Specifications

184
DCS-3950 series Ethernet switch manual
10.2.2.21 spanning-tree digest-snooping
Command: spanning-tree digest-snooping
no spanning-tree digest-snooping
Function: Configure the port to use the authentication string of partner port .the command
no spanning-tree digest-snooping’restores to use the port generated authentication
string.
Default: Don’t use the authentication string of partner port .
Command mode: Interface Mode
Usage Guide:
According to MSTP protocol, the region authentication string is generated by MD5
algorithm with public authentication key, intstance ID, VLAN ID. Some manufactory don’t
use the public authentication key, this causes the incompatibility. After the command is
executed the port can use the authentication string of partner port, realize compatibility
with these manufactories equipment.
Notes: Because the authentication string is related to instance ID and VLAN ID, the
command may cause recognizing the equipment that with different instance and VLAN
relation as in the same region. Before the command is executed, make sure that instance
and VLAN relation is accord for all the equipment. If there are more than one equipment
connected , all the connected ports should execute this command.
Example:
Switch(Config)#interface ethernet 0/0/2
Switch(Config-Ethernet-0/0/2)#spanning-tree digest-snooping
Switch(Config-Ethernet-0/0/2)#
10.2.2.22 spanning-tree tcflush (global mode)
Command:spanning-tree tcflush enable
spanning-tree tcflush disable
spanning-tree tcflush protect
no spanning-tree tcflush
Function: Configure the spanning-tree flush mode once the topology changes. ‘no
spanning-tree tcflush’ restores to default setting
Parameter:
Enable:the spanning-tree flush once the topology changes.
Disable:the spanning tree don’t flush when the topology changes.
Protect: the spanning-tree flush every ten seconds
Default: enable
Command mode:Global Mode
Usage Guide:
According to MSTP, when topology changes, the port that send change message
clears MAC/ARP table (FLUSH). In fact it is not needed for some network environment to
do FLUSH with every topology change. At the same time ,as a method to avoid network
assault, we allow the network administrator to configure FLUSH mode by the command