
OmniSwitch 6800/6850/9000 Network Configuration Guide June 2006 page -v
MST General Overview ..................................................................................................3-4
How MSTP Works ...................................................................................................3-4
Comparing MSTP with STP and RSTP ...................................................................3-7
What is a Multiple Spanning Tree Instance (MSTI) ................................................3-7
What is a Multiple Spanning Tree Region ...............................................................3-8
What is the Common Spanning Tree .......................................................................3-9
What is the Internal Spanning Tree (IST) Instance ..................................................3-9
What is the Common and Internal Spanning Tree Instance .....................................3-9
MST Configuration Overview ......................................................................................3-10
Using Spanning Tree Configuration Commands ...................................................3-10
Understanding Spanning Tree Modes ....................................................................3-11
MST Interoperability and Migration .............................................................................3-12
Migrating from Flat Mode STP/RSTP to Flat Mode MSTP ..................................3-12
Migrating from 1x1 Mode to Flat Mode MSTP .....................................................3-13
Quick Steps for Configuring an MST Region ...............................................................3-14
Quick Steps for Configuring MSTIs .............................................................................3-16
Verifying the MST Configuration .................................................................................3-19
Chapter 4 Configuring Learned Port Security ........................................................................4-1
In This Chapter ................................................................................................................4-1
Learned Port Security Specifications ..............................................................................4-2
Learned Port Security Defaults ......................................................................................4-2
Sample Learned Port Security Configuration .................................................................4-3
Learned Port Security Overview .....................................................................................4-4
How LPS Authorizes Source MAC Addresses ........................................................4-5
Dynamic Configuration of Authorized MAC Addresses .........................................4-5
Static Configuration of Authorized MAC Addresses ..............................................4-6
Understanding the LPS Table ..................................................................................4-6
Enabling/Disabling Learned Port Security ......................................................................4-7
Configuring a Source Learning Time Limit ....................................................................4-7
Configuring the Number of MAC Addresses Allowed ...................................................4-8
Configuring Authorized MAC Addresses .......................................................................4-8
Configuring an Authorized MAC Address Range ..........................................................4-9
Selecting the Security Violation Mode .........................................................................4-10
Displaying Learned Port Security Information .............................................................4-10
Chapter 5 Configuring VLANs ....................................................................................................5-1
In This Chapter ................................................................................................................5-1
VLAN Specifications ......................................................................................................5-2
VLAN Defaults ..............................................................................................................5-2
Sample VLAN Configuration .........................................................................................5-3
Kommentare zu diesen Handbüchern