316
Configuring STP
Information About Configuring STP
Spanning tree forces redundant data paths into a standby (blocked) state. If a network segment in the spanning tree fails
and a redundant path exists, the spanning-tree algorithm recalculates the spanning-tree topology and activates the
standby path. Switches send and receive spanning-tree frames, called bridge protocol data units (BPDUs), at regular
intervals. The switches do not forward these frames but use them to construct a loop-free path. BPDUs contain
information about the sending switch and its ports, including switch and MAC addresses, switch priority, port priority,
and path cost. Spanning tree uses this information to elect the root switch and root port for the switched network and
the root port and designated port for each switched segment.
When two ports on a switch are part of a loop, the spanning-tree port priority and path cost settings control which port
is put in the forwarding state and which is put in the blocking state. The spanning-tree port priority value represents the
location of a port in the network topology and how well it is located to pass traffic. The path cost value represents the
media speed.
Note:
The default is for the switch to send keepalive messages (to ensure the connection is up) only on interfaces that
do not have small form-factor pluggable (SFP) modules. You can use the [
no
]
keepalive
interface configuration
command to change the default for an interface.
Spanning-Tree Topology and BPDUs
The stable, active spanning-tree topology of a switched network is controlled by these elements:
The unique bridge ID (switch priority and MAC address) associated with each VLAN on each switch.
The spanning-tree path cost to the root switch.
The port identifier (port priority and MAC address) associated with each Layer 2 interface.
When the switches in a network are powered up, each functions as the root switch. Each switch sends a configuration
BPDU through all of its ports. The BPDUs communicate and compute the spanning-tree topology. Each configuration
BPDU contains this information:
The unique bridge ID of the switch that the sending switch identifies as the root switch
The spanning-tree path cost to the root
The bridge ID of the sending switch
Message age
The identifier of the sending interface
Values for the hello, forward delay, and max-age protocol timers
When a switch receives a configuration BPDU that contains
superior
information (lower bridge ID, lower path cost, and
so forth), it stores the information for that port. If this BPDU is received on the root port of the switch, the switch also
forwards it with an updated message to all attached LANs for which it is the designated switch.
If a switch receives a configuration BPDU that contains
inferior
information to that currently stored for that port, it discards
the BPDU. If the switch is a designated switch for the LAN from which the inferior BPDU was received, it sends that LAN
a BPDU containing the up-to-date information stored for that port. In this way, inferior information is discarded, and
superior information is propagated on the network.
A BPDU exchange results in these actions:
One switch in the network is elected as the root switch (the logical center of the spanning-tree topology in a
switched network).
For each VLAN, the switch with the highest switch priority (the lowest numerical priority value) is elected as the root
switch. If all switches are configured with the default priority (32768), the switch with the lowest MAC address in the
VLAN becomes the root switch. The switch priority value occupies the most significant bits of the bridge ID, as shown
in
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...