No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Ethernet Switching

CloudEngine 8800, 7800, 6800, and 5800 V200R003C00

This document describes the configuration of Ethernet services, including configuring MAC address table, link aggregation, VLANs, MUX VLAN, Voice VLAN, VLAN mapping, QinQ, GVRP, VCMP, STP/RSTP/MSTP, VBST, SEP, RRPP, ERPS, LBDT, and Layer 2 protocol transparent transmission.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring a MAC Hash Algorithm

Configuring a MAC Hash Algorithm


A device usually uses a hash algorithm to learn MAC address entries to improve MAC address forwarding performance. When multiple MAC addresses map the same key value, a MAC address hash conflict may occur. When a MAC address hash conflict occurs, the device may fail to learn many MAC addresses and can only broadcast traffic destined for these MAC addresses. The heavy broadcast traffic increases the load on the device. In this case, use an appropriate hash algorithm to mitigate the hash conflict.

  • Only the CE5810EI, CE5850HI, CE6800 series (excluding CE6880EI, CE6870EI and CE6875EI), CE7800 series, and CE8800 series support the configuration of a Hash Algorithm.
  • MAC addresses are distributed on a network randomly, so the best hash algorithm cannot be determined. Generally, the default hash algorithm is the best one, so do not change the hash algorithm unless you have special requirements.

  • An appropriate hash algorithm can reduce hash conflicts, but cannot prevent them.

  • After the hash algorithm is changed, restart the device to make the configuration take effect.


  1. Run system-view

    The system view is displayed.

  2. Run mac-address hash-mode { crc16-lower | crc16-upper | crc32-lower | crc32-upper | lsb }

    A hash algorithm is configured.

    The default hash algorithm is crc32-lower.

  3. Run commit

    The configuration is committed.

Verifying the Configuration

  • Run the display mac-address hash-mode command to check the running and configured hash algorithms.

  • Run the display mac-address hash-conflict [ mac-address { vlan vlan-id | bridge-domain bd-id } ] [ slot slot-id ] command to check the MAC address that cannot be added to the chip due to the hash conflict.

Updated: 2019-05-08

Document ID: EDOC1100004351

Views: 125734

Downloads: 295

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next