Connecting to a CSS Through Link Aggregation
- Using E-Trunk to Implement Link Aggregation Across Devices
- Configuration Task Summary
- Licensing Requirements and Limitations for Link Aggregation
- Default Settings
Configuring Link Aggregation in Manual Mode
- (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member Interfaces in Each LAG
- Creating an LAG
- Setting the Manual Load Balancing Mode
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Lower Threshold for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- Checking the Configuration
Configuring Link Aggregation in LACP Mode
- (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member Interfaces in Each LAG
- Creating an LAG
- Setting the LACP Mode
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Upper and Lower Thresholds for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- (Optional) Setting the LACP System Priority
- (Optional) Setting the LACP Interface Priority
- (Optional) Configuring LACP Preemption
- (Optional) Setting the Timeout Interval for Receiving LACPDUs
- (Optional) Configuring an Eth-Trunk Member Interface on a Switch Directly Connected to a Server to Forward Packets
- Checking the Configuration
- Configuring Preferential Forwarding of Local Traffic in a CSS
- Creating an Eth-Trunk Sub-interface
Configuring an E-Trunk
- Setting the LACP System ID and LACP Priority of an E-Trunk
- Creating an E-Trunk and Setting the E-Trunk Priority
- Configuring Local and Remote IP Addresses of an E-Trunk
- Binding an E-Trunk to a BFD Session
- Adding an Eth-Trunk to an E-Trunk
- (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk
- (Optional) Setting the Password for Encrypting Packets
- (Optional) Setting the Timeout Interval of Hello Packets
- (Optional) Setting the Revertive Switching Delay
- (Optional) Disabling Revertive Switching on an E-Trunk
- (Optional) Configuring the E-Trunk Sequence Number Check Function
- Checking the Configuration
- Maintaining Link Aggregation
Configuration Examples
Common Configuration Errors
FAQ
VLAN Configuration
- VLAN Overview
Principles
Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for VLANs
- Default Configuration
Configuring VLAN Technology
- Configuring Interface-based VLAN Assignment (Statically Configured Interface Type)
- Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)
- Configuring MAC Address-based VLAN Assignment
- Configuring IP Subnet-based VLAN Assignment
- Configuring Protocol-based VLAN Assignment
- Configuring Policy-based VLAN Assignment
- Configuring Inter-VLAN Communication
- Configuring a Traffic Policy to Implement Intra-VLAN Layer 2 Isolation
- Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Configuring an mVLAN
- Configuring Transparent Transmission of Protocol Packets in a VLAN
Maintaining VLANs
Configuration Examples
- Example for Configuring Interface-based VLAN Assignment (Statically Configured Link Type)
- Example for Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)
- Example for Configuring MAC Address-based Assignment (the Switch Connects to Downstream Terminals)
- Example for Configuring IP Subnet-based VLAN Assignment
- Example for Configuring Protocol-based VLAN Assignment
- Example for Configuring VLANIF Interfaces to Implement Inter-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Intra-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different Network Segments in the Same VLAN
- Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Example for Configuring an mVLAN to Implement Remote Management
- Example for Configuring Transparent Transmission of Protocol Packets in a VLAN
Common Misconfigurations
FAQ
- How Do I Create VLANs in a Batch?
- How Do I Add Interfaces to a VLAN in a Batch?
- How Do I Restore the Default VLAN Configuration of an Interface?
- How Do I Change the Link Type of an Interface?
- How Do I Rapidly Query the Link Types and Default VLANs of All Interfaces?
- How Do I Delete a Single VLAN or VLANs in a Batch?
- Can Multiple Network Segments Be Configured in a VLAN?
- How Is the Inter-VLAN Communication Fault Rectified?
- Do VLANs Need to Be Assigned on the Intermediate Device That Transparently Transmits Packets?
- Why Are MAC-VLAN Entries Invalid?
- Can the Switch Collect Statistics on Only Traffic Destined for the VLANIF Interface Enabled with Traffic Statistics?
VLAN Aggregation Configuration
VLAN Switch Configuration
MUX VLAN Configuration
VLAN Termination Configuration
- Introduction to VLAN Termination
Application Scenario
- Configuration Task Summary
- Licensing Requirements and Limitations for VLAN Termination
- Default Configuration
- Using a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication
Configuring a Dot1q Termination Sub-interface and Connecting It to an L2VPN
Configuring a Dot1q Termination Sub-interface and Connecting It to an L3VPN
Configuring a QinQ Termination Sub-interface and Connecting It to an L2VPN
Configuring a QinQ Termination Sub-interface and Connecting It to an L3VPN
Configuration Examples
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication Across Different Networks
- Example for Connecting Dot1q Sub-interfaces to a VLL Network
- Example for Connecting QinQ Termination Sub-interfaces to a VLL Network
- Example for Connecting Dot1q Termination Sub-interfaces to a VPLS Network
- Example for Connecting QinQ Termination Sub-interfaces to a VPLS Network
- Example for Connecting Dot1q Termination Sub-interfaces to an L3VPN
- Example for Connecting QinQ Termination Sub-interfaces to an L3VPN
Voice VLAN Configuration
- Introduction to Voice VLAN
- Typical Networking
- Principles
- Applicable Scenario
- Licensing Requirements and Limitations for Voice VLAN
- Default Configuration
Configuring a MAC Address-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on MAC Addresses
- Configuring an OUI for a Voice VLAN
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- (Optional) Configuring the Secure or Normal Mode of a Voice VLAN
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Checking the Configuration
Configuring a VLAN ID-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on VLAN IDs
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- Configuring the Switch to Advertise Voice VLAN Information to an IP Phone
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Checking the Configuration
Configuration Examples
QinQ Configuration
- Introduction to QinQ
Principles
Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for QinQ
- Configuring Basic QinQ
Configuring Selective QinQ
- Configuring the TPID Value in an Outer VLAN Tag
- Configuring the Device to Add Double VLAN Tags to Untagged Packets
Configuring QinQ Mapping
Maintaining QinQ
Configuration Examples
- Example for Configuring Basic QinQ
- Example for Configuring Selective QinQ
- Example for Configuring Selective QinQ and VLAN Mapping
- Example for Configuring Traffic Selective QinQ and Traffic Policy
- Example for Configuring Flow-based Selective QinQ
- Example for Connecting a Single-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a Double-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a VLAN Stacking Sub-interface to a VLL Network
- Example for Connecting a Single-tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a Double-tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a VLAN Stacking Sub-interface to a VPLS Network
Common Misconfigurations
FAQ
VLAN Mapping Configuration
GVRP Configuration
VCMP Configuration
STP/RSTP Configuration
- Introduction to STP/RSTP
Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for STP/RSTP
- Default Configuration
Configuring Basic STP/RSTP Functions
Setting STP Parameters that Affect STP Convergence
Setting RSTP Parameters that Affect RSTP Convergence
- Setting the RSTP Network Diameter
- Setting the RSTP Timeout Interval
- Setting RSTP Timers
- Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree Calculation
- Setting the Link Type for a Port
- Setting the Maximum Transmission Rate of an Interface
- Switching to the RSTP Mode
- Configuring Edge Ports and BPDU Filter Ports
- Checking the Configuration
Configuring RSTP Protection Functions
- Setting Parameters for Interoperation Between Huawei and Non-Huawei Devices
Maintaining STP/RSTP
Configuration Examples
FAQ
- How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?
- Can Switches Using RSTP and STP Be Connected?
- Why Is the Recommended Value of STP Network Radius Within 7?
- In What Condition Do I Need to Configure STP Edge Ports?
- What Are Precautions for Configuring the Formats of Sent and Received BPDUs on an STP Interface?
- How Do I Configure a User-Side Interface on an STP Switch?
- How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP Addresses When They Connect to an STP Network?
- Can the Switch Work with Non-Huawei Devices Running STP or RSTP?
- What Is the Function of Automatic Edge-port Detecting?
MSTP Configuration
- Introduction to MSTP
MSTP Principles
- Application Environment
- Configuration Task Summary
- Licensing Requirements and Limitations for MSTP
- Default Configuration
Configuring Basic MSTP Functions
- Configuring the MSTP Mode
- Configuring and Activating an MST Region
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Enabling MSTP
- Checking the Configuration
Configuring MSTP Multi-Process
- Creating an MSTP Process
- Adding a Port to an MSTP Process
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Configuring TC Notification in MSTP Multi-process
- Enabling MSTP
- Checking the Configuration
Configuring MSTP Parameters on an Interface
- Setting the MSTP Network Diameter
- Setting the MSTP Timeout Interval
- Setting the Values of MSTP Timers
- Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree Calculation
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of an Interface
- Switching to the MSTP Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Setting the Maximum Number of Hops in an MST Region
- Checking the Configuration
Configuring MSTP Protection Functions
Configuring MSTP Interoperability Between Huawei and Non-Huawei Devices
Maintaining MSTP
Configuration Examples
FAQ
- How to Configure the MSTP Region?
- Can a Huawei STP Switch Work with a Non-Huawei STP Device?
- Why Cannot Information About an STP Instance with a Non-Zero ID Be Displayed?
- How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?
- How Do I Configure a User-Side Interface on an STP Switch?
- How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP Addresses When They Connect to an STP Network?
VBST Configuration
- Introduction to VBST
- Principles
- Applicable Scenario
- Configuration Task Summary
- Licensing Requirements and Limitations for VBST
- Default Configuration
Configuring Basic VBST Functions
Setting VBST Parameters That Affect VBST Convergence
- Setting the Network Diameter
- Setting Values of VBST Timers
- Setting the VBST Timeout Interval
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of a Port
- Manually Switching to the VBST Mode
- Configuring a VBST Convergence Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Checking the Configuration
Configuring Protection Functions of VBST
- Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
Maintaining VBST
Configuration Examples
SEP Configuration
- Introduction to SEP
Principles
Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for SEP
Configuring Basic SEP Functions
Specifying an Interface to Block
- Configuring SEP Multi-Instance
Configuring the Topology Change Notification Function
- Reporting Topology Changes in a Lower-Layer Network - SEP Topology Change Notification
- Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment to Process SmartLink Flush Packets
- Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP and CFM
- Checking the Configuration
Maintaining SEP
Configuration Examples
- Example for Configuring SEP on a Closed Ring Network
- Example for Configuring SEP on a Multi-Ring Network
- Example for Configuring a Hybrid SEP+MSTP Ring Network
- Example for Configuring a Hybrid SEP+RRPP Ring Network
- Example for Configuring SEP Multi-Instance
- Example for Configuring Association Between SEP and VPLS (Reporting Topology Changes of a Lower-Layer Network)
RRPP Configuration
- Introduction to RRPP
Principles
Application Scenarios
- Application of a Single Ring
- Application of Tangent RRPP Rings
- Application of Intersecting RRPP Rings
- Application of RRPP and STP
- Application of Intersecting RRPP Rings of Multi-Instance on a MAN
- Application of Tangent RRPP Rings of Multi-Instance on a MAN
- Application of Multiple Instances Single-homed to an RRPP Aggregation Ring
- Application of the RRPP Multi-instance Ring and Smart Link Network
- Application of RRPP Snooping
- Configuration Task Summary
- Licensing Requirements and Limitations for RRPP
- Default Configuration
Configuring RRPP
- Configuring Interfaces on an RRPP Ring
- Creating an RRPP Domain and the Control VLAN
- Creating an Instance
- Configuring a Protected VLAN
- (Optional) Setting the RRPP Working Mode
- Creating and Enabling an RRPP Ring
- Enabling RRPP
- (Optional) Creating a Ring Group
- (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain
- (Optional) Setting the Value of the Link-Up Timer
- Checking the Configuration
Configuring RRPP Snooping
Maintaining RRPP
Configuration Examples
- Example for Configuring a Single RRPP Ring with a Single Instance
- Example for Configuring Intersecting RRPP Rings with a Single Instance When Huawei Devices and Third-Party Devices Are Used
- Example for Configuring Intersecting RRPP Rings with a Single Instance When Only Huawei Devices Are Used
- Example for Configuring Tangent RRPP Rings
- Example for Configuring a Single RRPP Ring with Multiple Instances
- Example for Configuring Intersecting RRPP Rings with Multiple Instances When Huawei Devices and Third-Party Devices Are Used
- Example for Configuring Intersecting RRPP Rings with Multiple Instances When Only Huawei Devices Are Used
- Example for Configuring Tangent RRPP Rings with Multiple Instances
Common Configuration Errors
FAQ
ERPS (G.8032) Configuration
- Introduction to ERPS
Principles
- Applicable Scenario
- Configuration Task Summary
- Licensing Requirements and Limitations for ERPS
- Default Settings
Configuring ERPSv1
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring the MEL Value
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Checking the Configuration
Configuring ERPSv2
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- Configuring the Topology Change Notification Function
- (Optional) Configuring ERPS Protection Switching
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Checking the Configuration
Maintaining ERPS
Configuration Examples
Common Configuration Errors
LDT and LBDT Configuration
- Introduction to LBDT and LDT
- Principles
- Applicable Scenario
- Licensing Requirements and Limitations for LDT and LBDT
- Default Configuration
Configuring LDT to Detect Loops
Configuring Automatic LBDT
Configuring Manual LBDT
Configuration Examples
- Example for Configuring LDT to Detect Loops on the Downstream Network
- Example for Configuring LDT to Detect Loops on the Local Network
- Example for Configuring LBDT to Detect Loopbacks on an Interface
- Example for Configuring LBDT to Detect Loops on the Downstream Network
- Example for Configuring LBDT to Detect Loops on the Local Network
Layer 2 Protocol Transparent Transmission Configuration
- Introduction to Layer 2 Protocol Transparent Transmission
- Principles
- Application Environment
- Configuration Task Summary
- Licensing Requirements and Limitations for Layer 2 Protocol Transparent Transmission
Configuring Interface-based Layer 2 Protocol Transparent Transmission
Configuring VLAN-based Layer 2 Protocol Transparent Transmission
Configuring QinQ-based Layer 2 Protocol Transparent Transmission
Configuration Examples
FAQ