EasyManuals Logo
Home>Enterasys>Switch>SecureStack C2

Enterasys SecureStack C2 User Manual

Enterasys SecureStack C2
607 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #227 background imageLoading...
Page #227 background image
SecureStack C2 Configuration Guide 7-1
7
Spanning Tree Configuration
ThischapterdescribestheSpanningTreeConfigurationsetofcommandsandhowtousethem.
Spanning Tree Configuration Summary
Overview: Single, Rapid, and Multiple Spanning Tree Protocols
TheIEEE802.1DSpanningTreeProtocol(STP)resolvesthe problemsofphysicalloopsina
networkbyestablishingoneprimarypathbetweenanytwodevicesinanetwork.Anyduplicate
pathsarebarredfromuseandbecomestandbyorblockedpathsuntiltheoriginalpathfails,at
whichpointtheycan
bebroughtintoservice.
RSTP
TheIEEE802.1wRapidSpanningProtocol(RSTP),anevolutionof802.1D,canachievemuch
fasterconvergencethanlegacySTPinaproperlyconfigurednetwork.RSTPsignificantlyreduces
thetimetoreconfigurethenetwork’sactivetopologywhenphysicaltopologyorconfiguration
parameterchangesoccur.Itselectsoneswitchastherootof
aSpanningTreeconnectedactive
topologyandassignsportrolestoindividualportsontheswitch,dependingonwhetherthatport
ispartoftheactivetopology.
RSTPprovidesrapidconnectivityfollowingthefailureofaswitch,switchport,oraLAN.Anew
rootportandthedesignatedport
ontheothersideofthebridgetransitiontoforwardingthrough
anexplicithandshakebetweenthem.Bydefault,userportsareconfiguredtorapidlytransitionto
forwardinginRSTP.
MSTP
TheIEEE802.1sMultipleSpanningTreeProtocol(MSTP)buildsupon802.1DandRSTPby
optimizingutilizationofredundantlinksbetweenswitchesinanetwork.Whenredundantlinks
existbetweenapairofswitchesrunningsingleSTP,onelinkisforwardingwhiletheothersare
For information about... Refer to page...
Spanning Tree Configuration Summary 7-1
Configuring Spanning Tree Bridge Parameters 7-3
Configuring Spanning Tree Port Parameters 7-31
Configuring Spanning Tree Loop Protect Parameters 7-39
Caution: Spanning Tree configuration should be performed only by personnel who are very
knowledgeable about Spanning Trees and the configuration of the Spanning Tree Algorithm.
Otherwise, the proper operation of the network could be at risk.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Enterasys SecureStack C2 and is the answer not in the manual?

Enterasys SecureStack C2 Specifications

General IconGeneral
BrandEnterasys
ModelSecureStack C2
CategorySwitch
LanguageEnglish

Related product manuals