EasyManua.ls Logo

LevelOne GEP-1070 - 4.8. Spanning Tree

LevelOne GEP-1070
319 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
120
restart).
Port Configurations:
Port The switch port number of the port..
Enable Controls whether loop protection is enabled on this switch port.
Action Configures the action performed when a loop is detected on a port. Valid values
are Shutdown Port, Shutdown Port and Log or Log Only.
Tx Mode Controls whether the port is actively generating loop protection PDU's, or
whether it is just passively looking for looped PDU's.
WEB INTERFACE
To configure authentication for management access in the web interface:
1. Click Configuration, Loop Protection.
2. Configure the general settins and port configurations.
3. Click Save.
4.8. Spanning Tree
The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to
provide backup links between switches, bridges or routers. This allows the switch to interact
with other bridging devices (that is, an STA-compliant switch, bridge or router) in your
network to ensure that only one route exists between any two stations on the network, and
provide backup links which automatically take over when a primary link goes down.
The spanning tree algorithms supported by this switch include these versions:
STP Spanning Tree Protocol (IEEE 802.1D)
RSTP Rapid Spanning Tree Protocol (IEEE 802.1w)
MSTP Multiple Spanning Tree Protocol (IEEE 802.1s)
STP - STP uses a distributed algorithm to select a bridging device (STPcompliant switch,
bridge or router) that serves as the root of the spanning tree network. It selects a root port on
each bridging device (except for the root device) which incurs the lowest path cost when
forwarding a packet from that device to the root device. Then it selects a designated bridging
device from each LAN which incurs the lowest path cost when forwarding a packet from that
LAN to the root device. All ports connected to designated bridging devices are assigned as
designated ports. After determining the lowest cost spanning tree, it enables all root ports

Table of Contents