- About This Document
- Ethernet Switching
- MAC Address Table Configuration
- Overview of MAC Addresses
- Understanding MAC Address Tables
- Application Scenarios for MAC Address Tables
- Summary of MAC Address Table Configuration Tasks
- Licensing Requirements and Limitations for MAC Address Tables
- Default Settings for MAC Address Tables
- Configuring MAC Address Tables
- Configuring a Static MAC Address Entry
- Configuring a Blackhole MAC Address Entry
- Setting the Aging Time of Dynamic MAC Address Entries
- Disabling MAC Address Learning
- Configuring the MAC Address Limiting Function
- Enabling MAC Address Trap Functions
- Configuring a MAC Hash Algorithm
- Configuring the Extended MAC Entry Resource Mode
- Configuring MAC Address Flapping Prevention
- Configuring MAC Address Flapping Detection
- Configuring the Switch to Discard Packets with an All-0 MAC Address
- Configuring the Switch to Discard Packets That Do Not Match Any MAC Address Entry
- Enabling MAC Address-triggered ARP Entry Update
- Enabling Port Bridge
- Configuring Re-marking of Destination MAC Addresses
- Maintaining MAC Address Tables
- Configuration Examples for MAC Address Tables
- Example for Configuring Static MAC Address Entries
- Example for Configuring Blackhole MAC Address Entries
- Example for Configuring MAC Address Limiting on an Interface
- Example for Configuring MAC Address Limiting in a VLAN
- Example for Configuring MAC Address Limiting in a VSI
- Example for Configuring MAC Address Flapping Prevention
- Example for Configuring MAC Address Flapping Detection
- Troubleshooting MAC Address Tables
- FAQ About MAC Address Tables
- References for MAC Address Tables
- Link Aggregation Configuration
- Overview of Link Aggregation
- Understanding Link Aggregation
- Application Scenarios for Link Aggregation
- Summary of Link Aggregation Configuration Tasks
- Licensing Requirements and Limitations for Link Aggregation
- Default Settings for Link Aggregation
- Configuring Link Aggregation in Manual Mode
- (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member Interfaces in Each LAG
- Creating a LAG
- Setting the Link Aggregation Mode to Manual
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Lower Threshold for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- Verifying the Configuration of Link Aggregation in Manual Mode
- Configuring Link Aggregation in LACP Mode
- (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member Interfaces in Each LAG
- Creating a LAG
- Setting the Link Aggregation Mode to LACP
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Upper and Lower Thresholds for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- (Optional) Setting the LACP System Priority
- (Optional) Setting the LACP Interface Priority
- (Optional) Configuring LACP Preemption
- (Optional) Setting the Timeout Interval for Receiving LACPDUs
- (Optional) Configuring an Eth-Trunk Member Interface on a Switch Directly Connected to a Server to Forward Packets
- Verifying the Configuration of Link Aggregation in LACP Mode
- Configuring Preferential Forwarding of Local Traffic in a CSS
- Creating an Eth-Trunk Sub-interface
- Configuring an E-Trunk
- Setting the LACP System ID and LACP Priority of an E-Trunk
- Creating an E-Trunk and Setting the E-Trunk Priority
- Configuring Local and Remote IP Addresses of an E-Trunk
- Binding an E-Trunk to a BFD Session
- Adding an Eth-Trunk to an E-Trunk
- (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk
- (Optional) Setting the Password for Encrypting Packets
- (Optional) Setting the Timeout Interval of Hello Packets
- (Optional) Setting the Revertive Switching Delay
- (Optional) Disabling Revertive Switching on an E-Trunk
- (Optional) Configuring the E-Trunk Sequence Number Check Function
- Verifying the E-Trunk Configuration
- Maintaining Link Aggregation
- Configuration Examples for Link Aggregation
- Troubleshooting Link Aggregation
- FAQ About Link Aggregation
- References for Link Aggregation
- VLAN Configuration
- Overview of VLANs
- Understanding VLANs
- Application Scenarios for VLANs
- Summary of VLAN Configuration Tasks
- Licensing Requirements and Limitations for VLANs
- Default Settings for VLANs
- Configuring VLANs
- Configuring Interface-based VLAN Assignment (Statically Configured Interface Type)
- Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)
- Configuring MAC Address-based VLAN Assignment
- Configuring IP Subnet-based VLAN Assignment
- Configuring Protocol-based VLAN Assignment
- Configuring Policy-based VLAN Assignment
- Configuring Inter-VLAN Communication
- Configuring a Traffic Policy to Implement Intra-VLAN Layer 2 Isolation
- Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Configuring an mVLAN
- Configuring Transparent Transmission of Protocol Packets in a VLAN
- Maintaining VLAN
- Configuration Examples for VLANs
- Example for Configuring Interface-based VLAN Assignment (Statically Configured Link Type)
- Example for Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)
- Example for Configuring MAC Address-based Assignment (the Switch Connects to Downstream Terminals)
- Example for Configuring MAC Address-based VLAN Assignment (the Switch Connects to Downstream Layer 2 Switching Devices)
- Example for Configuring IP Subnet-based VLAN Assignment
- Example for Configuring Protocol-based VLAN Assignment
- Example for Configuring VLANIF Interfaces to Implement Inter-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Intra-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different Network Segments in the Same VLAN
- Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Example for Configuring an mVLAN to Implement Remote Management
- Example for Configuring Transparent Transmission of Protocol Packets in a VLAN
- Troubleshooting VLANs
- FAQ About VLANs
- How Do I Restore the Default VLAN Configuration of an Interface?
- How Do I Rapidly Query the Link Types and Default VLANs of All Interfaces?
- Can Multiple Network Segments Be Configured in a VLAN?
- Can the Switch Collect Statistics on Only Traffic Destined for the VLANIF Interface Enabled with Traffic Statistics?
- References for VLANs
- VLAN Aggregation Configuration
- VLAN Switch Configuration
- MUX VLAN Configuration
- VLAN Termination Configuration
- Overview of VLAN Termination
- Application Scenarios for VLAN Termination
- Summary of VLAN Termination Configuration Tasks
- Licensing Requirements and Limitations for VLAN Termination
- Default Settings for VLAN Termination
- Configuring a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication
- Configuring a Dot1q Termination Sub-interface and Connecting It to an L2VPN
- Configuring a Dot1q Termination Sub-interface and Connecting It to an L3VPN
- Configuring a QinQ Termination Sub-interface and Connecting It to an L2VPN
- Configuring a QinQ Termination Sub-interface and Connecting It to an L3VPN
- Configuration Examples for VLAN Termination
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication Across Different Networks
- Example for Connecting Dot1q Sub-interfaces to a VLL Network
- Example for Connecting QinQ Termination Sub-interfaces to a VLL Network
- Example for Connecting Dot1q Termination Sub-interfaces to a VPLS Network
- Example for Connecting QinQ Termination Sub-interfaces to a VPLS Network
- Example for Connecting Dot1q Termination Sub-interfaces to an L3VPN
- Example for Connecting QinQ Termination Sub-interfaces to an L3VPN
- Voice VLAN Configuration
- Overview of Voice VLANs
- Voice VLAN Typical Networking
- Understanding Voice VLANs
- Application Scenarios for Voice VLANs
- Licensing Requirements and Limitations for Voice VLANs
- Default Settings for Voice VLANs
- Configuring a MAC Address-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on MAC Addresses
- Configuring an OUI for a Voice VLAN
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- (Optional) Configuring the Secure or Normal Mode of a Voice VLAN
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Verifying the MAC Address-based Voice VLAN Configuration
- Configuring a VLAN ID-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on VLAN IDs
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- Configuring the Switch to Advertise Voice VLAN Information to an IP Phone
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Verifying the VLAN ID-based Voice VLAN Configuration
- Configuration Examples for Voice VLANs
- QinQ Configuration
- Overview of QinQ
- Understanding QinQ
- Application Scenarios for QinQ
- Summary of QinQ Configuration Tasks
- Licensing Requirements and Limitations for QinQ
- Configuring Basic QinQ
- Configuring Selective QinQ
- Configuring the TPID Value in an Outer VLAN Tag
- Configuring the Switch to Add Double VLAN Tags to Untagged Packets
- Configuring QinQ Mapping
- Checking the VLAN Translation Resource Usage
- Configuration Examples for QinQ
- Example for Configuring Basic QinQ
- Example for Configuring Selective QinQ
- Example for Configuring Selective QinQ and VLAN Mapping
- Example for Configuring Traffic Selective QinQ and a Traffic Policy
- Example for Configuring Flow-based Selective QinQ
- Example for Connecting a Single-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a Double-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a VLAN Stacking Sub-interface to a VLL Network
- Example for Connecting a Single-Tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a Double-Tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a VLAN Stacking Sub-interface to a VPLS Network
- Troubleshooting QinQ
- FAQ About QinQ
- References for QinQ
- VLAN Mapping Configuration
- Overview of VLAN Mapping
- Understanding VLAN Mapping
- Application Scenarios for VLAN Mapping
- Licensing Requirements and Limitations for VLAN Mapping
- Configuring VLAN ID-based VLAN Mapping
- Configuring 802.1p Priority-based VLAN Mapping
- Configuring MQC-based VLAN Mapping
- Displaying VLAN Translation Resource Usage
- Configuration Examples for VLAN Mapping
- Troubleshooting VLAN Mapping
- GVRP Configuration
- VCMP Configuration
- STP/RSTP Configuration
- Overview of STP/RSTP
- Understanding STP/RSTP
- Application Scenarios for STP/RSTP
- Summary of STP/RSTP Configuration Tasks
- Licensing Requirements and Limitations for STP/RSTP
- Default Settings for STP/RSTP
- Configuring STP/RSTP
- Configuring STP Parameters That Affect the STP Convergence Speed
- Configuring RSTP Parameters That Affect the RSTP Convergence Speed
- Setting the RSTP Network Diameter
- Setting the RSTP Timeout Interval
- Setting RSTP Timers
- Configuring the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree Calculation
- Configuring the Link Type for a Port
- Configuring the Maximum Transmission Rate of an Interface
- Switching to the RSTP Mode
- Configuring Edge Ports and BPDU Filter Ports
- Verifying the Configuration of RSTP Parameters that Affect RSTP Convergence
- Configuring RSTP Protection Functions
- Configuring Parameters for Interoperation Between Huawei and Non-Huawei Devices
- Maintaining STP/RSTP
- Configuration Examples for STP/RSTP
- FAQ About STP/RSTP
- References for STP/RSTP
- MSTP Configuration
- Overview of MSTP
- Understanding MSTP
- Application Scenarios for MSTP
- Summary of MSTP Configuration Tasks
- Licensing Requirements and Limitations for MSTP
- Default Settings for MSTP
- Configuring MSTP
- Configuring the MSTP Mode
- Configuring and Activating an MST Region
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Enabling MSTP
- Verifying the Basic MSTP Configuration
- Configuring MSTP Multi-Process
- Creating an MSTP Process
- Adding a Port to an MSTP Process
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Configuring TC Notification in MSTP Multi-process
- Enabling MSTP
- Verifying the MSTP Multi-Process Configuration
- Configuring MSTP Parameters on an Interface
- Setting the MSTP Network Diameter
- Setting the MSTP Timeout Interval
- Setting the Values of MSTP Timers
- Configuring the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree Calculation
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of an Interface
- Switching to the MSTP Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Setting the Maximum Number of Hops in an MST Region
- Verifying the Configuration of MSTP Parameters on an Interface
- Configuring MSTP Protection Functions
- Configuring MSTP Interoperation Between Huawei and Non-Huawei Devices
- Maintaining MSTP
- Configuration Examples for MSTP
- FAQ About MSTP
- References for MSTP
- VBST Configuration
- Overview of VBST
- Understanding VBST
- Application Scenarios for VBST
- Summary of VBST Configuration Tasks
- Licensing Requirements and Limitations for VBST
- Default Settings for VBST
- Configuring VBST
- Setting VBST Parameters That Affect VBST Convergence
- Setting the Network Diameter
- Setting Values of VBST Timers
- Setting the VBST Timeout Interval
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of a Port
- Manually Switching to the VBST Mode
- Configuring a VBST Convergence Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Verifying the Configuration of VBST Parameters That Affect VBST Convergence
- Configuring Protection Functions of VBST
- Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
- Maintaining VBST
- Example for Configuring VBST
- SEP Configuration
- Overview of SEP
- Understanding SEP
- Application Scenarios for SEP
- Summary of SEP Configuration Tasks
- Licensing Requirements and Limitations for SEP
- Configuring SEP
- Specifying an Interface to Block
- Configuring SEP Multi-Instance
- Configuring the Topology Change Notification Function
- Reporting Topology Changes in a Lower-Layer Network - SEP Topology Change Notification
- Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment to Process SmartLink Flush Packets
- Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP and CFM
- Verifying the Configuration of the Topology Change Notification Function
- Clearing SEP Statistics
- Configuration Examples for SEP
- Example for Configuring SEP on a Closed Ring Network
- Example for Configuring SEP on a Multi-Ring Network
- Example for Configuring a Hybrid SEP+MSTP Ring Network
- Example for Configuring a Hybrid SEP+RRPP Ring Network
- Example for Configuring SEP Multi-Instance
- Example for Configuring Association Between SEP and VPLS (Reporting Topology Changes of a Lower-Layer Network)
- RRPP Configuration
- Overview of RRPP
- Understanding RRPP
- Application Scenarios for RRPP
- Application of a Single Ring
- Application of Tangent RRPP Rings
- Application of Intersecting RRPP Rings
- Application of RRPP and STP
- Application of Intersecting RRPP Rings of Multi-Instance on a MAN
- Application of Tangent RRPP Rings of Multi-Instance on a MAN
- Application of Multiple Instances Single-homed to an RRPP Aggregation Ring
- Application of the RRPP Multi-instance Ring and Smart Link Network
- Application of RRPP Snooping
- Summary of RRPP Configuration Tasks
- Licensing Requirements and Limitations for RRPP
- Default Settings for RRPP
- Configuring RRPP
- Configuring Interfaces on an RRPP Ring
- Creating an RRPP Domain and the Control VLAN
- Creating an Instance
- Configuring a Protected VLAN
- (Optional) Setting the RRPP Working Mode
- Creating and Enabling an RRPP Ring
- Enabling RRPP
- (Optional) Creating a Ring Group
- (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain
- (Optional) Setting the Value of the Link-Up Timer
- Verifying the RRPP Configuration
- Configuring RRPP Snooping
- Clearing RRPP Statistics
- Configuration Examples for RRPP
- Example for Configuring a Single RRPP Ring with a Single Instance
- Example for Configuring Intersecting RRPP Rings with a Single Instance When Huawei Devices and Third-Party Devices Are Used
- Example for Configuring Intersecting RRPP Rings with a Single Instance When Only Huawei Devices Are Used
- Example for Configuring Tangent RRPP Rings
- Example for Configuring a Single RRPP Ring with Multiple Instances
- Example for Configuring Intersecting RRPP Rings with Multiple Instances When Huawei Devices and Third-Party Devices Are Used
- Example for Configuring Intersecting RRPP Rings with Multiple Instances When Only Huawei Devices Are Used
- Example for Configuring Tangent RRPP Rings with Multiple Instances
- Troubleshooting RRPP
- FAQ About RRPP
- References for RRPP
- ERPS (G.8032) Configuration
- Overview of ERPS
- Understanding ERPS
- Application Scenarios for ERPS
- Summary of ERPS Configuration Tasks
- Licensing Requirements and Limitations for ERPS
- Default Settings for ERPS
- Configuring ERPSv1
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring the MEL Value
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Verifying the ERPSv1 Configuration
- Configuring ERPSv2
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- Configuring the Topology Change Notification Function
- (Optional) Configuring ERPS Protection Switching
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Verifying the ERPSv2 Configuration
- Configuring the ERPS over VPLS Function
- Clearing ERPS Statistics
- Configuration Examples for ERPS
- Example for Configuring ERPS Multi-instance
- Example for Configuring Intersecting ERPS Rings
- Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs (Through Ethernet Sub-interfaces)
- Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs (Through VLANIF Interfaces)
- Troubleshooting ERPS
- References for ERPS
- LDT and LBDT Configuration
- Overview of LBDT and LDT
- Understanding LDT and LBDT
- Application Scenarios for LDT and LBDT
- Licensing Requirements and Limitations for LDT and LBDT
- Default Settings for LDT and LBDT
- Configuring LDT to Detect Loops
- Configuring Automatic LBDT
- Configuring Manual LBDT
- Configuration Examples for LBDT
- Example for Configuring LDT to Detect Loops on the Downstream Network
- Example for Configuring LDT to Detect Loops on the Local Network
- Example for Configuring LBDT to Detect Loopbacks on an Interface
- Example for Configuring LBDT to Detect Loops on the Downstream Network
- Example for Configuring LBDT to Detect Loops on the Local Network
- Layer 2 Protocol Transparent Transmission Configuration
- Overview of Layer 2 Protocol Transparent Transmission
- Understanding Layer 2 Protocol Transparent Transmission
- Application Scenarios for Layer 2 Protocol Transparent Transmission
- Summary of Layer 2 Protocol Transparent Transmission Configuration Tasks
- Licensing Requirements and Limitations for Layer 2 Protocol Transparent Transmission
- Configuring Interface-based Layer 2 Protocol Transparent Transmission
- Configuring VLAN-based Layer 2 Protocol Transparent Transmission
- Configuring QinQ-based Layer 2 Protocol Transparent Transmission
- Configuring VPLS-based Layer 2 Protocol Transparent Transmission
- Configuration Examples for Layer 2 Protocol Transparent Transmission
- Example for Configuring Interface-based Layer 2 Protocol Transparent Transmission
- Example for Configuring VLAN-based Layer 2 Protocol Transparent Transmission
- Example for Configuring QinQ-based Layer 2 Protocol Transparent Transmission
- Example for Configuring VPLS-based Layer 2 Protocol Transparent Transmission
- FAQ About Layer 2 Protocol Transparent Transmission
- References for Layer 2 Protocol Transparent Transmission