< Home

Summary of VBST Configuration Tasks

Table 1 describes the VBST configuration tasks. VBST blocks redundant links and prunes a network into a tree topology to eliminate loops and implement load balancing. You can perform the following configurations to meet requirements in special scenarios:
  • Setting VBST parameters that affect VBST convergence
  • Configuring protection functions
  • Setting parameters for interworking between a Huawei datacom device and a non-Huawei device
Table 1 VBST configuration task summary
Scenario Description Task

(Mandatory) Configure basic VBST functions

After you configure the operation mode of VBST and start VBST, VBST calculates the spanning tree and prunes a network into a tree network to eliminate loops. You can perform the following configurations to manually adjust the spanning tree calculation result:
  • Manually configure the root bridge and secondary root bridge.
  • Configure the switch priority. A smaller priority value indicates a higher priority of the switch and higher probability of becoming the root bridge.
  • Configure the port path cost. A smaller path cost indicates a smaller cost from the port to the root bridge and higher probability of becoming the root port.
  • Configure the port priority. A smaller priority value indicates higher probability of becoming the designated port.

Configuring VBST

(Optional) Set VBST parameters that affect VBST convergence

The network diameter, timeout interval, Hello time, Max Age, and Forward Delay affect VBST convergence. Proper settings of these parameters can speed up VBST convergence speed.

Setting VBST Parameters That Affect VBST Convergence

(Optional) Configure protection functions

Huawei datacom devices provide the following protection functions:
  • BPDU protection: prevents malicious attacks from bogus BPDUs.
  • TC protection: reduces the impact of malicious attacks from bogus TCN BPDUs.
  • Root protection: protects the role of the root bridge by retaining the role of the designated port and prevents network congestion caused by malicious attacks.
  • Loop protection: prevents loops caused by link congestion.

Configuring Protection Functions of VBST

(Optional) Set parameters for interworking between a Huawei datacom device and a non-Huawei device

To implement interworking between a Huawei datacom device and a non-Huawei device, configure the fast transition mode according to the Proposal/Agreement mechanism of the non-Huawei device.

Setting Parameters for Interworking Between a Huawei Datacom Device and a Non-Huawei Device

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >