iii
Configuration procedure ··························································································································· 62
Verifying the configuration ························································································································ 62
Configuring spanning tree protocols ····························································· 64
STP ·································································································································································· 64
STP protocol packets ······························································································································· 64
Basic concepts in STP ····························································································································· 64
Calculation process of the STP algorithm ································································································ 65
RSTP ······························································································································································· 71
PVST ································································································································································ 71
MSTP ······························································································································································· 71
MSTP features ········································································································································· 72
MSTP basic concepts ······························································································································ 72
How MSTP works ····································································································································· 75
MSTP implementation on devices ············································································································ 76
Protocols and standards ·································································································································· 76
Spanning tree configuration task lists ·············································································································· 76
STP configuration task list ························································································································ 77
RSTP configuration task list ····················································································································· 78
PVST configuration task list ····················································································································· 78
MSTP configuration task list ····················································································································· 79
Setting the spanning tree mode ······················································································································· 80
Configuring an MST region ······························································································································ 80
Configuring the root bridge or a secondary root bridge ··················································································· 81
Configuring the current device as the root bridge of a specific spanning tree ········································· 82
Configuring the current device as a secondary root bridge of a specific spanning tree ··························· 82
Configuring the device priority ························································································································· 82
Configuring the maximum hops of an MST region ··························································································· 83
Configuring the network diameter of a switched network ················································································ 83
Configuring spanning tree timers ····················································································································· 84
Configuration restrictions and guidelines ································································································· 84
Configuration procedure ··························································································································· 84
Configuring the timeout factor ·························································································································· 85
Configuring the BPDU transmission rate ········································································································· 85
Configuring edge ports ····································································································································· 86
Configuration restrictions and guidelines ································································································· 86
Configuration procedure ··························································································································· 86
Configuring path costs of ports ························································································································ 86
Specifying a standard for the device to use when it calculates the default path cost ······························ 87
Configuring path costs of ports ················································································································ 88
Configuration example ····························································································································· 89
Configuring the port priority ······························································································································ 89
Configuring the port link type ··························································································································· 90
Configuration restrictions and guidelines ································································································· 90
Configuration procedure ··························································································································· 90
Configuring the mode a port uses to recognize and send MSTP packets ······················································· 90
Enabling outputting port state transition information ························································································ 91
Enabling the spanning tree feature ·················································································································· 91
Enabling the spanning tree feature in STP/RSTP/MSTP mode ······························································· 92
Enabling the spanning tree feature in PVST mode ·················································································· 92
Performing mCheck ········································································································································· 92
Configuration restrictions and guidelines ································································································· 93
Configuration procedure ··························································································································· 93
Configuring Digest Snooping ··························································································································· 93
Configuration restrictions and guidelines ································································································· 94
Configuration procedure ··························································································································· 94
Digest Snooping configuration example··································································································· 94
Configuring No Agreement Check ··················································································································· 95
Configuration prerequisites ······················································································································ 96
Configuration procedure ··························································································································· 97
No Agreement Check configuration example ··························································································· 97
Configuring TC Snooping ································································································································· 97