
SecureStack C3 Configuration Guide
9-1
9
Spanning Tree Configuration
This
chapter
describes
the
Spanning
Tree
Configuration
set
of
commands
and
how
to
use
them.
Spanning Tree Configuration Summary
Overview: Single, Rapid, and Multiple Spanning Tree Protocols
The
IEEE
802.1D
Spanning
Tree
Protocol
(STP)
resolves
the
problems
of
physical
loops
in
a
network
by
establishing
one
primary
path
between
any
two
devices
in
a
network.
Any
duplicate
paths
are
barred
from
use
and
become
standby
or
blocked
paths
until
the
original
path
fails,
at
which
point
they
can
be
brought
into
service.
RSTP
The
IEEE
802.1w
Rapid
Spanning
Protocol
(RSTP),
an
evolution
of
802.1D,
can
achieve
much
faster
convergence
than
legacy
STP
in
a
properly
configured
network.
RSTP
significantly
reduces
the
time
to
reconfigure
the
network’s
active
topology
when
physical
topology
or
configuration
parameter
changes
occur.
It
selects
one
switch
as
the
root
of
a
Spanning
Tree
‐
connected
active
topology
and
assigns
port
roles
to
individual
ports
on
the
switch,
depending
on
whether
that
port
is
part
of
the
active
topology.
RSTP
provides
rapid
connectivity
following
the
failure
of
a
switch,
switch
port,
or
a
LAN.
A
new
root
port
and
the
designated
port
on
the
other
side
of
the
bridge
transition
to
forwarding
through
an
explicit
handshake
between
them.
By
default,
user
ports
are
configured
to
rapidly
transition
to
forwarding
in
RSTP.
For information about...
Refer to page...
Spanning Tree Configuration Summary
9-1
Configuring Spanning Tree Bridge Parameters
9-3
Configuring Spanning Tree Port Parameters
9-34
Configuring Spanning Tree Loop Protect Parameters
9-42
Caution:
Spanning Tree configuration should be performed only by personnel who are very
knowledgeable about Spanning Trees and the configuration of the Spanning Tree Algorithm.
Otherwise, the proper operation of the network could be at risk.
Note:
An Enterasys Networks Feature Guide document containing an in-depth discussion of
Spanning Tree configuration is located on the Enterasys Networks web site:
http://www.enterasys.com/support/manuals/
Summary of Contents for SECURESTACK C3
Page 2: ......
Page 34: ...xxxii...
Page 40: ...Getting Help xxxviii About This Guide...
Page 126: ...clear license 4 6 Activating Licensed Features...
Page 132: ...set port inlinepower 5 6 Configuring System Power and PoE...
Page 228: ...clear port protected name 7 60 Port Configuration...
Page 270: ...clear snmp interface 8 42 SNMP Configuration...
Page 396: ...clear port txq 12 10 Port Priority Configuration...
Page 414: ...ip igmp robustness 13 18 IGMP Configuration...
Page 542: ...clear arpinspection statistics 17 32 DHCP Snooping and Dynamic ARP Inspection...
Page 546: ...Enabling Router Configuration Modes 18 4 Preparing for Router Mode...
Page 640: ...traceroute ipv6 21 10 IPv6 Management...
Page 698: ...show ipv6 dhcp binding 24 20 DHCPv6 Configuration...
Page 746: ...show ipv6 ospf virtual link 25 48 OSPFv3 Configuration...
Page 834: ...ip access group 26 88 Authentication and Authorization Configuration...
Page 848: ...TACACS Configuration clear tacacs interface 27 14...
Page 866: ...sFlow Configuration show sflow agent 28 18...
Page 872: ...Index 4...