RSTP Configuration
173
RSTP Configuration
The configuration of RSTP changes with the position of the Switch in the network,
as discussed below.
Figure 53
Configuring STP
In
Figure 53
the Switch 4500 is typically Switch E, F and G. Additionally it could be
Switch C and D. For completeness, configuration of all devices is presented here.
Table 169
RSTP Configuration
Switch A and Switch B: Root
bridge and backup root
bridge
Switch C and Switch D:
Intermediate Switches in the
Switched network
Switch E, Switch F and Switch
G: Switches directly
connected with user PCs
Device
Configuration Default Value
Note
Switch A &
Switch B
Enable the STP
feature on the
Switch
Enable the STP
feature on the
port
The STP feature is
disabled from the
Switch, but will be
enabled on all
ports once being
enabled on the
Switch.
The configuration of STP feature status on
the port will not take effect if the STP
feature is disabled from the Switch.
Configure RSTP
operational
mode
The Switch works
in RSTP mode.
If there are Switches respectively running
STP and RSTP on the network, it is
recommended to set the Switch in
STP-compatible mode.
Configure the
STP-Ignore
attribute of
VLANs on a
Switch
No VLAN on a
STP-enabled
Switch is
STP-Ignored.
Once a VLAN is specified to be
STP-Ignored, the packets of this VLAN will
be forwarded on any Switch port, with no
restriction from the calculated STP path.
Specify a Switch
as the root or
backup root
bridge
The role of the
current Switch as
the root or backup
root bridge
depends on the
STP calculation.
A Switch can be made the root bridge by
specifying its Bridge preference to 0.
S w itc h C
S w itc h A
S w itc h B
S w itc h D
S w itc h A
S w itc h E
S w itc h F
S w itc h G
S w itc h C
S w itc h A
S w itc h B
S w itc h D
S w itc h A
S w itc h E
S w itc h F
S w itc h G
Summary of Contents for Switch 4500 26-Port
Page 16: ...14 ABOUT THIS GUIDE...
Page 58: ...56 CHAPTER 2 PORT OPERATION...
Page 104: ...102 CHAPTER 5 NETWORK PROTOCOL OPERATION...
Page 130: ...128 CHAPTER 6 IP ROUTING PROTOCOL OPERATION...
Page 154: ...152 CHAPTER 7 ACL CONFIGURATION...
Page 228: ...226 CHAPTER 11 802 1X CONFIGURATION...
Page 250: ...248 CHAPTER 14 DEVICE MANAGEMENT...
Page 280: ...278 CHAPTER 15 SYSTEM MAINTENANCE AND DEBUGGING...
Page 312: ...310 CHAPTER 18 NTP CONFIGURATION...
Page 340: ...338 CHAPTER 19 SSH TERMINAL SERVICES...
Page 350: ...348 CHAPTER 20 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 388: ...386 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP...