Web Management Guide-R03
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA Authorization and Accounting
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Setting A Time Range
- Showing TCAM Utilization
- Setting the ACL Name and Type
- Configuring a Standard IPv4 ACL
- Configuring an Extended IPv4 ACL
- Configuring a Standard IPv6 ACL
- Configuring an Extended IPv6 ACL
- Configuring a MAC ACL
- Configuring an ARP ACL
- Binding a Port to an Access Control List
- Configuring ACL Mirroring
- Showing ACL Hardware Counters
- ARP Inspection
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- IP Source Guard
- DHCP Snooping
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Power over Ethernet
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Setting Community Access Strings
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- IP Configuration
- IP Services
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering Multicast Data at Interfaces
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Multicast VLAN Registration
- Basic Management Tasks
- Appendices
- Glossary
- Index
Chapter 7
| Spanning Tree Algorithm
Configuring Interface Settings for STA
– 192 –
◆ Admin Edge Port – Since end nodes cannot cause forwarding loops, they can
pass directly through to the spanning tree forwarding state. Specifying Edge
Ports provides quicker convergence for devices such as workstations or servers,
retains the current forwarding database to reduce the amount of frame
flooding required to rebuild address tables during reconfiguration events, does
not cause the spanning tree to initiate reconfiguration when the interface
changes state, and also overcomes other STA-related timeout problems.
However, remember that Edge Port should only be enabled for ports
connected to an end-node device. (Default: Auto)
■
Enabled – Manually configures a port as an Edge Port.
■
Disabled – Disables the Edge Port setting.
■
Auto – The port will be automatically configured as an edge port if the
edge delay time expires without receiving any RSTP or MSTP BPDUs. Note
that edge delay time (802.1D-2004 17.20.4) equals the protocol migration
time if a port's link type is point-to-point (which is 3 seconds as defined in
IEEE 802.3D-2004 17.20.4); otherwise it equals the spanning tree’s
maximum age for configuration messages (see maximum age under
“Configuring Global Settings for STA” on page 183).
An interface cannot function as an edge port under the following conditions:
■
If spanning tree mode is set to STP (page 183), edge-port mode cannot
automatically transition to operational edge-port state using the automatic
setting.
■
If loopback detection is enabled (page 182) and a loopback BPDU is
detected, the interface cannot function as an edge port until the loopback
state is released.
■
If an interface is in forwarding state and its role changes, the interface
cannot continue to function as an edge port even if the edge delay time
has expired.
■
If the port does not receive any BPDUs after the edge delay timer expires,
its role changes to designated port and it immediately enters forwarding
state (see “Displaying Interface Settings for STA” on page 194).
◆ BPDU Guard – This feature protects edge ports from receiving BPDUs. It
prevents loops by shutting down an edge port when a BPDU is received instead
of putting it into the spanning tree discarding state. In a valid configuration,
configured edge ports should not receive BPDUs. If an edge port receives a
BPDU an invalid configuration exists, such as a connection to an unauthorized
device. The BPDU guard feature provides a secure response to invalid
configurations because an administrator must manually enable the port.
(Default: Disabled)
◆ BPDU Filter – BPDU filtering allows you to avoid transmitting BPDUs on
configured edge ports that are connected to end nodes. By default, STA sends
BPDUs to all ports regardless of whether administrative edge is enabled on a
port. BDPU filtering is configured on a per-port basis. (Default: Disabled)