339
Configuring MSTP
Information About Configuring MSTP
If all the legacy switches on the link are RSTP switches, they can process MSTP BPDUs as if they are RSTP BPDUs.
Therefore, MSTP switches send either a Version 0 configuration and TCN BPDUs or Version 3 MSTP BPDUs on a
boundary port. A boundary port connects to a LAN, the designated switch of which is either a single spanning-tree switch
or a switch with a different MST configuration.
RSTP
The RSTP takes advantage of point-to-point wiring and provides rapid convergence of the spanning tree.
Reconfiguration of the spanning tree can occur in less than 1 second (in contrast to 50 seconds with the default settings
in the IEEE 802.1D spanning tree).
Port Roles and the Active Topology
The RSTP provides rapid convergence of the spanning tree by assigning port roles and by learning the active topology.
The RSTP builds upon the IEEE 802.1D STP to select the switch with the highest switch priority (lowest numerical priority
value) as the root switch as described in the
Configuring STP, page 1
. Then the RSTP assigns one of these port roles to
individual ports:
Root port—Provides the best path (lowest cost) when the switch forwards packets to the root switch.
Designated port—Connects to the designated switch, which incurs the lowest path cost when forwarding packets
from that LAN to the root switch. The port through which the designated switch is attached to the LAN is called the
designated port.
Alternate port—Offers an alternate path toward the root switch to that provided by the current root port.
Backup port—Acts as a backup for the path provided by a designated port toward the leaves of the spanning tree. A
backup port can exist only when two ports are connected in a loopback by a point-to-point link or when a switch
has two or more connections to a shared LAN segment.
Disabled port—Has no role within the operation of the spanning tree.
A port with the root or a designated port role is included in the active topology. A port with the alternate or backup port
role is excluded from the active topology.
In a stable topology with consistent port roles throughout the network, the RSTP ensures that every root port and
designated port immediately transition to the forwarding state while all alternate and backup ports are always in the
discarding state (equivalent to blocking in IEEE 802.1D). The port state controls the operation of the forwarding and
learning processes.
provides a comparison of IEEE 802.1D and RSTP port states.
To be consistent with Cisco STP implementations, this guide defines the port state as
blocking
instead of
discarding
.
Designated ports start in the listening state.
Table 42
EEE 802.1D and RSTP Port States
Operational Status
STP Port State
(IEEE 802.1D)
RSTP Port State
Is Port Included in the
Active Topology?
Enabled
Blocking
Discarding
No
Enabled
Listening
Discarding
No
Enabled
Learning
Learning
Yes
Enabled
Forwarding
Forwarding
Yes
Disabled
Disabled
Discarding
No
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...