iiConfiguration Prerequisites ···········································································································1-33Configuration Procedure················································································································1-33Configuration Example ··················································································································1-34Configuring the VLAN Ignore Feature···································································································1-34Configuration Procedure················································································································1-34Configuration Example ··················································································································1-35Configuring Digest Snooping ················································································································1-35Configuration Prerequisites ···········································································································1-36Configuration Procedure················································································································1-36Configuration Example ··················································································································1-36Configuring No Agreement Check ········································································································1-37Configuration Prerequisites ···········································································································1-38Configuration Procedure················································································································1-38Configuration Example ··················································································································1-39Configuring Protection Functions··········································································································1-39Configuration prerequisites ···········································································································1-40Enabling BPDU Guard···················································································································1-40Enabling Root Guard ·····················································································································1-41Enabling Loop Guard·····················································································································1-42Enabling TC-BPDU Attack Guard ·································································································1-42Displaying and Maintaining MSTP ········································································································1-43MSTP Configuration Example···············································································································1-44