Configuration restrictions and guidelines

When you configure TC Snooping, follow these restrictions and guidelines: