EasyManua.ls Logo

HP 3100 Series User Manual

HP 3100 Series
225 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #107 background image
98
Link Layer Discovery Protocol (LLDP)
Per VLAN Spanning Tree (PVST)
Spanning Tree Protocol (STP)
Unidirectional Link Direction (UDLD)
VLAN Trunking Protocol (VTP)
BPDU tunneling implementation
The BPDU tunneling implementations for different protocols are all similar. This section uses the
Spanning Tree Protocol (STP) to describe how to implement BPDU tunneling.
This document uses the term STP in a broad sense. It includes STP, RSTP, and MSTP.
STP calculates the topology of a network by transmitting BPDUs among devices in the network. For
more information, see "Configuring spanning tree protocols."
To avoid loops in your network, you can enable STP on your devices. When the topology changes at
one side of the customer network, devices at that side of the customer network send BPDUs to
devices on the other side of the customer network to ensure consistent spanning tree calculation in
the entire customer network. However, because BPDUs are Layer 2 multicast frames, all
STP-enabled devices, both in the customer network and in the service provider network, can receive
and process these BPDUs. In this case, neither the service provider network nor the customer
network can correctly calculate its independent spanning tree.
BPDU tunneling allows each network to calculate an independent spanning tree with STP.
BPDU tunneling delivers the following benefits:
BPDUs can be transparently transmitted. BPDUs of one customer network can be broadcast in
a specific VLAN across the service provider network, allowing that customer’s geographically
dispersed networks to implement consistent spanning tree calculation across the service
provider network.
BPDUs of different customer networks can be confined within different VLANs for transmission
on the service provider network. This enables each customer network to perform independent
spanning tree calculation.
Figure 29 BPDU tunneling implementation
The upper section of Figure 29 represents the service provider network (ISP network). The lower
section, including User A network 1 and User A network 2, represents the customer networks.
Enabling BPDU tunneling on edge devices (PE 1 and PE 2) in the service provider network allows
BPDUs of User A network 1 and User A network 2 to be transparently transmitted through the service
provider network. This ensures consistent spanning tree calculation throughout User A network,
without affecting the spanning tree calculation of the service provider network.
Assume that a BPDU is sent from User A network 1 to User A network 2. The BPDU is sent by using
the following workflow:

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP 3100 Series and is the answer not in the manual?

HP 3100 Series Specifications

General IconGeneral
LayerLayer 2
Jumbo Frame SupportYes
Switching Capacity8.8 Gbps
MAC Address Table Size8000 entries
ManagementWeb interface, SNMP, CLI
Operating Temperature0 to 45°C (32 to 113°F)
Operating Humidity10% to 90% non-condensing
Dimensions44(H) x 440(W) x 173(D) mm

Summary

Configuring Ethernet Interfaces

Ethernet Interface Naming Conventions

Defines the naming format for HPE 3100 v2 EI Ethernet interfaces (A/B/C).

Configuring a Combo Interface

Explains how to configure logical interfaces comprising optical and electrical ports.

Configuring Basic Settings of an Ethernet Interface

Details how to set duplex modes (auto, full, half) and port speed for Ethernet interfaces.

Shutting Down an Ethernet Interface

Provides instructions on how to shut down an Ethernet interface or a group of interfaces.

Setting Speed Options for Auto Negotiation on an Ethernet Interface

Explains how to narrow down speed options for auto-negotiation on Ethernet interfaces.

Configuring Flow Control on an Ethernet Interface

Guides on enabling flow control to prevent packet drops and manage traffic congestion.

Configuring Loopback Testing on an Ethernet Interface

Details how to enable loopback testing to identify Ethernet interface problems.

Configuring Jumbo Frame Support

Explains how to enable support for processing frames larger than standard Ethernet frame size.

Configuring a Port Group

Describes how to assign multiple interfaces to a port group for bulk configuration.

Configuring Storm Suppression

Guides on setting thresholds for broadcast, multicast, or unicast traffic on interfaces.

Enabling Loopback Detection on an Ethernet Interface

Explains how to detect loops on an interface and configure protective actions.

Configuring the MAC Address Table

Overview

Introduces the MAC address table for forwarding frames via unicast to reduce flooding.

Types of MAC Address Table Entries

Describes the different types of entries: static, dynamic, and blackhole.

Configuring Static, Dynamic, and Blackhole MAC Address Table Entries

Provides steps to manually add MAC address entries for security and port binding.

Disabling MAC Address Learning

Explains how to disable MAC address learning to prevent table saturation.

MAC Address Table Configuration Example

Illustrates configuring static and blackhole MAC entries and setting aging timers.

Configuring Ethernet Link Aggregation

Overview

Explains Ethernet link aggregation benefits like increased bandwidth and link reliability.

Basic Concepts

Defines aggregation groups, member ports, aggregate interfaces, and states.

Aggregating Links in Static Mode

Details static link aggregation where LACP is disabled and manual maintenance is required.

Aggregating Links in Dynamic Mode

Explains dynamic link aggregation using LACP for automatic state maintenance.

Configuring an Aggregation Group

Guides on configuring static or dynamic aggregation groups and aggregate interfaces.

Configuring Load Sharing for Link Aggregation Groups

Describes how to configure load sharing criteria based on MAC or IP addresses.

Ethernet Link Aggregation Configuration Examples

Provides examples for static and dynamic link aggregation configurations.

Configuring Spanning Tree Protocols

STP

Introduces Spanning Tree Protocol (STP) for eliminating Layer 2 loops.

RSTP

Explains Rapid Spanning Tree Protocol (RSTP) for faster network convergence.

PVST

Details Per-VLAN Spanning Tree (PVST) for improving link bandwidth usage.

MSTP

Describes Multiple Spanning Tree Protocol (MSTP) overcoming STP/RSTP/PVST limitations.

Setting the Spanning Tree Mode

Guides on configuring the device to operate in STP, RSTP, MSTP, or PVST modes.

Configuring an MST Region

Explains how to configure MST region name, VLAN-to-instance mappings, and revision level.

Configuring the Root Bridge or a Secondary Root Bridge

Details how to specify the current device as the root or secondary root bridge.

Configuring the Device Priority

Explains how device priority affects spanning tree calculation and root bridge election.

Enabling BPDU Guard

Guides on enabling BPDU guard to protect against malicious BPDU attacks.

MSTP Configuration Example

Provides a practical example for configuring MSTP with VLAN-to-MSTI mapping.

Configuring VLANs

Overview

Introduces VLANs for segmenting LANs, reducing broadcasts, and improving security.

VLAN Fundamentals

Explains VLAN tag fields and the IEEE 802.1Q standard for VLAN identification.

VLAN Types

Covers VLAN implementation based on criteria like port, MAC address, or protocol.

Configuring Basic VLAN Settings

Guides on creating VLANs, naming them, and configuring descriptions.

Configuring Port-Based VLANs

Explains how to group VLAN members by port and configure port link types.

Configuring MAC-Based VLANs

Details assigning hosts to VLANs based on MAC addresses for secure network access.

Configuring Protocol-Based VLANs (available only on the HPE 3100 v2 EI)

Guides on assigning packets to VLANs based on protocol type and encapsulation format.

Displaying and Maintaining VLANs

Provides commands to display VLAN information, interfaces, and statistics.

Configuring a Voice VLAN (available only on the HPE 3100 v2 EI)

Overview

Explains voice VLAN configuration for prioritizing voice traffic and ensuring quality.

Methods of Identifying IP Phones

Describes identifying IP phones via OUI addresses or LLDP.

Configuring a Voice VLAN on a Port

Details voice VLAN assignment modes (automatic/manual) and port configurations.

Security Mode and Normal Mode of Voice VLANs

Compares security and normal modes for voice VLAN ports and their traffic handling.

Configuring a Port to Operate in Automatic Voice VLAN Assignment Mode

Guides on configuring automatic voice VLAN assignment for PCs and IP phones.

Configuring a Port to Operate in Manual Voice VLAN Assignment Mode

Explains manual voice VLAN assignment for ports handling only IP phone traffic.

Enabling LLDP to Automatically Discover IP Phones

Describes using LLDP to automatically discover IP phones and configure voice VLANs.

Voice VLAN Configuration Examples

Provides examples for automatic and manual voice VLAN configuration modes.

Configuring LLDP

Overview

Introduces LLDP for exchanging device information between directly connected devices.

Basic Concepts

Covers LLDP frame formats, LLDPDUs, TLVs, and working mechanisms.

LLDP Operating Modes

Details LLDP operational modes: TxRx, Tx, Rx, and Disable.

LLDP Configuration Task List

Lists tasks required for performing basic LLDP configuration and settings.

Performing Basic LLDP Configuration

Guides on enabling LLDP globally and on specific ports.

Configuring CDP Compatibility (available only on the HPE 3100 v2 EI)

Explains enabling CDP compatibility for Cisco IP phones to auto-configure voice VLANs.

Displaying and Maintaining LLDP

Provides commands to display global LLDP information and neighbor details.

LLDP Configuration Examples

Illustrates basic LLDP configuration for monitoring network links.

Configuring MVRP

Overview

Introduces Multiple Registration Protocol (MRP) and MVRP for VLAN configuration.

MRP Implementation

Explains how MRP participants register and deregister attribute values.

MRP Messages

Details MRP messages: Join, New, Leave, and LeaveAll for attribute exchange.

MVRP Registration Modes

Describes MVRP registration modes: Normal, Fixed, and Forbidden.

Enabling MVRP

Guides on enabling MVRP globally and on specific trunk ports.

Configuring the MVRP Registration Mode

Explains how to configure MVRP registration modes (fixed, forbidden, normal).

Displaying and Maintaining MVRP

Provides commands to display MVRP status, statistics, and VLAN information.

Configuration Example for MVRP in Normal Registration Mode

Illustrates MVRP configuration in normal registration mode between devices.

Related product manuals