
iii
Configuration procedure···························································································································62
Verifying the configuration························································································································62
Configuring spanning tree protocols ····························································· 64
STP ··································································································································································64
STP protocol packets ·······························································································································64
Basic concepts in STP ·····························································································································64
Calculation process of the STP algorithm ································································································65
RSTP ·······························································································································································71
PVST································································································································································71
MSTP ·······························································································································································71
MSTP features ·········································································································································72
MSTP basic concepts ······························································································································72
How MSTP works·····································································································································75
MSTP implementation on devices············································································································76
Protocols and standards ··································································································································76
Spanning tree configuration task lists ··············································································································76
STP configuration task list························································································································77
RSTP configuration task list ·····················································································································78
PVST configuration task list ·····················································································································78
MSTP configuration task list·····················································································································79
Setting the spanning tree mode ·······················································································································80
Configuring an MST region ······························································································································80
Configuring the root bridge or a secondary root bridge ···················································································81
Configuring the current device as the root bridge of a specific spanning tree ·········································82
Configuring the current device as a secondary root bridge of a specific spanning tree···························82
Configuring the device priority ·························································································································82
Configuring the maximum hops of an MST region···························································································83
Configuring the network diameter of a switched network ················································································83
Configuring spanning tree timers ·····················································································································84
Configuration restrictions and guidelines ·································································································84
Configuration procedure···························································································································84
Configuring the timeout factor··························································································································85
Configuring the BPDU transmission rate ·········································································································85
Configuring edge ports·····································································································································86
Configuration restrictions and guidelines ·································································································86
Configuration procedure···························································································································86
Configuring path costs of ports ························································································································86
Specifying a standard for the device to use when it calculates the default path cost ······························87
Configuring path costs of ports ················································································································88
Configuration example ·····························································································································89
Configuring the port priority······························································································································89
Configuring the port link type ···························································································································90
Configuration restrictions and guidelines ·································································································90
Configuration procedure···························································································································90
Configuring the mode a port uses to recognize and send MSTP packets ·······················································90
Enabling outputting port state transition information························································································91
Enabling the spanning tree feature ··················································································································91
Enabling the spanning tree feature in STP/RSTP/MSTP mode·······························································92
Enabling the spanning tree feature in PVST mode ··················································································92
Performing mCheck ·········································································································································92
Configuration restrictions and guidelines ·································································································93
Configuration procedure···························································································································93
Configuring Digest Snooping ···························································································································93
Configuration restrictions and guidelines ·································································································94
Configuration procedure···························································································································94
Digest Snooping configuration example···································································································94
Configuring No Agreement Check ···················································································································95
Configuration prerequisites ······················································································································96
Configuration procedure···························································································································97
No Agreement Check configuration example···························································································97
Configuring TC Snooping·································································································································97