Chapter 16
| Spanning Tree Commands
– 373 –
spanning-tree
pathcost method
This command configures the path cost method used for Rapid Spanning Tree and
Multiple Spanning Tree. Use the
no
form to restore the default.
Syntax
spanning-tree pathcost method
{
long
|
short
}
no spanning-tree pathcost method
long
- Specifies 32-bit based values that range from 1-200,000,000.
This method is based on the IEEE 802.1w Rapid Spanning Tree Protocol.
short
- Specifies 16-bit based values that range from 1-65535.
This method is based on the IEEE 802.1 Spanning Tree Protocol.
Default Setting
Long method
Command Mode
Global Configuration
Command Usage
◆
The path cost method is used to determine the best path between devices.
Therefore, lower values should be assigned to ports attached to faster media,
and higher values assigned to ports with slower media. Note that path cost
(
page 380
) takes precedence over port priority (
page 387
).
◆
The path cost methods apply to all spanning tree modes (STP, RSTP and MSTP).
Specifically, the long method can be applied to STP since this mode is
supported by a backward compatible mode of RSTP.
Example
Console(config)#spanning-tree pathcost method long
Console(config)#
spanning-tree priority
This command configures the spanning tree priority globally for this switch. Use
the
no
form to restore the default.
Syntax
spanning-tree
priority
priority
no spanning-tree
priority
priority
- Priority of the bridge. (Range – 0-61440, in steps of 4096;
Options: 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864,
40960, 45056, 49152, 53248, 57344, 61440)
Default Setting
32768
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...