Root Bridge Configuration
169
Prerequisites
Before configuration, determine what roles the switches will play in the spanning
trees, that is, whether a switch will be the root, a branch, or a leaf in a spanning tree.
Configuring an
MST Region
Configuration procedure
Changes of MST region parameters, especially those of the VLAN mapping tables, can
cause MSTP to recalculate the spanning trees, creating network topology jitters across
the network. To reduce network topology jitters caused by configuration changes,
MSTP does not recalculate the spanning trees immediately in response to region
configuration changes. In fact, region configurations take effect only when you
perform any of the following operations:
■
Activate the new MST region settings by using the
active region-configuration
command.
■
Enable MSTP by using the
stp enable
command.
Switches belong to the same MST region only when they have the same MST region
name, the same VLAN mapping table, and the same MST region revision level.
Table 142
Configure an MST region
Operation
Command
Description
Enter system view
system-view
—
Enter MST region view
stp region-configuration
—
Configure a name for the
MST region
region-name
name
Required
By default, the name of an MST
region is the MAC address of the
switch.
Configure the VALN
mapping table
instance
instance-id
vlan
vlan-list
Required
Both commands can be used to
configure a VLAN mapping table.
By default, all VLANs in an MST
region are mapped to MSTI 0.
vlan-mapping modulo
modulo
—
Configure the MSTP revision
level of the MST region
revision-level
level
Required
The default revision level of an
MST region is level 0.
Activate the configuration of
the MST region manually
active region-configuration
Required
Display the configuration of
the MST region
check region-configuration
Optional
Display the effective
configuration of the MST
region
display stp
region-configuration
You can execute this command in
any view.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...