EasyManua.ls Logo

Enterasys SecureStack B3

Enterasys SecureStack B3
582 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SecureStack B3 Configuration Guide 7-1
7
Spanning Tree Configuration
ThischapterdescribestheSpanningTreeConfigurationsetofcommandsandhowtousethem.
Spanning Tree Configuration Summary
Overview: Single, Rapid, and Multiple Spanning Tree Protocols
TheIEEE802.1DSpanningTreeProtocol(STP)resolvesthe problemsofphysicalloopsina
networkbyestablishingoneprimarypathbetweenanytwodevicesinanetwork.Anyduplicate
pathsarebarredfromuseandbecomestandbyorblockedpathsuntiltheoriginalpathfails,at
whichpointtheycan
bebroughtintoservice.
RSTP
TheIEEE802.1wRapidSpanningProtocol(RSTP),anevolutionof802.1D,canachievemuch
fasterconvergencethanlegacySTPinaproperlyconfigurednetwork.RSTPsignificantlyreduces
thetimetoreconfigurethenetwork’sactivetopologywhenphysicaltopologyorconfiguration
parameterchangesoccur.Itselectsoneswitchastherootof
aSpanningTreeconnectedactive
topologyandassignsportrolestoindividualportsontheswitch,dependingonwhetherthatport
ispartoftheactivetopology.
RSTPprovidesrapidconnectivityfollowingthefailureofaswitch,switchport,oraLAN.Anew
rootportandthedesignatedport
ontheothersideofthebridgetransitiontoforwardingthrough
anexplicithandshakebetweenthem.Bydefault,userportsareconfiguredtorapidlytransitionto
forwardinginRSTP.
MSTP
TheIEEE802.1sMultipleSpanningTreeProtocol(MSTP)buildsupon802.1DandRSTPby
optimizingutilizationofredundantlinksbetweenswitchesinanetwork.Whenredundantlinks
existbetweenapairofswitchesrunningsingleSTP,onelinkisforwardingwhiletheothersare
For information about... Refer to page...
Spanning Tree Configuration Summary 7-1
Configuring Spanning Tree Bridge Parameters 7-3
Configuring Spanning Tree Port Parameters 7-31
Configuring Spanning Tree Loop Protect Parameters 7-39
Caution: Spanning Tree configuration should be performed only by personnel who are very
knowledgeable about Spanning Trees and the configuration of the Spanning Tree Algorithm.
Otherwise, the proper operation of the network could be at risk.

Table of Contents

Related product manuals