Spanning-Tree Instance (MSTI) controls topology within regions. MSTP uses RSTP as
a converging algorithm and is fully interoperable with earlier versions of STP.
•
VSTP maintains a separate spanning-tree instance for each VLAN. Different VLANs
can use different spanning-tree paths. When different VLANs use different
spanning-tree paths, the CPU processing resources being consumed increase as more
VLANs are configured. VSTP BPDU packets are tagged with the corresponding VLAN
identifier and are transmitted to the multicast destination media access control (MAC)
address 01-00-0c-cc-cc-cd with a protocol type of 0x010b. VSTP BPDUs are tunneled
by pure IEEE 802.1q bridges.
ACX Series routers can support up to 128 STP instances, which includes all instances of
VSTP, MSTP, RSTP and STP.
•
Maximum number of VSTP instances supported is 128.
•
Maximum number of MSTP instances supported is 64.
•
Maximum number of RSTP instances supported is 1.
•
Maximum number of STP instances supported is 1.
The ACX Series routers supports enabling Spanning-Tree Protocol (STP), Rapid
Spanning-Tree Protocol (RSTP), Multiple Spanning-Tree Protocol (MSTP), and VLAN
Spanning-Tree Protocol (VSTP) on aggregated Ethernet interface .
For more information about the various versions of spanning-tree protocols, see the
appropriate IEEE specification.
Related
Documentation
Layer 2 Protocol Tunneling on ACX Series Overview on page 437•
• Configuring Rapid Spanning-Tree Protocol on page 411
• Configuring Multiple Spanning-Tree Protocol on page 413
• Configuring VLAN Spanning-Tree Protocol on page 417
• Bridge Priority for Election of Root Bridge and Designated Bridge on page 406
• Spanning-Tree Instance Interface on page 407
• Spanning-Tree Instance Interface Priority on page 408
• Spanning-Tree Instance Interface Cost on page 408
• Spanning-Tree Instance Interface Point-to-Point Link Mode on page 409
• Configuring a Spanning-Tree Instance Interface as an Edge Port for Faster Convergence
on page 409
• Spanning-Tree Protocol Trace Options on page 410
405Copyright © 2017, Juniper Networks, Inc.
Chapter 12: Configuring Layer 2 Control Protocol