- About This Document
Ethernet Switching
MAC Address Table Configuration
- Overview of MAC Addresses
Understanding MAC Address Tables
Application Scenarios for MAC Address Tables
- Summary of MAC Address Table Configuration Tasks
- Licensing Requirements and Limitations for MAC Address Tables
- Default Settings for MAC Address Tables
Configuring MAC Address Tables
- Configuring a Static MAC Address Entry
- Configuring a Blackhole MAC Address Entry
- Setting the Aging Time of Dynamic MAC Address Entries
- Disabling MAC Address Learning
- Configuring the MAC Address Limiting Function
- Enabling MAC Address Trap Functions
- Configuring a MAC Hash Algorithm
- Configuring the Extended MAC Entry Resource Mode
Configuring MAC Address Flapping Prevention
- Configuring MAC Address Flapping Detection
- Configuring the Switch to Discard Packets with an All-0 MAC Address
- Enabling MAC Address-triggered ARP Entry Update
- Enabling Port Bridge
- Configuring Re-marking of Destination MAC Addresses
- Disabling Real-Time MAC Address Synchronization Suppression
- Disabling Unknown Unicast Traffic Suppression
Maintaining MAC Address Tables
Configuration Examples for MAC Address Tables
- Example for Configuring Static MAC Address Entries
- Example for Configuring Blackhole MAC Address Entries
- Example for Configuring MAC Address Limiting on an Interface
- Example for Configuring MAC Address Limiting in a VLAN
- Example for Configuring MAC Address Flapping Prevention
- Example for Configuring MAC Address Flapping Detection
Troubleshooting MAC Address Tables
FAQ About MAC Address Tables
Link Aggregation Configuration
- Overview of Link Aggregation
Understanding Link Aggregation
Application Scenarios for Link Aggregation
- Summary of Link Aggregation Configuration Tasks
- Licensing Requirements and Limitations for Link Aggregation
- Default Settings for Link Aggregation
Configuring Link Aggregation in Manual Mode
- (Optional) Extending Eth-Trunk Specifications
- Creating a LAG
- Setting the Link Aggregation Mode to Manual
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Lower Threshold for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- Verifying the Configuration of Link Aggregation in Manual Mode
Configuring Link Aggregation in LACP Mode
- (Optional) Extending Eth-Trunk Specifications
- Creating a LAG
- Setting the Link Aggregation Mode to LACP
- Adding Member Interfaces to an Eth-Trunk
- (Optional) Setting the Upper and Lower Thresholds for the Number of Active Interfaces
- (Optional) Configuring a Load Balancing Mode
- (Optional) Setting the LACP System Priority
- (Optional) Setting the LACP Interface Priority
- (Optional) Configuring LACP Preemption
- (Optional) Setting the Timeout Interval for Receiving LACPDUs
- (Optional) Configuring an Eth-Trunk Member Interface on a Switch Directly Connected to a Server to Forward Packets
- Verifying the Configuration of Link Aggregation in LACP Mode
- Associating the Backup Member Interface of an Eth-Trunk in LACP Mode with Its Primary Member Interface
- Configuring an Eth-Trunk to Preferentially Forward Local Traffic in a Stack
- Creating an Eth-Trunk Sub-interface
Configuring an E-Trunk
- Setting the LACP System ID and LACP Priority of an E-Trunk
- Creating an E-Trunk and Setting the E-Trunk Priority
- Configuring Local and Remote IP Addresses of an E-Trunk
- Binding an E-Trunk to a BFD Session
- Adding an Eth-Trunk to an E-Trunk
- (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk
- (Optional) Configuring a Password
- (Optional) Setting the Timeout Interval of Hello Packets
- (Optional) Setting the Revertive Switching Delay
- (Optional) Disabling Revertive Switching on an E-Trunk
- (Optional) Configuring the E-Trunk Sequence Number Check Function
- Verifying the E-Trunk Configuration
- Deleting the Link Aggregation Configuration
- Maintaining Link Aggregation
Configuration Examples for Link Aggregation
Troubleshooting Link Aggregation
FAQ About Link Aggregation
VLAN Configuration
- Overview of VLANs
Understanding VLANs
Application Scenarios for VLANs
- Summary of VLAN Configuration Tasks
- Licensing Requirements and Limitations for VLANs
- Default Settings for VLANs
Configuring VLANs
Maintaining VLAN
- Collecting VLAN Traffic Statistics
- Clearing VLAN Traffic Statistics
- Clearing Packet Statistics on a VLANIF Interface
- Clearing LNP Packet Statistics
- Enabling GMAC Ping to Detect Layer 2 Network Connectivity
- Enabling GMAC Trace to Locate Faults
- Restoring the Default VLAN Configuration of an Interface
- Deleting a VLAN
Configuration Examples for VLANs
- Example for Configuring VLANIF Interfaces to Implement Inter-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Intra-VLAN Communication
- Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different Network Segments in the Same VLAN
- Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation
- Example for Configuring a Management VLAN to Implement Remote Management
- Example for Configuring Transparent Transmission of Protocol Packets in a VLAN
Troubleshooting VLANs
FAQ About VLANs
VLAN Aggregation Configuration
MUX VLAN Configuration
VLAN Termination Configuration
- Overview of VLAN Termination
Application Scenarios for VLAN Termination
- Summary of VLAN Termination Configuration Tasks
- Licensing Requirements and Limitations for VLAN Termination
- Default Settings for VLAN Termination
- Configuring a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication
Configuring a Dot1q Termination Sub-interface and Connecting It to an L2VPN
Configuring a Dot1q Termination Sub-interface and Connecting It to an L3VPN
Configuring a QinQ Termination Sub-interface and Connecting It to an L2VPN
Configuring a QinQ Termination Sub-interface and Connecting It to an L3VPN
Configuration Examples for VLAN Termination
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication
- Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN Communication Across Different Networks
- Example for Connecting Dot1q Sub-interfaces to a VLL Network
- Example for Connecting QinQ Termination Sub-interfaces to a VLL Network
- Example for Connecting Dot1q Termination Sub-interfaces to a VPLS Network
- Example for Connecting QinQ Termination Sub-interfaces to a VPLS Network
- Example for Connecting Dot1q Termination Sub-interfaces to an L3VPN
- Example for Connecting QinQ Termination Sub-interfaces to an L3VPN
Voice VLAN Configuration
- Overview of Voice VLANs
- Voice VLAN Typical Networking
- Understanding Voice VLANs
- Application Scenarios of Voice VLANs
- Licensing Requirements and Limitations for Voice VLANs
- Default Settings for Voice VLANs
Configuring a MAC Address-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on MAC Addresses
- Configuring an OUI for a Voice VLAN
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- (Optional) Configuring the Secure or Normal Mode of a Voice VLAN
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Verifying the MAC Address-based Voice VLAN Configuration
Configuring a VLAN ID-based Voice VLAN
- Enabling the Voice VLAN Function
- Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on VLAN IDs
- Configuring a Mode in Which an Interface Is Added to a Voice VLAN
- Configuring the Switch to Advertise Voice VLAN Information to an IP Phone
- (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN
- Verifying the VLAN ID-based Voice VLAN Configuration
Configuration Examples for Voice VLANs
QinQ Configuration
- Overview of QinQ
Understanding QinQ
Application Scenarios for QinQ
- Summary of QinQ Configuration Tasks
- Licensing Requirements and Limitations for QinQ
- Configuring Basic QinQ
Configuring Selective QinQ
- Configuring the TPID Value in an Outer VLAN Tag
- Configuring QinQ Stacking on a VLANIF Interface
- Configuring the Switch to Add Double VLAN Tags to Untagged Packets
Configuring QinQ Mapping
- Checking the VLAN Translation Resource Usage
Configuration Examples for QinQ
- Example for Configuring Basic QinQ
- Example for Configuring Selective QinQ
- Example for Configuring Selective QinQ and VLAN Mapping
- Example for Connecting a Single-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a Double-Tag VLAN Mapping Sub-Interface to a VLL Network
- Example for Connecting a VLAN Stacking Sub-interface to a VLL Network
- Example for Connecting a Single-Tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a Double-Tag VLAN Mapping Sub-interface to a VPLS Network
- Example for Connecting a VLAN Stacking Sub-interface to a VPLS Network
- Example for Configuring QinQ Stacking on a VLANIF Interface
Troubleshooting QinQ
FAQ About QinQ
VLAN Mapping Configuration
- Overview of VLAN Mapping
- Understanding VLAN Mapping
- Application Scenarios for VLAN Mapping
- Licensing Requirements and Limitations for VLAN Mapping
Configuring VLAN ID-based VLAN Mapping
- Configuring MQC-based VLAN Mapping
- Displaying VLAN Translation Resource Usage
Configuration Examples for VLAN Mapping
Troubleshooting VLAN Mapping
GVRP Configuration
VCMP Configuration
STP/RSTP Configuration
- Introduction to STP/RSTP
- STP Topology and BPDUs
- STP Port Roles and Port States
- Election Rules of the STP Root Bridge, Root Port, and Designated Port
- STP Timers
- STP Topology Calculation
- STP Topology Changes
Improvements Made in RSTP
- Summary of STP/RSTP Configuration Tasks
- Licensing Requirements and Limitations for STP/RSTP
- Default Settings for STP/RSTP
Configuring STP/RSTP
Configuring STP/RSTP Parameters That Affect the STP/RSTP Convergence Speed
- Setting the STP/RSTP Network Diameter
- Setting the STP/RSTP Timeout Interval
- Setting STP/RSTP Timers
- Configuring the Maximum Number of Connections in an Eth-Trunk that Affects STP/RSTP Calculation
- Configuring the Link Type for an RSTP Port
- Configuring the Maximum Transmission Rate of an RSTP Port
- Switching to the RSTP Mode
- Configuring Edge Ports and BPDU Filter Ports for RSTP
- Verifying the Configuration of STP/RSTP Parameters that Affect STP/RSTP Convergence
Configuring RSTP Protection Functions
- Configuring Parameters for Interoperation Between Huawei and Non-Huawei Devices
Maintaining STP/RSTP
Configuration Examples for STP/RSTP
FAQ About STP/RSTP
MSTP Configuration
- Overview of MSTP
Understanding MSTP
- Application Scenarios for MSTP
- Summary of MSTP Configuration Tasks
- Licensing Requirements and Limitations for MSTP
- Default Settings for MSTP
Configuring MSTP
- Configuring the MSTP Mode
- Configuring and Activating an MST Region
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Enabling MSTP
- Verifying the Basic MSTP Configuration
Configuring MSTP Multi-Process
- Creating an MSTP Process
- Adding a Port to an MSTP Process
- (Optional) Configuring the Root Bridge and Secondary Root Bridge
- (Optional) Configuring a Priority for a Switch in an MSTI
- (Optional) Configuring a Path Cost of a Port in an MSTI
- (Optional) Configuring a Port Priority in an MSTI
- Configuring TC Notification in MSTP Multi-process
- Enabling MSTP
- Verifying the MSTP Multi-Process Configuration
Configuring MSTP Parameters on an Interface
- Setting the MSTP Network Diameter
- Setting the MSTP Timeout Interval
- Setting the Values of MSTP Timers
- Configuring the Maximum Number of Connections in an Eth-Trunk that Affects STP/RSTP Calculation
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of an Interface
- Switching to the MSTP Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Setting the Maximum Number of Hops in an MST Region
- Verifying the Configuration of MSTP Parameters on an Interface
Configuring MSTP Protection Functions
Configuring MSTP Interoperation Between Huawei and Non-Huawei Devices
Maintaining MSTP
Configuration Examples for MSTP
FAQ About MSTP
VBST Configuration
- Overview of VBST
- Understanding VBST
- Application Scenarios for VBST
- Summary of VBST Configuration Tasks
- Licensing Requirements and Limitations for VBST
- Default Settings for VBST
Configuring VBST
Setting VBST Parameters That Affect VBST Convergence
- Setting the Network Diameter
- Setting Values of VBST Timers
- Setting the VBST Timeout Interval
- Setting the Link Type of a Port
- Setting the Maximum Transmission Rate of a Port
- Manually Switching to the VBST Mode
- Configuring a VBST Convergence Mode
- Configuring a Port as an Edge Port and BPDU Filter Port
- Verifying the Configuration of VBST Parameters That Affect VBST Convergence
Configuring Protection Functions of VBST
- Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
Maintaining VBST
- Example for Configuring VBST
SEP Configuration
- Overview of SEP
Understanding SEP
Application Scenarios for SEP
- Summary of SEP Configuration Tasks
- Licensing Requirements and Limitations for SEP
Configuring SEP
Specifying an Interface to Block
- Configuring SEP Multi-Instance
Configuring the Topology Change Notification Function
- Reporting Topology Changes in a Lower-Layer Network - SEP Topology Change Notification
- Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment to Process SmartLink Flush Packets
- Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP and CFM
- Verifying the Configuration of the Topology Change Notification Function
- Clearing SEP Statistics
Configuration Examples for SEP
RRPP Configuration
- Overview of RRPP
Understanding RRPP
Application Scenarios for RRPP
- Application of a Single Ring
- Application of Tangent RRPP Rings
- Application of Intersecting RRPP Rings
- Application of RRPP and STP
- Application of Intersecting RRPP Rings of Multi-Instance on a MAN
- Application of Tangent RRPP Rings of Multi-Instance on a MAN
- Application of Multiple Instances Single-homed to an RRPP Aggregation Ring
- Application of the RRPP Multi-instance Ring and Smart Link Network
- Application of RRPP Snooping
- Summary of RRPP Configuration Tasks
- Licensing Requirements and Limitations for RRPP
- Default Settings for RRPP
Configuring RRPP
- Configuring Interfaces on an RRPP Ring
- Creating an RRPP Domain and the Control VLAN
- Creating an Instance
- Configuring a Protected VLAN
- Creating and Enabling an RRPP Ring
- Enabling RRPP
- (Optional) Creating a Ring Group
- (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain
- (Optional) Setting the Value of the Link-Up Timer
- Verifying the RRPP Configuration
Configuring RRPP Snooping
- Clearing RRPP Statistics
Configuration Examples for RRPP
- Example for Configuring a Single RRPP Ring with a Single Instance
- Example for Configuring Intersecting RRPP Rings with a Single Instance
- Example for Configuring Tangent RRPP Rings
- Example for Configuring a Single RRPP Ring with Multiple Instances
- Example for Configuring Intersecting RRPP Rings with Multiple Instances
- Example for Configuring Tangent RRPP Rings with Multiple Instances
Troubleshooting RRPP
ERPS (G.8032) Configuration
- Overview of ERPS
Understanding ERPS
- Application Scenarios for ERPS
- Summary of ERPS Configuration Tasks
- Licensing Requirements and Limitations for ERPS
- Default Settings for ERPS
Configuring ERPSv1
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring the MEL Value
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Verifying the ERPSv1 Configuration
Configuring ERPSv2
- Creating an ERPS Ring
- Configuring the Control VLAN
- Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN
- Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role
- Configuring the Topology Change Notification Function
- (Optional) Configuring ERPS Protection Switching
- (Optional) Configuring Timers in an ERPS Ring
- (Optional) Configuring Association Between ERPS and Ethernet CFM
- Verifying the ERPSv2 Configuration
- Configuring the ERPS over VPLS Function
- Clearing ERPS Statistics
Configuration Examples for ERPS
- Example for Configuring ERPS Multi-instance
- Example for Configuring Intersecting ERPS Rings
- Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs (Through Ethernet Sub-interfaces)
- Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs (Through VLANIF Interfaces)
Troubleshooting ERPS
LBDT Configuration
Layer 2 Protocol Tunneling Configuration
- Overview of Layer 2 Protocol Tunneling
- Understanding Layer 2 Protocol Tunneling
- Application Scenarios for Layer 2 Protocol Tunneling
- Summary of Layer 2 Protocol Tunneling Configuration Tasks
- Licensing Requirements and Limitations for Layer 2 Protocol Tunneling
Configuring Interface-based Layer 2 Protocol Tunneling
Configuring VLAN-based Layer 2 Protocol Tunneling
Configuring QinQ-based Layer 2 Protocol Tunneling
Configuring VPLS-based Layer 2 Protocol Tunneling
Configuration Examples for Layer 2 Protocol Tunneling
FAQ About Layer 2 Protocol Tunneling