Platform Help >> Topology >> Layer 2 Topology

Layer 2 Topology

The Layer 2 topology is drawn according to the bridge protocol and any of Link Layer Discovery Protocol (LLDP), Neighbor Discovery Protocol (NDP), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP). It displays the network structure and status information such as Layer 2 connections among devices on the subnet, link status, and device status.

The Layer 2 topology supports delayed deletion, which allows invalid Layer 2 links to be displayed as dotted lines in the topology for a specified time period, and finally deletes the invalid lines when the delay expires.

The Multiple Spanning Tree Protocol (MSTP) topology is drawn automatically according to the spanning tree information of the devices. It shows the topology of each spanning tree, including device status and link status.

Operation Procedure

  1. Click the Resource tab.
  2. Select View Management > IP Topology in the navigation tree.
  3. Double-click IP Topology in the topology navigation tree and then double-click a non-empty subnet in the IP topology page, or double-click a subnet in the topology navigation tree.

Functions

  1. Enable Delayed Delete: Click on the toolbar of the topology. In the dialog box opens, select the Enable Delayed Delete menu.
  2. View MSTP topology: Click on the toolbar of the topology, and select CIST or an instance in the area. Nodes or links not in the CIST or the instance are grayed out.
  3. View MST details: Click on the toolbar of the topology.
  4. Path Topology: Right-click on a blank area of the Layer 2 topology and then select Path Topology from the shortcut menu. In the dialog box that appears, type the source and destination IP addresses and click OK.
  5. Highlight MACsec Links: Right-click a blank area of the Layer 2 topology, and then select Highlight MACsec Links from the shortcut menu.
    a. Activated MACsec Links: Highlights established MACsec links and grays the other links out.
    b. Unactivated MACsec Links: Highlights each link between a MACsec-enabled interface and an interface that does not support MACsec or is not configured with MACsec (including failing the MACsec configuration), and grays the other links out.
    c. Unconfigured MACsec Links: Highlights links that support MACsec but are not in the active state, and grays the other links out.
    d. MACsec-Capable Links: Highlights links that support MACsec but are not configured with MACsec, and grays the other links out.
    e. Links Not Supporting MACsec: Highlight the links that do not support MACsec, and grey out the other links.

  6. Cancel MACsec Highlight: Right-click a blank area of the Layer 2 topology, and then select Cancel Highlighting MACsec Links from the shortcut menu.

  7. Establish MACsec Link: Right-click a link that is configured with MACsec but is not in the active state on the Layer 2 topology, and then select Establish MACsec Link from the shortcut menu to enable MACsec protection for the link.

  8. Remove MACsec Link: Right-click an established MACsec link on the Layer 2 topology, and then select Remove MACsec Link from the shortcut menu to disable MACsec protection for the link.

Precautions

Related Topics