0% found this document useful (0 votes)
57 views19 pages

00-3 Contents

Uploaded by

Riky Fitriadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views19 pages

00-3 Contents

Uploaded by

Riky Fitriadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

S1720, S2700, S5700, and S6720 Series Ethernet

Switches
Configuration Guide - Ethernet Switching Contents

Contents

About This Document................................................................................................................ ii


1 Ethernet Switching Features Supported in This Version................................................1
2 Ethernet Switching..................................................................................................................9
2.1 Overview of Ethernet Switching.........................................................................................................................................9
2.2 Basic Concepts of Ethernet................................................................................................................................................ 10
2.2.1 Ethernet Network Layers................................................................................................................................................ 10
2.2.2 Overview of Ethernet Cable Standards...................................................................................................................... 11
2.2.3 CSMA/CD.............................................................................................................................................................................. 14
2.2.4 Minimum Frame Length and Maximum Transmission Distance...................................................................... 15
2.2.5 Duplex Modes of Ethernet............................................................................................................................................. 15
2.2.6 Auto-Negotiation of Ethernet....................................................................................................................................... 16
2.2.7 Collision Domain and Broadcast Domain................................................................................................................. 18
2.2.8 MAC Sub-layer....................................................................................................................................................................18
2.2.9 LLC Sub-layer...................................................................................................................................................................... 23
2.3 Switching on the Ethernet................................................................................................................................................. 24
2.3.1 Layer 2 Switching.............................................................................................................................................................. 24
2.3.2 Layer 3 Switching.............................................................................................................................................................. 25
2.4 Application Scenarios for Ethernet Switching............................................................................................................. 28
2.4.1 Building an Enterprise Network................................................................................................................................... 28

3 MAC Address Table Configuration.................................................................................... 30


3.1 Overview of MAC Address Tables................................................................................................................................... 31
3.2 Understanding MAC Address Tables.............................................................................................................................. 31
3.2.1 Definition and Classification of MAC Address Entries.......................................................................................... 31
3.2.2 Elements and Functions of a MAC Address Table..................................................................................................33
3.2.3 MAC Address Entry Learning and Aging................................................................................................................... 34
3.2.4 MAC Address Learning Control.....................................................................................................................................36
3.2.5 MAC Address Flapping.....................................................................................................................................................37
3.2.6 MAC Address-Triggered ARP Entry Update.............................................................................................................. 40
3.3 Application Scenarios for MAC Address Tables.......................................................................................................... 41
3.3.1 Configuring MAC Address Flapping Prevention to Block User Attacks.......................................................... 41
3.3.2 Configuring MAC Address Flapping Detection to Quickly Detect Loops....................................................... 42

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. vi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

3.3.3 Configuring MAC Address-Triggered ARP Entry Update to Improve VRRP Switchover Performance
............................................................................................................................................................................................................ 43
3.4 Summary of MAC Address Table Configuration Tasks.............................................................................................44
3.5 Licensing Requirements and Limitations for MAC Address Tables...................................................................... 48
3.6 Default Settings for MAC Address Tables.....................................................................................................................50
3.7 Configuring MAC Address Tables.................................................................................................................................... 51
3.7.1 Configuring a Static MAC Address Entry................................................................................................................... 51
3.7.2 Configuring a Blackhole MAC Address Entry...........................................................................................................52
3.7.3 Setting the Aging Time of Dynamic MAC Address Entries................................................................................. 53
3.7.4 Disabling MAC Address Learning.................................................................................................................................53
3.7.5 Configuring the MAC Address Limiting Function................................................................................................... 62
3.7.6 Enabling MAC Address Trap Functions...................................................................................................................... 63
3.7.7 Configuring a MAC Hash Algorithm........................................................................................................................... 65
3.7.8 Configuring the Extended MAC Entry Resource Mode.........................................................................................67
3.8 Configuring MAC Address Flapping Prevention......................................................................................................... 67
3.8.1 Configuring a MAC Address Learning Priority for an Interface.........................................................................68
3.8.2 Preventing MAC Address Flapping Between Interfaces with the Same Priority..........................................69
3.9 Configuring MAC Address Flapping Detection........................................................................................................... 70
3.10 Configuring the Switch to Discard Packets with an All-0 MAC Address......................................................... 72
3.11 Enabling MAC Address-triggered ARP Entry Update............................................................................................. 73
3.12 Enabling Port Bridge..........................................................................................................................................................74
3.13 Configuring Re-marking of Destination MAC Addresses......................................................................................75
3.14 Maintaining MAC Address Tables................................................................................................................................. 82
3.14.1 Displaying MAC Address Entries................................................................................................................................ 82
3.14.2 Deleting MAC Address Entries.................................................................................................................................... 83
3.14.3 Displaying MAC Address Flapping Information....................................................................................................83
3.15 Configuration Examples for MAC Address Tables................................................................................................... 83
3.15.1 Example for Configuring Static MAC Address Entries........................................................................................ 83
3.15.2 Example for Configuring Blackhole MAC Address Entries................................................................................ 85
3.15.3 Example for Configuring MAC Address Limiting on an Interface.................................................................. 87
3.15.4 Example for Configuring MAC Address Limiting in a VLAN............................................................................ 88
3.15.5 Example for Configuring MAC Address Flapping Prevention.......................................................................... 90
3.15.6 Example for Configuring MAC Address Flapping Detection............................................................................ 92
3.16 Troubleshooting MAC Address Tables......................................................................................................................... 94
3.16.1 MAC Address Entries Failed to Be Learned on an Interface............................................................................ 94
3.17 FAQ About MAC Address Tables................................................................................................................................... 98
3.17.1 How Do I Enable and Disable MAC Address Flapping Detection?................................................................ 98
3.17.2 How Do I Check MAC Address Flapping Information?...................................................................................... 98
3.17.3 What Should I Do When Finding a MAC Address Flapping Alarm?..............................................................98
3.17.4 How Do I Rapidly Determine a Loop?..................................................................................................................... 99
3.17.5 How Do I Configure VLAN-based Blackhole MAC Address Entries?............................................................. 99

4 Link Aggregation Configuration......................................................................................101

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. vii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

4.1 Overview of Link Aggregation....................................................................................................................................... 102


4.2 Understanding Link Aggregation.................................................................................................................................. 102
4.2.1 Basic Concepts of Link Aggregation......................................................................................................................... 102
4.2.2 Link Aggregation in Manual Mode........................................................................................................................... 105
4.2.3 Link Aggregation in LACP Mode................................................................................................................................ 106
4.2.4 Load Balancing Modes of Link Aggregation......................................................................................................... 111
4.2.5 Link Aggregation in Stack Scenarios........................................................................................................................ 113
4.2.6 E-Trunk................................................................................................................................................................................ 115
4.3 Application Scenarios for Link Aggregation.............................................................................................................. 119
4.3.1 Switches Are Directly Connected Using Link Aggregation............................................................................... 119
4.3.2 Switches Are Connected Across a Transmission Device Using Link Aggregation..................................... 120
4.3.3 Switches Connect to Transmission Devices Using Link Aggregation............................................................ 120
4.3.4 A Switch Connects to a Server Using Link Aggregation.................................................................................... 121
4.3.5 A Switch Connects to a Stack Using Link Aggregation......................................................................................122
4.3.6 Using E-Trunk to Implement Link Aggregation Across Devices...................................................................... 123
4.4 Summary of Link Aggregation Configuration Tasks.............................................................................................. 124
4.5 Licensing Requirements and Limitations for Link Aggregation..........................................................................125
4.6 Default Settings for Link Aggregation........................................................................................................................ 130
4.7 Configuring Link Aggregation in Manual Mode...................................................................................................... 131
4.7.1 (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member
Interfaces in Each LAG............................................................................................................................................................. 131
4.7.2 Creating an LAG.............................................................................................................................................................. 132
4.7.3 Setting the Manual Load Balancing Mode............................................................................................................ 132
4.7.4 Adding Member Interfaces to an Eth-Trunk.......................................................................................................... 133
4.7.5 (Optional) Setting the Lower Threshold for the Number of Active Interfaces......................................... 134
4.7.6 (Optional) Configuring a Load Balancing Mode................................................................................................. 135
4.7.7 Verifying the Configuration of Link Aggregation in Manual Mode.............................................................. 138
4.8 Configuring Link Aggregation in LACP Mode...........................................................................................................138
4.8.1 (Optional) Setting the Maximum Number of LAGs and the Maximum Number of Member
Interfaces in Each LAG............................................................................................................................................................. 138
4.8.2 Creating an LAG.............................................................................................................................................................. 139
4.8.3 Setting the LACP Mode................................................................................................................................................. 140
4.8.4 Adding Member Interfaces to an Eth-Trunk.......................................................................................................... 140
4.8.5 (Optional) Setting the Upper and Lower Thresholds for the Number of Active Interfaces................. 142
4.8.6 (Optional) Configuring a Load Balancing Mode................................................................................................. 143
4.8.7 (Optional) Setting the LACP System Priority........................................................................................................ 146
4.8.8 (Optional) Setting the LACP Interface Priority..................................................................................................... 147
4.8.9 (Optional) Configuring LACP Preemption.............................................................................................................. 147
4.8.10 (Optional) Setting the Timeout Interval for Receiving LACPDUs................................................................ 148
4.8.11 (Optional) Configuring an Eth-Trunk Member Interface on a Switch Directly Connected to a Server
to Forward Packets.................................................................................................................................................................... 149
4.8.12 Verifying the Configuration of Link Aggregation in LACP Mode................................................................. 150

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. viii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

4.9 Associating the Secondary Member Interface of an Eth-Trunk Interface in LACP Mode with Its Primary
Member Interface...................................................................................................................................................................... 151
4.10 Configuring Preferential Forwarding of Local Traffic in a Stack..................................................................... 152
4.11 Creating an Eth-Trunk Sub-interface......................................................................................................................... 153
4.12 Configuring an E-Trunk.................................................................................................................................................. 155
4.12.1 Setting the LACP System ID and LACP Priority of an E-Trunk...................................................................... 155
4.12.2 Creating an E-Trunk and Setting the E-Trunk Priority......................................................................................156
4.12.3 Configuring Local and Remote IP Addresses of an E-Trunk.......................................................................... 156
4.12.4 Binding an E-Trunk to a BFD Session.....................................................................................................................157
4.12.5 Adding an Eth-Trunk to an E-Trunk........................................................................................................................ 158
4.12.6 (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk............................................. 158
4.12.7 (Optional) Setting the Password for Encrypting Packets............................................................................... 159
4.12.8 (Optional) Setting the Timeout Interval of Hello Packets............................................................................. 160
4.12.9 (Optional) Setting the Revertive Switching Delay............................................................................................ 161
4.12.10 (Optional) Disabling Revertive Switching on an E-Trunk.............................................................................161
4.12.11 (Optional) Configuring the E-Trunk Sequence Number Check Function............................................... 162
4.12.12 Verifying the E-Trunk Configuration.................................................................................................................... 162
4.13 Maintaining Link Aggregation..................................................................................................................................... 162
4.14 Configuration Examples for Link Aggregation.......................................................................................................163
4.14.1 Example for Configuring Link Aggregation in Manual Mode....................................................................... 163
4.14.2 Example for Configuring Link Aggregation in LACP Mode............................................................................ 166
4.14.3 Example for Configuring an Inter-Chassis Eth-Trunk to Forward Traffic Preferentially Through Local
Member Interfaces (Stack).....................................................................................................................................................170
4.15 Troubleshooting Link Aggregation............................................................................................................................. 174
4.15.1 Traffic Is Unevenly Load Balanced Among Eth-Trunk Member Interfaces Because the Load
Balancing Mode Is Incorrect.................................................................................................................................................. 174
4.15.2 Eth-Trunk at Both Ends Cannot Be Up Because the Lower Threshold for the Number of Active
Interfaces Is Incorrect............................................................................................................................................................... 175
4.16 FAQ About Link Aggregation....................................................................................................................................... 175
4.16.1 Can an Eth-Trunk Be Configured with an IP Address?.....................................................................................175
4.16.2 How Do I Add Member Interfaces to an Eth-Trunk?........................................................................................175
4.16.3 How Do I Delete Member Interfaces from an Eth-Trunk?............................................................................. 176
4.16.4 What Is the Function of the Delay for LACP Preemption?.............................................................................176
4.16.5 Which Switches Are Recommended for Link Aggregation in FTTx Scenarios of MAN?...................... 176

5 VLAN Configuration........................................................................................................... 178


5.1 Overview of VLANs............................................................................................................................................................ 178
5.2 Understanding VLANs....................................................................................................................................................... 179
5.2.1 VLAN Tags......................................................................................................................................................................... 180
5.2.2 Link and Interface Types............................................................................................................................................... 181
5.2.3 Default VLAN....................................................................................................................................................................183
5.2.4 Adding and Removing VLAN Tags............................................................................................................................ 184
5.2.5 LNP....................................................................................................................................................................................... 189
5.2.6 VLAN Assignment........................................................................................................................................................... 192

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. ix


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

5.2.7 Intra-VLAN Communication........................................................................................................................................ 197


5.2.8 Inter-VLAN Communication........................................................................................................................................ 200
5.2.9 Intra-VLAN Layer 2 Isolation....................................................................................................................................... 205
5.2.10 Inter-VLAN Layer 3 Isolation.....................................................................................................................................205
5.2.11 mVLAN............................................................................................................................................................................. 206
5.2.12 Protocol Packet Transparent Transmission in a VLAN..................................................................................... 206
5.3 Application Scenarios for VLANs................................................................................................................................... 207
5.3.1 Using VLAN Assignment to Implement Layer 2 Isolation................................................................................ 207
5.3.2 Using VLANIF Interfaces to Implement Inter-VLAN Layer 3 Connectivity.................................................. 209
5.3.3 Using a Traffic Policy to Implement Inter-VLAN Access Control.................................................................... 210
5.3.4 Using a VLANIF Interface to Implement Layer 3 Connectivity Between the Switch and Router........211
5.4 Summary of VLAN Configuration Tasks..................................................................................................................... 212
5.5 Licensing Requirements and Limitations for VLANs.............................................................................................. 214
5.6 Default Settings for VLANs............................................................................................................................................. 218
5.7 Configuring VLANs............................................................................................................................................................. 219
5.7.1 Configuring Interface-based VLAN Assignment (Statically Configured Interface Type)........................219
5.7.2 Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link Type)..........222
5.7.3 Configuring MAC Address-based VLAN Assignment.......................................................................................... 224
5.7.4 Configuring IP Subnet-based VLAN Assignment................................................................................................. 227
5.7.5 Configuring Protocol-based VLAN Assignment.................................................................................................... 229
5.7.6 Configuring Policy-based VLAN Assignment......................................................................................................... 231
5.7.7 Configuring Inter-VLAN Communication................................................................................................................ 233
5.7.8 Configuring a Traffic Policy to Implement Intra-VLAN Layer 2 Isolation....................................................235
5.7.9 Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation.................................................... 235
5.7.10 Configuring an mVLAN.............................................................................................................................................. 236
5.7.11 Configuring Transparent Transmission of Protocol Packets in a VLAN......................................................238
5.8 Maintaining VLANs............................................................................................................................................................ 239
5.8.1 Collecting VLAN Traffic Statistics.............................................................................................................................. 239
5.8.2 Clearing VLAN Traffic Statistics................................................................................................................................. 240
5.8.3 Clearing Packet Statistics on a VLANIF Interface................................................................................................ 241
5.8.4 Clearing LNP Packet Statistics.................................................................................................................................... 241
5.8.5 Enabling GMAC Ping to Detect Layer 2 Network Connectivity...................................................................... 241
5.8.6 Enabling GMAC Trace to Locate Faults................................................................................................................... 242
5.9 Configuration Examples for VLANs.............................................................................................................................. 243
5.9.1 Example for Configuring Interface-based VLAN Assignment (Statically Configured Link Type)........243
5.9.2 Example for Configuring Interface-based VLAN Assignment (LNP Dynamically Negotiates the Link
Type).............................................................................................................................................................................................. 245
5.9.3 Example for Configuring MAC Address-based Assignment (the Switch Connects to Downstream
Terminals).....................................................................................................................................................................................249
5.9.4 Example for Configuring IP Subnet-based VLAN Assignment........................................................................ 251
5.9.5 Example for Configuring Protocol-based VLAN Assignment........................................................................... 253
5.9.6 Example for Configuring VLANIF Interfaces to Implement Inter-VLAN Communication...................... 257
5.9.7 Example for Configuring VLANIF Interfaces to Implement Intra-VLAN Communication......................259

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. x


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

5.9.8 Example for Configuring VLANIF Interfaces to Implement Communication of Hosts on Different
Network Segments in the Same VLAN.............................................................................................................................. 262
5.9.9 Example for Configuring a Traffic Policy to Implement Inter-VLAN Layer 3 Isolation...........................265
5.9.10 Example for Configuring an mVLAN to Implement Remote Management.............................................271
5.9.11 Example for Configuring Transparent Transmission of Protocol Packets in a VLAN.............................274
5.10 Troubleshooting VLANs..................................................................................................................................................276
5.10.1 A VLANIF Interface Fails to Be Created................................................................................................................ 277
5.10.2 A VLANIF Interface Goes Down...............................................................................................................................278
5.10.3 Users in a VLAN Cannot Communicate................................................................................................................ 279
5.10.4 IP Addresses of the Connected Interfaces Between Switches Cannot Be Pinged.................................. 280
5.11 FAQ About VLANs............................................................................................................................................................ 282
5.11.1 How Do I Create VLANs in a Batch?...................................................................................................................... 282
5.11.2 How Do I Add Interfaces to a VLAN in a Batch?............................................................................................... 282
5.11.3 How Do I Restore the Default VLAN Configuration of an Interface?........................................................ 283
5.11.4 How Do I Change the Link Type of an Interface?............................................................................................. 283
5.11.5 How Do I Rapidly Query the Link Types and Default VLANs of All Interfaces?..................................... 285
5.11.6 How Do I Delete a Single VLAN or VLANs in a Batch?................................................................................... 286
5.11.7 Can Multiple Network Segments Be Configured in a VLAN?....................................................................... 286
5.11.8 How Is the Inter-VLAN Communication Fault Rectified?................................................................................287
5.11.9 Do VLANs Need to Be Assigned on the Intermediate Device That Transparently Transmits Packets?
......................................................................................................................................................................................................... 289
5.11.10 Why Are MAC-VLAN Entries Invalid?.................................................................................................................. 289
5.11.11 Can the Switch Collect Statistics on Only Traffic Destined for the VLANIF Interface Enabled with
Traffic Statistics?........................................................................................................................................................................ 290

6 VLAN Aggregation Configuration................................................................................... 291


6.1 Overview of VLAN Aggregation.................................................................................................................................... 291
6.2 Understanding VLAN Aggregation............................................................................................................................... 293
6.3 Application Scenarios for VLAN Aggregation........................................................................................................... 298
6.4 Licensing Requirements and Limitations for VLAN Aggregation.......................................................................299
6.5 Default Settings for VLAN Aggregation..................................................................................................................... 302
6.6 Configuring VLAN Aggregation..................................................................................................................................... 302
6.6.1 Creating a Sub-VLAN..................................................................................................................................................... 302
6.6.2 Creating a Super-VLAN................................................................................................................................................. 303
6.6.3 Configuring a VLANIF Interface Corresponding to a Super-VLAN................................................................. 304
6.6.4 (Optional) Enabling Proxy ARP on the VLANIF Interface Corresponding to a Super-VLAN................. 305
6.6.5 Verifying the VLAN Aggregation Configuration................................................................................................... 305
6.7 Example for Configuring VLAN Aggregation............................................................................................................ 306
6.8 FAQ About VLAN Aggregation...................................................................................................................................... 309
6.8.1 How Do I Implement Communication Between Specific Sub-VLANs in a Super-VLAN......................... 309
6.8.2 How Can a Traffic Policy Be Configured in a Super-VLAN or Sub-VLAN to Make the Traffic Policy
Take Effect.................................................................................................................................................................................... 310

7 MUX VLAN Configuration................................................................................................. 311


7.1 Overview of MUX VLANs................................................................................................................................................. 311

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

7.2 Licensing Requirements and Limitations for MUX VLANs................................................................................... 314


7.3 Default Settings for MUX VLANs.................................................................................................................................. 317
7.4 Configuring MUX VLANs..................................................................................................................................................317
7.4.1 Configuring a Principal VLAN for MUX VLANs..................................................................................................... 317
7.4.2 Configuring a Group VLAN for a Subordinate VLAN..........................................................................................318
7.4.3 Configuring a Separate VLAN for a Subordinate VLAN.................................................................................... 319
7.4.4 Enabling the MUX VLAN Function on an Interface............................................................................................ 319
7.4.5 Verifying the MUX VLAN Configuration................................................................................................................. 320
7.5 Configuration Examples for MUX VLANs................................................................................................................... 321
7.5.1 Example for Configuring MUX VLAN on the Access Device............................................................................ 321
7.5.2 Example for Configuring MUX VLAN on the Aggregation Device................................................................. 323

8 VLAN Termination Configuration................................................................................... 327


8.1 Overview of VLAN Termination..................................................................................................................................... 327
8.2 Application Scenarios for VLAN Termination........................................................................................................... 329
8.2.1 Using a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication..........................329
8.2.2 Using a Dot1q Termination Sub-interface to Connect to a VPN....................................................................330
8.2.3 Using a QinQ Termination Sub-interface to Connect to a VPN..................................................................... 332
8.3 Summary of VLAN Termination Configuration Tasks............................................................................................ 334
8.4 Licensing Requirements and Limitations for VLAN Termination....................................................................... 336
8.5 Default Settings for VLAN Termination...................................................................................................................... 338
8.6 Configuring a Dot1q Termination Sub-interface to Implement Inter-VLAN Communication................. 338
8.7 Configuring a Dot1q Termination Sub-interface and Connecting It to an L2VPN...................................... 339
8.7.1 Configuring a Dot1q Termination Sub-interface..................................................................................................340
8.7.2 Configuring L2VPN......................................................................................................................................................... 340
8.7.3 Verifying the Configuration of a Dot1q Termination Sub-interface and Its Connection to an L2VPN
......................................................................................................................................................................................................... 341
8.8 Configuring a Dot1q Termination Sub-interface and Connecting It to an L3VPN...................................... 341
8.8.1 Configuring a Dot1q Termination Sub-interface..................................................................................................342
8.8.2 Configuring L3VPN......................................................................................................................................................... 343
8.8.3 Verifying the Configuration of a Dot1q Termination Sub-interface and Its Connection to an L3VPN
......................................................................................................................................................................................................... 343
8.9 Configuring a QinQ Termination Sub-interface and Connecting It to an L2VPN........................................343
8.9.1 Configuring a QinQ Sub-interface............................................................................................................................ 344
8.9.2 Configuring L2VPN......................................................................................................................................................... 350
8.9.3 Verifying the Configuration of a QinQ Termination Sub-interface and Its Connection to an L2VPN
......................................................................................................................................................................................................... 351
8.10 Configuring a QinQ Termination Sub-interface and Connecting It to an L3VPN..................................... 351
8.10.1 Configuring a QinQ Sub-interface.......................................................................................................................... 351
8.10.2 Configuring L3VPN....................................................................................................................................................... 353
8.10.3 Verifying the Configuration of QinQ Termination Sub-interface and Its Connection to an L3VPN
......................................................................................................................................................................................................... 353
8.11 Configuration Examples for VLAN Termination.................................................................................................... 353

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

8.11.1 Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN


Communication.......................................................................................................................................................................... 353
8.11.2 Example for Configuring Dot1q Termination Sub-interfaces to Implement Inter-VLAN
Communication Across Different Networks..................................................................................................................... 356
8.11.3 Example for Connecting Dot1q Sub-interfaces to a VLL Network.............................................................. 360
8.11.4 Example for Connecting QinQ Termination Sub-interfaces to a VLL Network...................................... 369
8.11.5 Example for Connecting Dot1q Termination Sub-interfaces to a VPLS Network.................................. 380
8.11.6 Example for Connecting QinQ Termination Sub-interfaces to a VPLS Network....................................390
8.11.7 Example for Connecting Dot1q Termination Sub-interfaces to an L3VPN...............................................401
8.11.8 Example for Connecting QinQ Termination Sub-interfaces to an L3VPN................................................ 415

9 Voice VLAN Configuration................................................................................................ 431


9.1 Overview of Voice VLANs................................................................................................................................................ 431
9.2 Voice VLAN Typical Networking.................................................................................................................................... 432
9.3 Understanding Voice VLANs........................................................................................................................................... 432
9.4 Application Scenarios for Voice VLANs....................................................................................................................... 434
9.5 Licensing Requirements and Limitations for Voice VLAN.................................................................................... 435
9.6 Default Settings for Voice VLANs................................................................................................................................. 438
9.7 Configuring a MAC Address-based Voice VLAN...................................................................................................... 439
9.7.1 Enabling the Voice VLAN Function........................................................................................................................... 439
9.7.2 Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on MAC Addresses
......................................................................................................................................................................................................... 440
9.7.3 Configuring an OUI for a Voice VLAN..................................................................................................................... 440
9.7.4 Configuring a Mode in Which an Interface Is Added to a Voice VLAN........................................................441
9.7.5 (Optional) Configuring the Secure or Normal Mode of a Voice VLAN....................................................... 442
9.7.6 (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN.................................... 444
9.7.7 Verifying the MAC Address-based Voice VLAN Configuration........................................................................ 445
9.8 Configuring a VLAN ID-based Voice VLAN............................................................................................................... 445
9.8.1 Enabling the Voice VLAN Function........................................................................................................................... 445
9.8.2 Configuring a Mode in Which the Priority of Voice Packets Is Increased Based on VLAN IDs............ 446
9.8.3 Configuring a Mode in Which an Interface Is Added to a Voice VLAN........................................................446
9.8.4 Configuring the Switch to Advertise Voice VLAN Information to an IP Phone......................................... 447
9.8.5 (Optional) Configuring the 802.1p Priority and DSCP Priority for a Voice VLAN.................................... 448
9.8.6 Verifying the VLAN ID-based Voice VLAN Configuration................................................................................. 448
9.9 Configuration Examples for Voice VLANs.................................................................................................................. 449
9.9.1 Example for Configuring a MAC Address-based Voice VLAN (IP Phones Send Untagged Voice
Packets)......................................................................................................................................................................................... 449
9.9.2 Example for Configuring a VLAN ID-based Voice VLAN (IP Phones Send Tagged Voice Packets).... 451

10 QinQ Configuration.......................................................................................................... 454


10.1 Overview of QinQ............................................................................................................................................................ 454
10.2 Understanding QinQ....................................................................................................................................................... 455
10.2.1 QinQ Fundamentals.................................................................................................................................................... 455
10.2.2 Basic QinQ...................................................................................................................................................................... 458
10.2.3 Selective QinQ............................................................................................................................................................... 460

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xiii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

10.2.4 VLAN Stacking on a VLANIF Interface.................................................................................................................. 461


10.2.5 TPID................................................................................................................................................................................... 462
10.2.6 QinQ Mapping............................................................................................................................................................... 463
10.3 Application Scenarios for QinQ................................................................................................................................... 465
10.3.1 Public User Services on a Metro Ethernet Network......................................................................................... 466
10.3.2 Enterprise Network Connection Through Private Lines.................................................................................. 467
10.4 Summary of QinQ Configuration Tasks................................................................................................................... 468
10.5 Licensing Requirements and Limitations for QinQ.............................................................................................. 469
10.6 Configuring Basic QinQ................................................................................................................................................. 474
10.7 Configuring Selective QinQ.......................................................................................................................................... 475
10.7.1 Configuring VLAN ID-based Selective QinQ....................................................................................................... 475
10.7.2 Configuring MQC-based Selective QinQ.............................................................................................................. 477
10.8 Configuring the TPID Value in an Outer VLAN Tag.............................................................................................484
10.9 Configuring QinQ Stacking on a VLANIF Interface..............................................................................................484
10.10 Configuring the Device to Add Double VLAN Tags to Untagged Packets................................................. 486
10.11 Configuring QinQ Mapping....................................................................................................................................... 488
10.11.1 Configuring 1-to-1 QinQ Mapping...................................................................................................................... 488
10.11.2 Configuring 2-to-1 QinQ Mapping...................................................................................................................... 489
10.12 Displaying VLAN Translation Resource Usage.....................................................................................................490
10.13 Configuration Examples for QinQ........................................................................................................................... 490
10.13.1 Example for Configuring Basic QinQ...................................................................................................................490
10.13.2 Example for Configuring Selective QinQ........................................................................................................... 493
10.13.3 Example for Configuring Selective QinQ and VLAN Mapping................................................................... 496
10.13.4 Example for Configuring Flow-based Selective QinQ................................................................................... 499
10.13.5 Example for Connecting a Single-Tag VLAN Mapping Sub-Interface to a VLL Network..................502
10.13.6 Example for Connecting a Double-Tag VLAN Mapping Sub-Interface to a VLL Network................512
10.13.7 Example for Connecting a VLAN Stacking Sub-interface to a VLL Network........................................ 522
10.13.8 Example for Connecting a Single-tag VLAN Mapping Sub-interface to a VPLS Network................533
10.13.9 Example for Connecting a Double-tag VLAN Mapping Sub-interface to a VPLS Network............. 543
10.13.10 Example for Connecting a VLAN Stacking Sub-interface to a VPLS Network................................... 554
10.13.11 Example for Configuring QinQ Stacking on a VLANIF Interface............................................................ 566
10.14 Troubleshooting QinQ..................................................................................................................................................569
10.14.1 QinQ Traffic Forwarding Fails Because the Outer VLAN Is Not Created................................................569
10.14.2 QinQ Traffic Forwarding Fails Because the Interface Does Not Transparently Transmit the Outer
VLAN ID........................................................................................................................................................................................ 569
10.15 FAQ About QinQ............................................................................................................................................................ 570
10.15.1 Does the Switch Support QinQ?........................................................................................................................... 570
10.15.2 What Are Causes for QinQ Traffic Forwarding Failures?............................................................................. 570
10.15.3 Can I Rapidly Delete All QinQ Configurations of an Interface?................................................................ 571
10.15.4 Can I Directly Delete Inner VLAN IDs from QinQ Configuration?............................................................ 571
10.15.5 Can the Switch Add Double VLAN Tags to Untagged Packets?................................................................ 571
10.15.6 Which Tag Does the TPID Configured by the qinq protocol Command Match?................................571

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xiv


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

10.15.7 Which VLAN Does the Interface Enabled with VLAN Mapping or QinQ Obtain Through MAC
Address Learning?..................................................................................................................................................................... 571

11 VLAN Mapping Configuration....................................................................................... 572


11.1 Overview of VLAN Mapping........................................................................................................................................ 572
11.2 Understanding VLAN Mapping................................................................................................................................... 573
11.3 Application Scenarios for VLAN Mapping............................................................................................................... 575
11.4 Licensing Requirements and Limitations for VLAN Mapping........................................................................... 577
11.5 Configuring VLAN ID-based VLAN Mapping..........................................................................................................584
11.5.1 Configuring 1:1 VLAN Mapping...............................................................................................................................584
11.5.2 Configuring 2:1 VLAN Mapping...............................................................................................................................585
11.5.3 Configuring 2:2 VLAN Mapping...............................................................................................................................586
11.5.4 Verifying the VLAN ID-based VLAN Mapping Configuration........................................................................587
11.6 Configuring MQC-based VLAN Mapping.................................................................................................................587
11.7 Displaying VLAN Translation Resource Usage....................................................................................................... 594
11.8 Configuration Examples for VLAN Mapping.......................................................................................................... 595
11.8.1 Example for Configuring VLAN ID-based 1:1 VLAN Mapping...................................................................... 595
11.8.2 Example for Configuring VLAN ID-based N:1 VLAN Mapping..................................................................... 598
11.8.3 Example for Configuring VLAN ID-based 2 to 1 VLAN Mapping................................................................ 599
11.8.4 Example for Configuring VLAN ID-based 2:2 VLAN Mapping...................................................................... 604
11.9 Troubleshooting VLAN Mapping.................................................................................................................................608
11.9.1 Communication Failure After VLAN Mapping Configuration....................................................................... 608

12 GVRP Configuration......................................................................................................... 611


12.1 Overview of GVRP........................................................................................................................................................... 611
12.2 Understanding GVRP...................................................................................................................................................... 612
12.2.1 Basic Concepts of GVRP............................................................................................................................................. 612
12.2.2 Packet Format................................................................................................................................................................ 616
12.2.3 Working Mechanism....................................................................................................................................................617
12.3 Application Scenarios for GVRP.................................................................................................................................. 620
12.4 Licensing Requirements and Limitations for GVRP.............................................................................................. 621
12.5 Default Settings for GVRP............................................................................................................................................. 624
12.6 Configuring GVRP............................................................................................................................................................ 625
12.6.1 Enabling GVRP............................................................................................................................................................... 625
12.6.2 (Optional) Setting the Registration Mode for a GVRP Interface................................................................. 626
12.6.3 (Optional) Setting GARP Timers............................................................................................................................. 627
12.6.4 Verifying the GVRP Configuration.......................................................................................................................... 629
12.7 Clearing GVRP Statistics................................................................................................................................................ 629
12.8 Example for Configuring GVRP................................................................................................................................... 629
12.9 FAQ About GVRP.............................................................................................................................................................. 633
12.9.1 Why Is the CPU Usage High When VLANs Are Created or Deleted Through GVRP in Default
Configuration?............................................................................................................................................................................ 633

13 VCMP Configuration.........................................................................................................635
13.1 Overview of VCMP...........................................................................................................................................................635

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xv


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

13.2 Understanding VCMP..................................................................................................................................................... 636


13.2.1 Basic Concepts of VCMP.............................................................................................................................................636
13.2.2 VCMP Implementation............................................................................................................................................... 638
13.3 Application Scenarios for VCMP................................................................................................................................. 645
13.4 Licensing Requirements and Limitations for VCMP............................................................................................. 646
13.5 Default Settings for VCMP............................................................................................................................................ 649
13.6 Configuring VCMP........................................................................................................................................................... 649
13.7 Maintaining VCMP........................................................................................................................................................... 652
13.7.1 Displaying VCMP Running Information................................................................................................................ 653
13.7.2 Clearing VCMP Running Information.................................................................................................................... 653
13.8 Example for Configuring VCMP to Implement Centralized VLAN Management...................................... 653

14 STP/RSTP Configuration.................................................................................................. 659


14.1 Overview of STP/RSTP.................................................................................................................................................... 659
14.2 Understanding STP/RSTP.............................................................................................................................................. 660
14.2.1 Background..................................................................................................................................................................... 660
14.2.2 Basic Concepts of STP/RSTP......................................................................................................................................661
14.2.3 BPDU Format................................................................................................................................................................. 668
14.2.4 STP Topology Calculation.......................................................................................................................................... 670
14.2.5 Improvements in RSTP................................................................................................................................................ 678
14.2.6 RSTP Technology Details............................................................................................................................................ 684
14.3 Application Scenarios for STP...................................................................................................................................... 686
14.4 Summary of STP/RSTP Configuration Tasks........................................................................................................... 687
14.5 Licensing Requirements and Limitations for STP/RSTP...................................................................................... 688
14.6 Default Settings for STP/RSTP..................................................................................................................................... 691
14.7 Configuring STP/RSTP.................................................................................................................................................... 691
14.7.1 Configuring the STP/RSTP Mode.............................................................................................................................691
14.7.2 (Optional) Configuring the Root Bridge and Secondary Root Bridge........................................................692
14.7.3 (Optional) Setting a Priority for a Switching Device........................................................................................693
14.7.4 (Optional) Setting a Path Cost for a Port............................................................................................................ 693
14.7.5 (Optional) Setting a Priority for a Port................................................................................................................. 694
14.7.6 Enabling STP/RSTP....................................................................................................................................................... 695
14.7.7 Verifying the STP/RSTP Configuration.................................................................................................................. 696
14.8 Setting STP Parameters That Affect STP Convergence....................................................................................... 697
14.8.1 Setting the STP Network Diameter........................................................................................................................ 697
14.8.2 Setting the STP Timeout Interval............................................................................................................................ 698
14.8.3 Setting the STP Timers............................................................................................................................................... 698
14.8.4 Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree
Calculation................................................................................................................................................................................... 699
14.8.5 Verifying the Configuration of STP Parameters that Affect STP Convergence....................................... 701
14.9 Setting RSTP Parameters that Affect RSTP Convergence...................................................................................701
14.9.1 Setting the RSTP Network Diameter..................................................................................................................... 701
14.9.2 Setting the RSTP Timeout Interval......................................................................................................................... 702

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xvi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

14.9.3 Setting RSTP Timers.....................................................................................................................................................702


14.9.4 Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree
Calculation................................................................................................................................................................................... 704
14.9.5 Setting the Link Type for a Port.............................................................................................................................. 705
14.9.6 Setting the Maximum Transmission Rate of an Interface.............................................................................. 705
14.9.7 Switching to the RSTP Mode.................................................................................................................................... 706
14.9.8 Configuring Edge Ports and BPDU Filter Ports...................................................................................................707
14.9.9 Verifying the Configuration of RSTP Parameters that Affect RSTP Convergence.................................. 708
14.10 Configuring RSTP Protection Functions................................................................................................................. 708
14.10.1 Configuring BPDU Protection on a Switching Device....................................................................................708
14.10.2 Configuring TC Protection on a Switching Device.......................................................................................... 709
14.10.3 Configuring Root Protection on a Port............................................................................................................... 710
14.10.4 Configuring Loop Protection on a Port...............................................................................................................710
14.10.5 Verifying the Configuration of RSTP Protection Functions.......................................................................... 711
14.11 Setting Parameters for Interoperation Between Huawei and Non-Huawei Devices............................. 711
14.12 Maintaining STP/RSTP................................................................................................................................................. 712
14.12.1 Clearing STP/RSTP Statistics................................................................................................................................... 712
14.12.2 Monitoring STP/RSTP Topology Change Statistics......................................................................................... 713
14.13 Configuration Examples for STP/RSTP................................................................................................................... 713
14.13.1 Example for Configuring Basic STP Functions..................................................................................................713
14.13.2 Example for Configuring Basic RSTP Functions............................................................................................... 717
14.14 FAQ About STP/RSTP....................................................................................................................................................722
14.14.1 How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?................................ 722
14.14.2 Can Switches Using RSTP and STP Be Connected?........................................................................................ 722
14.14.3 Why Is the Recommended Value of STP Network Radius Within 7?.......................................................723
14.14.4 Why Does the STP Convergence Fail for a Switch?........................................................................................723
14.14.5 In What Condition Do I Need to Configure STP Edge Ports?..................................................................... 723
14.14.6 What Are Precautions for Configuring the Formats of Sent and Received BPDUs on an STP
Interface?...................................................................................................................................................................................... 723
14.14.7 How Do I Configure a User-Side Interface on an STP Switch?.................................................................. 724
14.14.8 How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP
Addresses When They Connect to an STP Network?.................................................................................................... 724
14.14.9 Can the Switch Work with the Non-Huawei Devices Running STP or RSTP?....................................... 724
14.14.10 What Is the Function of the Automatic Edge-port Detecting?................................................................725

15 MSTP Configuration......................................................................................................... 726


15.1 Overview of MSTP........................................................................................................................................................... 726
15.2 Understanding MSTP...................................................................................................................................................... 727
15.2.1 MSTP Background........................................................................................................................................................ 727
15.2.2 Basic Concepts of MSTP............................................................................................................................................. 729
15.2.3 MST BPDUs..................................................................................................................................................................... 735
15.2.4 MSTP Topology Calculation...................................................................................................................................... 738
15.2.5 MSTP Fast Convergence............................................................................................................................................. 740
15.2.6 MSTP Multi-Process..................................................................................................................................................... 741

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xvii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

15.3 Application Scenarios for MSTP.................................................................................................................................. 749


15.4 Summary of MSTP Configuration Tasks...................................................................................................................750
15.5 Licensing Requirements and Limitations for MSTP..............................................................................................752
15.6 Default Settings for MSTP............................................................................................................................................ 754
15.7 Configuring MSTP............................................................................................................................................................ 755
15.7.1 Configuring the MSTP Mode.................................................................................................................................... 755
15.7.2 Configuring and Activating an MST Region........................................................................................................ 756
15.7.3 (Optional) Configuring the Root Bridge and Secondary Root Bridge........................................................758
15.7.4 (Optional) Configuring a Priority for a Switch in an MSTI............................................................................ 759
15.7.5 (Optional) Configuring a Path Cost of a Port in an MSTI..............................................................................759
15.7.6 (Optional) Configuring a Port Priority in an MSTI........................................................................................... 760
15.7.7 Enabling MSTP...............................................................................................................................................................760
15.7.8 Verifying the Basic MSTP Configuration...............................................................................................................762
15.8 Configuring MSTP Multi-Process................................................................................................................................ 762
15.8.1 Creating an MSTP Process......................................................................................................................................... 762
15.8.2 Adding a Port to an MSTP Process......................................................................................................................... 763
15.8.3 (Optional) Configuring the Root Bridge and Secondary Root Bridge........................................................764
15.8.4 (Optional) Configuring a Priority for a Switch in an MSTI............................................................................ 765
15.8.5 (Optional) Configuring a Path Cost of a Port in an MSTI..............................................................................766
15.8.6 (Optional) Configuring a Port Priority in an MSTI........................................................................................... 767
15.8.7 Configuring TC Notification in MSTP Multi-process.........................................................................................767
15.8.8 Enabling MSTP...............................................................................................................................................................768
15.8.9 Verifying the MSTP Multi-Process Configuration.............................................................................................. 769
15.9 Configuring MSTP Parameters on an Interface..................................................................................................... 770
15.9.1 Setting the MSTP Network Diameter.................................................................................................................... 770
15.9.2 Setting the MSTP Timeout Interval........................................................................................................................ 771
15.9.3 Setting the Values of MSTP Timers........................................................................................................................ 771
15.9.4 Setting the Maximum Number of Connections in an Eth-Trunk that Affects Spanning Tree
Calculation................................................................................................................................................................................... 773
15.9.5 Setting the Link Type for a Port.............................................................................................................................. 774
15.9.6 Setting the Maximum Transmission Rate of an Interface.............................................................................. 774
15.9.7 Switching to the MSTP Mode................................................................................................................................... 775
15.9.8 Configuring a Port as an Edge Port and BPDU Filter Port............................................................................. 776
15.9.9 Setting the Maximum Number of Hops in an MST Region...........................................................................777
15.9.10 Verifying the Configuration of MSTP Parameters on an Interface........................................................... 778
15.10 Configuring MSTP Protection Functions................................................................................................................ 778
15.10.1 Configuring BPDU Protection on a Switch........................................................................................................ 778
15.10.2 Configuring TC Protection on a Switch...............................................................................................................779
15.10.3 Configuring Root Protection on an Interface................................................................................................... 780
15.10.4 Configuring Loop Protection on an Interface................................................................................................... 781
15.10.5 Configuring Shared-Link Protection on a Switch............................................................................................ 782
15.10.6 Verifying the MSTP Protection Function Configuration................................................................................782
15.11 Configuring MSTP Interoperability Between Huawei and Non-Huawei Devices.................................... 782

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xviii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

15.11.1 Configuring a Proposal/Agreement Mechanism............................................................................................. 782


15.11.2 Configuring the MSTP Protocol Packet Format on an Interface............................................................... 783
15.11.3 Enabling the Digest Snooping Function............................................................................................................. 784
15.11.4 Verifying the Configuration of MSTP Interoperability Between Huawei and Non-Huawei Devices
......................................................................................................................................................................................................... 785
15.12 Maintaining MSTP......................................................................................................................................................... 785
15.12.1 Clearing MSTP Statistics.......................................................................................................................................... 785
15.12.2 Monitoring the Statistics on MSTP Topology Changes................................................................................. 785
15.13 Configuration Examples for MSTP........................................................................................................................... 786
15.13.1 Example for Configuring MSTP............................................................................................................................. 786
15.13.2 Example for Configuring MSTP + VRRP Network........................................................................................... 795
15.13.3 Example for Connecting CEs to the VPLS in Dual-Homing Mode Through MSTP..............................806
15.13.4 Example for Configuring MSTP Multi-Process for Layer 2 Single-Access Rings and Layer 2 Multi-
Access Rings................................................................................................................................................................................. 823
15.14 FAQ About MSTP........................................................................................................................................................... 829
15.14.1 Can a Huawei STP Switch Work with a Non-Huawei STP Device?.......................................................... 829
15.14.2 How to Prevent Low Convergence for STP Edge Ports that Connect Terminals?................................ 829
15.14.3 How Do I Configure a User-Side Interface on an STP Switch?.................................................................. 830
15.14.4 How Do I Prevent Terminals' Failures to Ping the Gateway or Low Speed in Obtaining IP
Addresses When They Connect to an STP Network?.................................................................................................... 830

16 VBST Configuration.......................................................................................................... 831


16.1 Overview of VBST............................................................................................................................................................ 831
16.2 Understanding VBST....................................................................................................................................................... 834
16.3 Application Scenarios for VBST................................................................................................................................... 839
16.4 Summary of VBST Configuration Tasks....................................................................................................................841
16.5 Licensing Requirements and Limitations for VBST............................................................................................... 843
16.6 Default Settings for VBST..............................................................................................................................................847
16.7 Configuring VBST............................................................................................................................................................. 848
16.7.1 (Optional) Setting the Device Priority...................................................................................................................848
16.7.2 (Optional) Setting the Path Cost for a Port........................................................................................................ 849
16.7.3 (Optional) Configuring Port Priorities................................................................................................................... 850
16.7.4 (Optional) Manually Configuring the Mapping between MSTIs and VLANs.......................................... 851
16.7.5 Enabling VBST................................................................................................................................................................ 852
16.7.6 Verifying the Basic VBST Configuration................................................................................................................ 854
16.8 Setting VBST Parameters That Affect VBST Convergence................................................................................. 854
16.8.1 Setting the Network Diameter................................................................................................................................ 855
16.8.2 Setting Values of VBST Timers.................................................................................................................................855
16.8.3 Setting the VBST Timeout Interval......................................................................................................................... 857
16.8.4 Setting the Link Type for a Port.............................................................................................................................. 857
16.8.5 Setting the Maximum Transmission Rate of a Port.......................................................................................... 858
16.8.6 Manually Switching to the VBST Mode................................................................................................................ 859
16.8.7 Configuring a VBST Convergence Mode...............................................................................................................859
16.8.8 Configuring a Port as an Edge Port and BPDU Filter Port............................................................................. 860

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xix


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

16.8.9 Verifying the Configuration of VBST Parameters That Affect VBST Convergence.................................861
16.9 Configuring Protection Functions of VBST.............................................................................................................. 862
16.9.1 Configuring BPDU Protection on the Switch.......................................................................................................862
16.9.2 Configuring TC Protection on the Switch............................................................................................................. 863
16.9.3 Configuring Root Protection on a Port................................................................................................................. 864
16.9.4 Configuring Loop Protection on a Port................................................................................................................. 864
16.9.5 Verifying the Configuration of VBST Protection Functions............................................................................ 865
16.10 Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device
......................................................................................................................................................................................................... 866
16.11 Maintaining VBST.......................................................................................................................................................... 867
16.11.1 Displaying VBST Running Information and Statistics.................................................................................... 867
16.11.2 Clearing VBST Statistics........................................................................................................................................... 868
16.12 Example for Configuring VBST.................................................................................................................................. 868

17 SEP Configuration............................................................................................................. 878


17.1 Overview of SEP............................................................................................................................................................... 878
17.2 Understanding SEP.......................................................................................................................................................... 879
17.2.1 SEP Implementation.................................................................................................................................................... 879
17.2.2 Basic Concepts of SEP................................................................................................................................................. 882
17.2.3 SEP Implementation Mechanisms.......................................................................................................................... 886
17.3 Application Scenarios for SEP...................................................................................................................................... 900
17.3.1 Open Ring Networking............................................................................................................................................... 900
17.3.2 Closed Ring Networking.............................................................................................................................................901
17.3.3 Multi-Ring Networking............................................................................................................................................... 902
17.3.4 Hybrid SEP+MSTP Ring Networking...................................................................................................................... 903
17.3.5 Hybrid SEP+RRPP Ring Networking....................................................................................................................... 904
17.3.6 SEP Multi-Instance....................................................................................................................................................... 905
17.3.7 Association Between SEP and CFM........................................................................................................................ 906
17.4 Summary of SEP Configuration Tasks.......................................................................................................................907
17.5 Licensing Requirements and Limitations for SEP..................................................................................................909
17.6 Configuring SEP................................................................................................................................................................ 912
17.6.1 Configuring a SEP Segment...................................................................................................................................... 912
17.6.2 Configuring a Control VLAN..................................................................................................................................... 913
17.6.3 Configuring a Protected Instance............................................................................................................................914
17.6.4 Adding a Layer 2 Interface to a SEP Segment and Configuring a Role for the Interface................... 915
17.6.5 Verifying the Basic SEP Configuration................................................................................................................... 918
17.7 Specifying an Interface to Block................................................................................................................................. 918
17.7.1 Setting an Interface Blocking Mode.......................................................................................................................918
17.7.2 Configuring the Preemption Mode.........................................................................................................................920
17.7.3 Verifying the Configuration of Specifying an Interface to Block................................................................. 921
17.8 Configuring SEP Multi-Instance.................................................................................................................................. 921
17.9 Configuring the Topology Change Notification Function.................................................................................. 923
17.9.1 Reporting Topology Changes in a Lower-Layer Network - SEP Topology Change Notification....... 924

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xx


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

17.9.2 Reporting Topology Changes in a Lower-Layer Network - Enabling the Devices in a SEP Segment
to Process SmartLink Flush Packets.................................................................................................................................... 925
17.9.3 Reporting Topology Changes in an Upper-Layer Network - Configuring Association Between SEP
and CFM........................................................................................................................................................................................ 926
17.9.4 Verifying the Configuration of the Topology Change Notification Function........................................... 927
17.10 Clearing SEP Statistics.................................................................................................................................................. 927
17.11 Configuration Examples for SEP............................................................................................................................... 927
17.11.1 Example for Configuring SEP on a Closed Ring Network............................................................................ 927
17.11.2 Example for Configuring SEP on a Multi-Ring Network.............................................................................. 934
17.11.3 Example for Configuring a Hybrid SEP+MSTP Ring Network.....................................................................946
17.11.4 Example for Configuring a Hybrid SEP+RRPP Ring Network......................................................................955
17.11.5 Example for Configuring SEP Multi-Instance................................................................................................... 967

18 RRPP Configuration.......................................................................................................... 976


18.1 Overview of RRPP............................................................................................................................................................ 976
18.2 Understanding RRPP....................................................................................................................................................... 979
18.2.1 Basic Concepts of RRPP.............................................................................................................................................. 979
18.2.2 RRPP Packets.................................................................................................................................................................. 983
18.2.3 Implementation of a Single RRPP Ring (When the Ring is Complete)......................................................986
18.2.4 Implementation of a Single RRPP Ring (When the Ring is Faulty)............................................................ 988
18.2.5 Implementation of a Single RRPP Ring (When the Fault is Rectified)...................................................... 990
18.2.6 Implementation of Multiple Rings..........................................................................................................................992
18.2.7 RRPP Multi-Instance.................................................................................................................................................. 1001
18.3 Application Scenarios for RRPP.................................................................................................................................1003
18.3.1 Application of a Single Ring................................................................................................................................... 1003
18.3.2 Application of Tangent RRPP Rings..................................................................................................................... 1004
18.3.3 Application of Intersecting RRPP Rings.............................................................................................................. 1005
18.3.4 Application of RRPP and STP................................................................................................................................. 1006
18.3.5 Application of Intersecting RRPP Rings of Multi-Instance on a MAN..................................................... 1006
18.3.6 Application of Tangent RRPP Rings of Multi-Instance on a MAN............................................................ 1008
18.3.7 Application of Multiple Instances Single-homed to an RRPP Aggregation Ring................................. 1009
18.3.8 Application of the RRPP Multi-instance Ring and Smart Link Network................................................. 1010
18.3.9 Application of RRPP Snooping............................................................................................................................... 1011
18.4 Summary of RRPP Configuration Tasks................................................................................................................. 1014
18.5 Licensing Requirements and Limitations for RRPP............................................................................................ 1015
18.6 Default Settings for RRPP........................................................................................................................................... 1018
18.7 Configuring RRPP...........................................................................................................................................................1018
18.7.1 Configuring Interfaces on an RRPP Ring............................................................................................................1019
18.7.2 Creating an RRPP Domain and the Control VLAN..........................................................................................1019
18.7.3 Creating an Instance................................................................................................................................................. 1021
18.7.4 Configuring a Protected VLAN.............................................................................................................................. 1021
18.7.5 Creating and Enabling an RRPP Ring.................................................................................................................. 1022
18.7.6 Enabling RRPP............................................................................................................................................................. 1023
18.7.7 (Optional) Creating a Ring Group........................................................................................................................1024

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxi


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

18.7.8 (Optional) Setting the Values of the Hello Timer and Fail Timer in an RRPP Domain.................... 1024
18.7.9 (Optional) Setting the Value of the Link-Up Timer....................................................................................... 1025
18.7.10 Verifying the RRPP Configuration...................................................................................................................... 1026
18.8 Configuring RRPP Snooping....................................................................................................................................... 1026
18.8.1 Enabling RRPP Snooping......................................................................................................................................... 1026
18.8.2 Configuring the VSI Associated with RRPP Snooping....................................................................................1027
18.8.3 Verifying the RRPP Snooping Configuration..................................................................................................... 1028
18.9 Clearing RRPP Statistics............................................................................................................................................... 1028
18.10 Configuration Examples for RRPP......................................................................................................................... 1029
18.10.1 Example for Configuring a Single RRPP Ring with a Single Instance....................................................1029
18.10.2 Example for Configuring Intersecting RRPP Rings with a Single Instance...........................................1033
18.10.3 Example for Configuring Tangent RRPP Rings.............................................................................................. 1044
18.10.4 Example for Configuring a Single RRPP Ring with Multiple Instances................................................. 1052
18.10.5 Example for Configuring Intersecting RRPP Rings with Multiple Instances........................................ 1061
18.10.6 Example for Configuring Tangent RRPP Rings with Multiple Instances............................................... 1078
18.11 Troubleshooting RRPP............................................................................................................................................... 1088
18.11.1 A Loop Occurs After the RRPP Configuration is Complete....................................................................... 1088
18.12 FAQ About RRPP.......................................................................................................................................................... 1089
18.12.1 Why Does a Broadcast Storm Occur When the Secondary Port of the Master Node Is Blocked?
....................................................................................................................................................................................................... 1089
18.12.2 Can Data Packets Be Blocked in the Control VLAN of RRPP?.................................................................. 1089

19 ERPS (G.8032) Configuration.......................................................................................1091


19.1 Overview of ERPS.......................................................................................................................................................... 1091
19.2 Understanding ERPS..................................................................................................................................................... 1093
19.2.1 Basic Concepts of ERPS............................................................................................................................................ 1093
19.2.2 RAPS PDUs....................................................................................................................................................................1100
19.2.3 ERPS Single-ring Implementation........................................................................................................................ 1102
19.2.4 ERPS Multi-ring Implementation.......................................................................................................................... 1106
19.2.5 ERPS Multi-instance.................................................................................................................................................. 1110
19.3 Application Scenarios for ERPS................................................................................................................................. 1111
19.4 Summary of ERPS Configuration Tasks..................................................................................................................1113
19.5 Licensing Requirements and Limitations for ERPS.............................................................................................1113
19.6 Default Settings for ERPS........................................................................................................................................... 1116
19.7 Configuring ERPSv1...................................................................................................................................................... 1116
19.7.1 Creating an ERPS Ring..............................................................................................................................................1116
19.7.2 Configuring the Control VLAN...............................................................................................................................1117
19.7.3 Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN1118
19.7.4 Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role................................................. 1119
19.7.5 (Optional) Configuring Timers in an ERPS Ring............................................................................................. 1121
19.7.6 (Optional) Configuring the MEL Value.............................................................................................................. 1122
19.7.7 (Optional) Configuring Association Between ERPS and Ethernet CFM.................................................. 1123
19.7.8 Verifying the ERPSv1 Configuration.................................................................................................................... 1123

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

19.8 Configuring ERPSv2...................................................................................................................................................... 1124


19.8.1 Creating an ERPS Ring..............................................................................................................................................1124
19.8.2 Configuring the Control VLAN...............................................................................................................................1125
19.8.3 Configuring an ERP Instance and Activating the Mapping Between the ERP Instance and VLAN1126
19.8.4 Adding a Layer 2 Port to an ERPS Ring and Configuring the Port Role................................................. 1127
19.8.5 Configuring the Topology Change Notification Function............................................................................ 1129
19.8.6 (Optional) Configuring ERPS Protection Switching........................................................................................1130
19.8.7 (Optional) Configuring Timers in an ERPS Ring............................................................................................. 1131
19.8.8 (Optional) Configuring Association Between ERPS and Ethernet CFM.................................................. 1131
19.8.9 Verifying the ERPSv2 Configuration.................................................................................................................... 1132
19.9 Configuring the ERPS over VPLS Function............................................................................................................ 1133
19.10 Clearing ERPS Statistics............................................................................................................................................. 1134
19.11 Configuration Examples for ERPS.......................................................................................................................... 1135
19.11.1 Example for Configuring ERPS Multi-instance.............................................................................................. 1135
19.11.2 Example for Configuring Intersecting ERPS Rings........................................................................................1144
19.11.3 Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs
(Through Ethernet Sub-interfaces)................................................................................................................................... 1152
19.11.4 Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs
(Through VLANIF Interfaces).............................................................................................................................................. 1162
19.12 Troubleshooting ERPS................................................................................................................................................ 1173
19.12.1 Traffic Forwarding Fails in an ERPS Ring.........................................................................................................1173

20 LBDT Configuration........................................................................................................ 1174


20.1 Overview of LBDT.......................................................................................................................................................... 1174
20.2 Understanding LDT and LBDT................................................................................................................................... 1175
20.3 Application Scenarios for LDT and LBDT............................................................................................................... 1178
20.4 Licensing Requirements and Limitations for LDT and LBDT.......................................................................... 1180
20.5 Default Settings for LDT and LBDT......................................................................................................................... 1183
20.6 Configuring Automatic LBDT..................................................................................................................................... 1184
20.6.1 Enabling Automatic LBDT....................................................................................................................................... 1184
20.6.2 (Optional) Setting the Interval for Sending LBDT Packets.......................................................................... 1185
20.6.3 (Optional) Setting the Recovery Time of an Interface................................................................................. 1185
20.6.4 Verifying the Automatic LBDT Configuration...................................................................................................1186
20.7 Configuring Manual LBDT.......................................................................................................................................... 1186
20.7.1 Enabling Manual LBDT.............................................................................................................................................1186
20.7.2 (Optional) Setting the Interval for Sending LBDT Packets.......................................................................... 1188
20.7.3 Configuring an Action Taken After a Loop Is Detected................................................................................ 1189
20.7.4 (Optional) Setting the Recovery Time of an Interface................................................................................. 1190
20.7.5 Verifying the Manual LBDT Configuration........................................................................................................ 1191
20.8 Configuration Examples for LBDT............................................................................................................................ 1191
20.8.1 Example for Configuring LBDT to Detect Loopbacks on an Interface..................................................... 1191
20.8.2 Example for Configuring LBDT to Detect Loops on the Downstream Network.................................. 1193
20.8.3 Example for Configuring LBDT to Detect Loops on the Local Network................................................. 1195

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxiii


S1720, S2700, S5700, and S6720 Series Ethernet
Switches
Configuration Guide - Ethernet Switching Contents

21 Layer 2 Protocol Transparent Transmission Configuration...................................1199


21.1 Overview of Layer 2 Protocol Transparent Transmission................................................................................. 1199
21.2 Understanding Layer 2 Protocol Transparent Transmission............................................................................1201
21.3 Application Scenarios for Layer 2 Protocol Transparent Transmission........................................................1206
21.4 Summary of Layer 2 Protocol Transparent Transmission Configuration Tasks........................................ 1207
21.5 Licensing Requirements and Limitations for Layer 2 Protocol Transparent Transmission................... 1208
21.6 Configuring Interface-based Layer 2 Protocol Transparent Transmission..................................................1212
21.6.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1212
21.6.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1213
21.6.3 Enabling Layer 2 Protocol Transparent Transmission on an Interface.....................................................1214
21.6.4 Verifying the Configuration of Interface-based Layer 2 Protocol Transparent Transmission.......... 1215
21.7 Configuring VLAN-based Layer 2 Protocol Transparent Transmission........................................................ 1215
21.7.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1215
21.7.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1216
21.7.3 Enabling VLAN-based Layer 2 Protocol Transparent Transmission on an Interface........................... 1218
21.7.4 Verifying the Layer 2 Protocol Transparent Transmission Configuration................................................1218
21.8 Configuring QinQ-based Layer 2 Protocol Transparent Transmission........................................................ 1219
21.8.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1219
21.8.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1220
21.8.3 Enabling QinQ-based Layer 2 Transparent Transmission on an Interface............................................. 1221
21.8.4 Verifying the Layer 2 Protocol Transparent Transmission Configuration................................................1222
21.9 Configuring VPLS-based Layer 2 Protocol Transparent Transmission......................................................... 1222
21.9.1 (Optional) Defining Characteristic Information About a Layer 2 Protocol............................................1222
21.9.2 Configuring Layer 2 Protocol Transparent Transmission Mode..................................................................1223
21.9.3 Enabling VPLS-based Layer 2 Protocol Transparent Transmission on an Interface............................ 1224
21.9.4 Verifying the Layer 2 Protocol Transparent Transmission Configuration................................................1226
21.10 Configuration Examples for Layer 2 Protocol Transparent Transmission................................................ 1226
21.10.1 Example for Configuring Interface-based Layer 2 Protocol Transparent Transmission...................1226
21.10.2 Example for Configuring VLAN-based Layer 2 Protocol Transparent Transmission......................... 1229
21.10.3 Example for Configuring QinQ-based Layer 2 Protocol Transparent Transmission..........................1234
21.10.4 Example for Configuring VPLS-based Layer 2 Protocol Transparent Transmission.......................... 1240
21.11 FAQ About Layer 2 Protocol Transparent Transmission.................................................................................1248
21.11.1 How Can I Configure BPDU Tunnel to Transparently Transmit BPDUs?.............................................. 1248
21.11.2 Can the Interfaces Not Enabled with the BPDU Function Send BPDUs?............................................. 1249
21.11.3 How to View and Change MAC Addresses of BPDUs?............................................................................... 1249
21.11.4 How Does a Switch Process BPDUs?.................................................................................................................1249

Issue 13 (2021-10-20) Copyright © Huawei Technologies Co., Ltd. xxiv

You might also like