Chapter 22: Spanning Tree and Rapid Spanning Tree Protocols
438
Section V: Spanning Tree Protocols
The possible states for a port connected to a device running STP are
Listening, Learning, Forwarding, and Blocking.
The possible states for a port not being used or where spanning tree is
not activated is Disabled.
Role
The RSTP role of the port. Possible roles are:
Root - The port that is connected to the root switch, directly or through
other switches, with the least path cost.
Alternate - The port offers an alternate path in the direction of the root
switch.
Backup - The port on a designated switch that provides a backup for
the path provided by the designated port.
Designated - The port on the designated switch for a LAN that has the
least cost path to the root switch. This port connects the LAN to the
root switch.
P2P
Whether or not the port is functioning as a point-to-point port. The
possible settings are Yes and No.
Version
Whether the port is operating in RSTP mode or STP-compatible mode.
Port Cost
The port cost of the port.
Resetting RSTP
to the Default
Settings
To reset RSTP to the default settings, perform the following procedure:
1. From the Main Menu, type
3
to select Spanning Tree Configuration.
The Spanning Tree Configuration menu is shown in Figure 152 on
page 420.
2. From the Spanning Tree Configuration menu, type
3
to select
Configure Active Protocol.
The RSTP menu is shown in Figure 157 on page 431.
3. From the RSTP Menu, type
D
to select Reset RSTP to Defaults.
The following prompt is displayed:
Do you want to reset RSTP configuration to default [Yes/
No] ->
4. Type
Y
for Yes or
N
for No and press Return.
The RSTP configuration is reset to the defaults.
Summary of Contents for AT-9400
Page 16: ...Figures 16 ...
Page 18: ...Tables 18 ...
Page 28: ...Preface 28 ...
Page 30: ...30 Section I Basic Operations ...
Page 60: ...Chapter 1 Basic Switch Parameters 60 Section I Basic Operations ...
Page 64: ...Chapter 2 Port Parameters 64 Section I Basic Operations Port Type The port type ...
Page 84: ...Chapter 2 Port Parameters 84 Section I Basic Operations ...
Page 124: ...Chapter 6 Static Port Trunks 124 Section I Basic Operations ...
Page 144: ...144 Section II Advanced Operations ...
Page 196: ...Chapter 10 File Downloads and Uploads 196 Section II Advanced Operations ...
Page 218: ...Chapter 11 Event Logs and the Syslog Client 218 Section II Advanced Operations ...
Page 242: ...Chapter 13 Access Control Lists 242 Section II Advanced Operations ...
Page 294: ...294 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 314: ...Chapter 19 MLD Snooping 314 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 318: ...318 Section IV SNMPv3 ...
Page 416: ...Chapter 21 SNMPv3 416 Section IV SNMPv3 ...
Page 418: ...418 Section V Spanning Tree Protocols ...
Page 470: ...470 Section VI Virtual LANs ...
Page 520: ...Chapter 26 Multiple VLAN Modes 520 Section VI Virtual LANs ...
Page 532: ...Chapter 27 Protected Ports VLANs 532 Section VI Virtual LANs ...
Page 546: ...546 Section VII Internet Protocol Routing ...
Page 560: ...560 Section VIII Port Security ...
Page 568: ...Chapter 30 MAC Address based Port Security 568 Section VIII Port Security ...
Page 586: ...Chapter 31 802 1x Port based Network Access Control 586 Section VIII Port Security ...
Page 588: ...588 Section IX Management Security ...
Page 610: ...Chapter 33 Encryption Keys 610 Section IX Management Security ...
Page 650: ...Chapter 36 TACACS and RADIUS Protocols 650 Section IX Management Security ...
Page 660: ...Chapter 37 Management Access Control List 660 Section IX Management Security ...
Page 668: ...Index 668 ...