Operation Manual
Table Of Contents
- Package Contents
- Chapter 1 About This Guide
- Chapter 2 Introduction
- Chapter 3 Login to the Switch
- Chapter 4 System
- Chapter 5 Switching
- Chapter 6 VLAN
- Chapter 7 Spanning Tree
- Chapter 8 Ethernet OAM
- Chapter 9 DHCP
- Chapter 10 Multicast
- Chapter 11 QoS
- Chapter 12 ACL
- Chapter 13 Network Security
- Chapter 14 SNMP
- Chapter 15 LLDP
- Chapter 16 Cluster
- Chapter 17 Maintenance
- Chapter 18 System Maintenance via FTP
- Appendix A: Glossary

124
The configuration procedure for switch E and F is the same with that for switch D.
The topology diagram of the two instances after the topology is stable
For Instance 1 (VLAN 101, 103 and 105), the red paths in the following figure are connected
links; the gray paths are the blocked links.
For Instance 2 (VLAN 102, 104 and 106), the blue paths in the following figure are connected
links; the gray paths are the blocked links.
Suggestion for Configuration
Enable TC Protect function for all the ports of switches.
Enable Root Protect function for all the ports of root bridges.
Enable Loop Protect function for the non-edge ports.
Enable BPDU Protect function or BPDU Filter function for the edge ports which are connected
to the PC and server.
Return to CONTENTS