Chapter 16
| Spanning Tree Commands
– 368 –
spanning-tree
This command enables the Spanning Tree Algorithm globally for the switch. Use
the
no
form to disable it.
Syntax
[
no
]
spanning-tree
Default Setting
Spanning tree is enabled.
Command Mode
Global Configuration
Command Usage
The Spanning Tree Algorithm (STA) can be used to detect and disable network
loops, and to provide backup links between switches, bridges or routers. This
allows the switch to interact with other bridging devices (that is, an STA-compliant
switch, bridge or router) in your network to ensure that only one route exists
between any two stations on the network, and provide backup links which
automatically take over when a primary link goes down.
spanning-tree
loopback-detection
release-mode
Configures loopback release mode for a port
IC
spanning-tree
loopback-detection trap
Enables BPDU loopback SNMP trap notification for a port
IC
spanning-tree mst cost
Configures the path cost of an interface in the MST instance IC
spanning-tree
mst port-priority
Configures the priority of an interface in the MST instance
IC
spanning-tree port-priority
Configures the spanning tree priority of an interface
IC
spanning-tree root-guard
Prevents a designated port from passing superior BPDUs
IC
spanning-tree
spanning-disabled
Disables spanning tree for an interface
IC
spanning-tree
loopback-detection release
Manually releases a port placed in discarding state by
loopback-detection
PE
spanning-tree
protocol-migration
Re-checks the appropriate BPDU format
PE
show spanning-tree
Shows spanning tree configuration for the common
spanning tree (i.e., overall bridge), a selected interface, or
an instance within the multiple spanning tree
PE
show spanning-tree mst
configuration
Shows the multiple spanning tree configuration
PE
Table 79: Spanning Tree Commands (Continued)
Command
Function
Mode
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...