Technical information

AX Series L2 Loop Detection Configuration Guide (Edition 2)
Copyright © 2008, 2010, ALAXALA Networks Corporation. All rights reserved.
4
Contents
1. Impact of an L2 Loop and the Countermeasure Functionality...........................................................5
1.1 L2 loops and their risks ...............................................................................................................5
1.2 L2 loop control functionality.........................................................................................................6
1.3 Auto MDI/MDI-X suppression......................................................................................................6
1.4 L2 loop detection functionality.....................................................................................................7
1.5 Storm control .............................................................................................................................10
2. Examples of the Basic Usage of the L2 Loop Detection Functionality ............................................12
2.1 Example of an application configuration ...................................................................................12
2.2 Important points for constructing a system ...............................................................................14
2.3 Configuration example ..............................................................................................................16
2.4 Troubleshooting with operation commands ..............................................................................18
2.5 Other operation commands.......................................................................................................23
3. Restrictions and Notes.....................................................................................................................24
3.1 For Auto MDI/MDI-X suppression .............................................................................................24
3.2 For L2 loop detection functionality ............................................................................................24
Appendix: Configuration File ....................................................................................................................26