Configuration restrictions and guidelines
When you configure Digest Snooping, follow these restrictions and guidelines:
Before you enable Digest Snooping, make sure associated devices of different vendors are connected and run spanning tree protocols.
With Digest Snooping enabled, in-the-same-region verification does not require comparison of configuration digest. The VLAN-to-instance mappings must be the same on associated ports.
To make Digest Snooping take effect, you must enable Digest Snooping both globally and on associated ports. As a best practice, enable Digest Snooping on all associated ports first and then enable it globally. This will make the configuration take effect on all configured ports and reduce impact on the network.
To prevent loops, do not enable Digest Snooping on MST region edge ports.
As a best practice, enable Digest Snooping first and then the spanning tree feature. To avoid traffic interruption, do not configure Digest Snooping when the network is already working well.