Spanning Tree Protocols: STP, RSTP, and MSTP: Feature Overview and Configuration Guide
Spanning Tree Protocols: STP, RSTP, and MSTP: Feature Overview and Configuration Guide
Introduction
This guide describes and provides configuration procedures for:
Spanning Tree Protocol (STP)
Rapid Spanning Tree Protocol (RSTP)
Multiple Spanning Tree Protocol (MSTP)
For detailed information about the commands used to configure spanning trees, see the
switch’s Command Reference on our website at alliedtelesis.com.
However, support varies between products. To see whether a product supports a particular
feature or command, see the following documents:
The product’s Datasheet
The AlliedWare Plus Datasheet
The product’s Command Reference
These documents are available from the above links on our website at alliedtelesis.com.
Feature support may change in later software versions. For the latest
information, see the above documents.
Content
Introduction.............................................................................................................................................................................1
Products and software version that apply to this guide .......................................................................1
Overview of Spanning Trees..........................................................................................................................................3
Spanning Tree operation .........................................................................................................................................3
Spanning Tree modes................................................................................................................................................5
Spanning Tree Protocol (STP).......................................................................................................................................6
Interoperation with link aggregation ................................................................................................................6
Configuring STP ...........................................................................................................................................................6
Rapid Spanning Tree Protocol (RSTP)......................................................................................................................8
Configuring RSTP........................................................................................................................................................8
Multiple Spanning Tree Protocol (MSTP) ............................................................................................................ 11
Multiple Spanning Tree Instances (MSTI).................................................................................................... 11
MSTP regions ............................................................................................................................................................. 12
Common and Internal Spanning Tree (CIST) .......................................................................................... 14
MSTP Bridge Protocol Data Units (BPDUs)............................................................................................ 16
Configuring MSTP.................................................................................................................................................... 18
The IEEE Standard 802.1 uses the term bridge to define the spanning tree operation, and
uses terms such as Bridge Protocol Data Units and Root Bridge when defining spanning tree
protocol functions.
A bridge effectively means "a Layer 2 Ethernet forwarding device that forwards packets based
on MAC address". So, it is a term that encompasses hardware switches as well as software-
based Layer 2 forwarding devices.
For consistency, the term bridge rather than 'switch' will be used in this document.
When a bridge receives a frame, it reads the source and destination address fields. The
bridge then enters the frame’s source address in its forwarding database. In doing this the
bridge associates the frame’s source address with the network attached to the port on which
the frame was received. The bridge also reads the destination address and if it can find this
address in its forwarding database, it forwards the frame to the appropriate port. If the
bridge does not recognize the destination address, it forwards the frame out from all its
ports except for the one on which the frame was received, and then waits for a reply. This
process is known as “flooding”. Similarly, packets with broadcast or multicast destination
MAC addresses will be flooded by a bridge.
A significant problem arises where bridges connect via multiple paths. A frame that arrives
with an unknown or broadcast/multicast destination address is flooded over all available
paths. The arrival of these frames at another network via different paths and bridges
produces major problems. The bridges find the same source MAC address arriving on
multiple different ports, making it impossible to maintain a reliable forwarding database. As a
result, increasing numbers of packets will be forwarded to multiple paths. This process is self-
perpetuating and produces a condition known as a packet storm, where the increase of
circulating frames can eventually overload the network.
Therefore, network designers face a problem - multiple paths are desired for resiliency
purposes, but multiple paths can lead to broadcast storms. A solution to this problem is to
eliminate some physical paths from the active forwarding topology, so that the active
forwarding topology has only one path between any two locations. Then, if a link in the active
forwarding topology becomes unavailable, one or more of the previously eliminated paths
can be brought into the active forwarding topology, to restore full connectivity through the
network.
The spanning tree is created through the exchange of Bridge Protocol Data Units (BPDUs)
between the bridges in the LAN. The spanning tree algorithm operates by:
Automatically computing a loop-free portion of the topology, called a spanning tree. The
topology is dynamically pruned to the spanning tree by declaring certain ports on a switch
to be redundant, and placing them into a ‘blocking’ state.
Automatically recovering from a switch failure that would partition the extended LAN by
reconfiguring the spanning tree to use redundant paths, if available.
The logical tree computed by the spanning tree algorithm has the following properties:
A single bridge is selected to become the spanning tree’s unique root bridge. This is the
device that advertises the lowest Bridge ID. Each bridge is uniquely identified by its Bridge
ID, which comprises the bridge’s root priority (a spanning tree parameter) followed by its
MAC address.
Each bridge or LAN segment in the tree, except the root bridge, has a unique parent,
known as the designated bridge. The designated bridge, connects a LAN segment to the
next segment on the path towards the root bridge.
Each port connecting a bridge to a LAN segment has an associated cost, called the root
path cost. This is the sum of the costs for each link in the path between the particular
bridge port and the root bridge.The designated bridge for a LAN segment is the one that
advertises the lowest root path cost. If two bridges on the same LAN segment have the
same lowest root path cost, then the switch with the lowest bridge ID becomes the
designated bridge.
The spanning tree computation is a continuous, distributed process to establish and maintain
a spanning tree (Table 1). The basic algorithm is similar for STP, RSTP and MSTP modes.
Table 1: Spanning tree process
Selects a root bridge It selects as the root bridge for the spanning tree the device
with the (numerically) lowest bridge identifier (that is, the
device with lowest root bridge priority value, or if multiple
bridges have the same priority, the bridge with the lowest
MAC address).
Selects root ports On each device, it selects the root port according to:
■ the port with the lowest path cost to the root bridge
■ the port connected to the bridge with the lowest root
identifier
■ MSTP and RSTP only: the port with the lowest port
priority value
■ the port with the lowest port number1
Blocks alternate ports In order to prevent loops, it blocks alternate ports
(discarding state) that provide higher cost paths to the root
bridge.
Blocks backup ports Where a second port connects one switch back to itself, it
blocks the backup port that has the highest path cost or
port number.
Selects designated ports All other ports that are not disabled are selected as
designated ports and are eventually made active
(Forwarding state).
Maintains the spanning tree If a switch or port fails, the spanning tree configures a new
active topology, changing some port states, to re-establish
connectivity and block loops. Depending on where the
failure occurs, the changes may be widespread (e.g. if the
root bridge fails), or local (e.g. if a designated port fails).
1.The whole three part port number (x.y.z) is used to find the lowest port number, where x is the device
number within a stack (1 for a non stacked device), y is the module number (for example, the card or
XEM number) within the device (note that 0 is used for all base-board connected ports), and z is the
number of the port within the module or base-board.
The logical spanning tree, sometimes called the active topology, includes all root ports and all
designated ports. These ports are in the forwarding state. Ports removed from the logical
spanning tree are not in the forwarding state. To implement the spanning tree algorithm,
devices communicate with one another using the Spanning Tree Protocol.
STP The Spanning Tree Protocol (STP) is the original protocol defined by IEEE standard
802.1D-1988. It creates a single spanning tree over a network. STP mode may be useful for
supporting applications and protocols whose frames may arrive out of sequence or
duplicated, for example NetBeui.
RSTP Rapid Spanning Tree Protocol (RSTP) also creates a single spanning tree over a network.
Compared with STP, RSTP provides for more rapid convergence to an active spanning tree
topology. RSTP is defined in IEEE standard 802.1D-2004. By default, the device operates in
RSTP mode.
MSTP The Multiple Spanning Tree Protocol (MSTP) addresses the limitations in the previous
spanning tree protocols, STP and RSTP, within networks that use multiple VLANs with
topologies that employ alternative physical links. It supports multiple spanning tree instances
on any given link within a network, and supports large networks by grouping bridges into
regions that appear as a single bridge to other devices.
MSTP is defined in IEEE standard 802.1Q-2005. The protocol builds on, and remains
compatible with, the previous IEEE standards defining STP and RSTP.
STP port states In STP mode, each switch port can be in one of five spanning tree states, and one of two
switch states. The state of a switch port is taken into account by STP. The STP port states
(shown in Table 2) affect the behavior of ports whose switch state is enabled.
Table 2: STP port states
STATE MEANING
DISABLED STP operations are disabled on the port. The port does not participate in the
operation of the Spanning Tree Algorithm and Protocol. The port can still switch
if its switch state is enabled.
BLOCKING The forwarding process discards received frames and does not submit forwarded
frames for transmission. This is the “standby” mode.
LISTENING The port is enabled for receiving frames only. The port is preparing to participate
in frame forwarding. The forwarding process discards received frames and does
not submit forwarded frames for transmission.
LEARNING The port is enabled for receiving frames only, and the Learning Process can add
new source address information to the Forwarding Database.
FORWARDING The normal state for a switch port.The forwarding process and the SpanningTree
entity are enabled for transmit and receive operations on the port.
Configuring STP
By default, RSTP is enabled on all switch ports. This section provides a procedure for
configuring STP (Table 3). To configure other modes, see "Configuring RSTP" on page 8 or
"Configuring MSTP" on page 18.
Table 3: Configuration procedure for STP
COMMAND DESCRIPTION
Step 1. Configure STP
RSTP is enabled by default with default settings on all switch ports to prevent Layer 2 loops in your
network.
awplus# Enter Global Configuration mode.
configure terminal
awplus(config)# By default, the device is in RSTP mode. Change to STP
mode.
spanning-tree mode stp
awplus(config)# By default, spanning tree is enabled on all switch ports.
If it has been disabled, enable it for STP.
spanning-tree enable
COMMAND DESCRIPTION
Advanced For most networks the default settings for path costs will be suitable, however, you can
configuration configure them if required (spanning-tree path-cost command).
A spanning tree running in STP mode can take up to one minute to rebuild after a topology
or configuration change. The RSTP algorithm provides for a faster recovery of connectivity
following the failure of a bridge, bridge port, or a link. RSTP provides rapid recovery by
including port roles in the computation of port states, and by allowing neighboring bridges to
explicitly acknowledge signals on a point-to-point link that indicate that a port wants to enter
the forwarding mode.
In rapid mode, the rapid transition of a port to the forwarding state is possible when the
port is considered to be part of a point-to-point link, or when the port is considered to be
an edge port. An edge port is one that attaches to a LAN that has no other bridges
attached, e.g. a port that is connected to a workstation, a printer, a VoIP phone, or other
end-point device.
Table 4: RSTP port states
STATE MEANING
Configuring RSTP
RSTP is enabled by default with default settings on all switch ports to prevent Layer 2 loops
in your network. No further configuration is required if you want to use RSTP with these
default settings. For further RSTP configuration, see Table 5 below.
For detailed configuration examples, see the How To Note How To Configure Basic
Switching Functionality, available from alliedtelesis.com.
COMMAND DESCRIPTION
Step 1. Configure RSTP
RSTP is enabled by default with default settings on all switch ports to prevent Layer 2 loops in your
network. No further configuration is required if you want to use RSTP with these default settings. If
you need to restore the device to RSTP after it has been set to another mode, or modify the default
RSTP settings, follow the procedure below.
awplus# Enter Global Configuration mode.
configure terminal
awplus(config)# By default, the device is in RSTP mode. If it has been
changed to STP or MSTP mode, change it back to
spanning-tree mode rstp RSTP.
awplus(config)#
spanning-tree enable By default, spanning tree is enabled on all switch
ports. If it has been disabled, enable it for RSTP.
awplus(config)# By default, all devices have the same root bridge
priority, 32768 (8000 in hexadecimal), so the device
spanning-tree priority with the lowest MAC address becomes the root
<priority> bridge. If you want the device to be the root bridge,
set the root bridge priority to a value lower than
32768.
Enter a value in the range 0 to 61440. If you enter a
number that is not a multiple of 4096, the switch
rounds the number down.
Step 2. Configure edge ports
If some switch ports are connected to devices that cannot generate BPDUs (such as workstations),
you can set particular switch ports as edge ports, or set them to automatically detect whether they
are edge ports.
awplus(config)# Enter Interface Configuration mode for these switch
ports.
interface <port-list>
awplus(config-if)# Set these ports to be edge ports,
spanning-tree edgeport
or or
awplus(config-if)#
set these ports to automatically detect whether they
spanning-tree autoedge are edge ports.
COMMAND DESCRIPTION
Step 4. Configure BPDU Guard
awplus(config-if)# Return to Global Configuration mode.
exit
awplus(config)# If required, enable the BPDU Guard feature.
spanning-tree portfast
bpdu-guard
awplus(config)# Set a timeout for ports that are disabled due to the
BPDU guard feature.
spanning-tree errdisable-
timeout enable
awplus(config)# Specify the time interval after which a port is brought
back up when it has been disabled by the BPDU
spanning-tree errdisable- guard feature.
timeout interval
Step 5. Check RSTP configuration
awplus(config)# Return to Privileged Exec mode.
exit
awplus# Display the spanning tree configuration for the
device, and confirm the new root bridge priority
show spanning-tree [interface (Bridge Priority).
<port-list>]
Note that the Bridge ID is in a form like this:
80000000cd240331, and that other IDs follow the
same pattern. This is made up of:
8000—the devices’ root bridge priority in
hexadecimal
0000cd240331—the devices’ MAC address.
Advanced For most networks the default settings for path costs will be suitable, however, you can
configuration configure them if required (spanning-tree path-cost command).
Advantage of MSTP is similar to RSTP, in that it provides loop resolution and rapid convergence. However,
MSTP over RSTP can keep track of only one spanning-tree. MSTP can track many spanning-trees,
RSTP referred to as instances. MSTP makes it possible to have different forwarding paths for
different MST instances. This enables load balancing of network traffic across redundant links,
so that all the links in a network can be used by at least one MSTI, and no link is left
completely idle. That is to say that no link is unnecessarily shut down by spanning-tree.
Essentially, MSTP is VLAN aware and RSTP is not VLAN aware. MSTP BPDUs and RSTP
BPDUs are compatible, so a network can have a mixture of MSTP and RSTP areas.
In a network where all VLANs span all links of the network, judicious choice of bridge
priorities for different MSTIs can result in different switches becoming root bridges for
different MSTIs. That will result in the different MSTIs choosing different active topologies on
the network. An example of how different MSTIs can choose different active topologies on
the same physical set of links is illustrated in Figure 1 on page 12.
MSTP is compatible with RSTP and STP—see "Common and Internal Spanning Tree
(CIST)" on page 14.
Figure 1: Different spanning trees created by different MSTIs on the same physical layout
Root bridge for
MSTI 3
Physical connections
Spanning tree of MSTI= 1 containing vlans 2, 7, 9, 43
Spanning tree of MSTI= 2 containing vlans 16, 18, 24, 40
Spanning tree of MSTI= 3 containing vlans 23, 39, 50, 112
Diff_MSTI_1
MSTP regions
An MST region is a set of interconnected switches that all have the same values for the
following MST configuration identification elements:
MST configuration name - the name of the MST region
Revision level - the revision number of configuration
Configuration digest - the mapping of which VLANs are mapped to which MST instances
Each of the MST instances created are identified by an MSTI number. This number is locally
significant within the MST region. Therefore, an MSTI will not span across MST regions.
Region 1
Physical connections
MSTI1
MSTI2
MSTI3
Region 3
MSTI1
MSTI3
Region 2
MSTI2
MSTI4
The MSTI1 in Region 1 is unrelated to the MSTI1 in Region 3. Similarly, the MSTI2 in Region 1 is quite
unrelated to the MSTI2 in Region 2.
MSTI_numbers
The task of assigning each bridge to a particular region is achieved by the member bridges
each comparing their MST Configuration Identifiers. More information on configuration
identifiers is provided in Table 6, but for the moment an MST Configuration Identifier can
simply be thought of as an identifier that represents the mapping of VLANs to MSTIs within
each bridge. Therefore, bridges with identical MST Configuration Identifiers, must have
identical MSTI mapping tables.
While each MSTI can have multiple VLANs, each VLAN can be associated with only one
MSTI. Once these associations have been made, the bridges in each region can transmit their
spanning tree BPDUs and advertise their MSTIs. This in turn establishes the active data paths
between the bridges for each group of VLANs (that is, for each MSTI) and block any
duplicate paths within each instance. A particular advantage of this enhancement applies
where a large number of VLANs share a few internetwork paths. In this situation there need
only be as many Multiple Spanning Tree Instances (MSTIs) as there are source and
destination bridge pairs, remembering that a pair of bridges probably has multiple paths
between them.
In order to ensure that each bridge within a region maintains the same configuration
information (particularly their VID to MSTI mappings) and to ensure each bridge’s
membership of a particular region, the bridges exchange configuration information in the
Format Selector A single octet field whose value of 0 indicates MSTP operation
Region Name A name (up to 32 characters long) that identifies a particular MST region,
defined using the region command.
Revision Level A number representing the region’s revision level, defined using the
revision command.
Configuration Digest A 16 octet (HMAC-MD5 based) signature created from the MST
configuration table
Figure 3: The CIST operates on links between regions and to SST devices
MSTP
Region 1
MSTP
Region 3
MSTP
Region 2
MSTP_vs_RSTP
In common with legacy spanning tree systems, the CIST protocol first determines its root
bridge from all the bridges on the network. This is the bridge that contains the lowest bridge
identifier. The protocol then selects a regional root bridge for each MSTR. This is the bridge
that provides the best path to the CIST root. After the MSTR root bridges have been
chosen, they then act on the region’s behalf in such a way that the region appears to the
Common Spanning Tree (CST) as a virtual bridge. So in addition to having multiple MSTIs,
each region operates as a bridge in a CST.
CIST In addition to the individual MSTIs within each MSTP region, the MSTP region is a member of
a network-wide spanning tree called the Common and Internal Spanning Tree (CIST).
Conceptually, each region represents a virtual bridge. Internal and external bridge
connectivity are two independent functions.
Frames with VIDs allocated to the CIST are subject to the rules and path costs of the
complete bridged LAN as determined by the CIST’s vectors. Frames other than these are
subject to the CIST when traveling outside their region, and subject to its particular MSTI
inside the region.
The role of the Common Spanning Tree (CST) in a network, and the Common and Internal
Spanning Tree (CIST) configured on each device, is to prevent loops within a wider network
that may span more than one MSTP region and parts of the network running in legacy STP
or RSTP mode.
CIST first allocates root and designated bridges by selecting the bridge with the lowest
identifier as the root. MSTP then deals with any loops between the regions in the CST. It
does this by considering the CIST “vectors” in the following order:
1. CIST External Root Path Cost
Table 7 shows the standardized format for MSTP BPDU messages. The general format of the
BPDUs comprise a common generic portion—octets 1 to 36—that are based on those
defined in IEEE Standard 802.1D, 1998, followed by components that are specific to CIST—
octets 37 to 102. Components specific to each MSTI are added to this BPDU data block.
)
Table 7: MSTP Bridge Protocol Data Units (BPDUs)
Protocol Identifier 1–2 Protocol being used.The value 0000 0000 0000 0000 identifies the
spanning tree algorithm and protocol.
Protocol Version 3 Identifies the protocol version used.
Identifier
BPDU Type 4 Value 0000 0000 specifies a configuration BPDU.
CIST Flags 5 Bit 1 is the topology change flag.
Bit 2 conveys the CIST proposal flag in RST and MST BPDUs -
unused in STP.
Bits 3 & 4 convey the CIST port role in RST, and MST BPDUs -
unused in STP.
Bit 5 conveys the CIST learning flag in RST and MST BPDUs -
unused in STP.
Bit 6 conveys the CIST forwarding flag in RST and MST BPDUs -
unused in STP.
Bit 7 conveys the CIST agreement flag in RST and MST BPDUs -
unused in STP.
Bit 8 conveys the topology change acknowledge flag in STP
configuration BPDUs - unused in RSTP and MSTP BPDUs.
CIST Root Identifier 6–13 The Bridge identifier of the CIST Root
CIST External Path 14–17 The path cost between MST regions from the transmitting bridge
Cost to the CIST root.
CIST Regional Root 18–25 ID of the current CIST regional root bridge.
Identifier
CIST Port Identifier 26–27 CIST port identifier of the transmitting bridge port.
Message Age 28–29 Message age timer value.
Max Age 30–31 Timeout value to be used by all bridges in the bridged network.
This value is set by the root. Some implementations of MSTP may
choose not to use this value.
Hello Time 32–33 Time interval between the generation of configuration BPDUs by
the root bridge.
Forward Delay 34–35 A timeout value used to ensure forward delay timer consistency
when transferring a port to the forwarding state. It is also used for
ageing filtering database dynamic entries following changes in the
active topology.
Version 1 Length 36 Used to convey the Version 1 length. It is always transmitted as 0.
Version 3 Length 37–38 Used to convey the Version 3 length. It is the number of octets
taken by the parameters that follow in the BPDU.
MST Configuration 39–89 An identifier comprising elements of the following:
Identifier ■ Format Selector
■ Configuration Name
■ Revision Level
■ Configuration Digest.
CIST Internal Root 90–93 Path cost to the CIST regional root.
Path Cost
CIST Bridge Identifier 94–101 CIST bridge identifier of the transmitting bridge.
CIST Remaining Hops 102 Remaining hops which limits the propagation and longevity of
received spanning tree information for the CIST.
MSTI Configuration 103–39 See Table 8.
Messages plus
(may be absent) Version 3
Length
MSTI Flags 1 Bits 1 through 8, convey the topology change flag, proposal flag,
port role (two bits), Learning flag, forwarding flag, agreement flag,
and master flag for this MSTI.
MSTI Regional Root 2–9 This includes the value of the MSTID for this configuration message
Identifier encoded in bits 4 through 1 of octet 1, and bits 8 through 1 of
octet 2.
MSTI Internal Root 10-13 Internal Root Path Cost.
Path Cost
MSTI Bridge Priority 14 Bits 5 through 8 convey the value of the bridge identifier priority
for this MSTI. Bits 1 through 4 of Octet 14 are transmitted as 0,
and ignored on receipt.
MSTI Port Priority 15 Bits 5 through 8 are used to convey the value of the port identifier
priority for this MSTI. Bits 1 through 4 are transmitted as 0, and
ignored on receipt.
MSTI Remaining 16 Value of remaining hops for this MSTI.
Hops
Configuring MSTP
By default, RSTP is enabled with default settings on all switch ports. To configure MSTP, see
the configuration procedure in Table 9.
To configure other modes, see "Configuring RSTP" on page 8 or "Configuring STP" on page 6.
For detailed configuration examples, see the How To Note How To Configure Basic
Switching Functionality, available from website at alliedtelesis.com.
Configuration Switches must have the same MST configuration identification elements (region name,
guidelines for revision level and VLAN to MSTI mapping) to be in the same MST region. When
MSTP configuring multiple MST regions for MSTP, MSTIs are locally significant within an MST
region. MSTIs will not span from one region to another region.
Common and Internal SpanningTree (CIST) is the default spanning tree instance for MSTP.
This means that all VLANs that are not explicitly configured into another MSTI are
members of the CIST.
The software supports a single instance of the MSTP Algorithm consisting of the CIST and
up to 15 MSTIs.
AVLAN can only be mapped to one MSTI or to the CIST. OneVLAN mapped to multiple
spanning trees is not allowed. All the VLANs are mapped to the CIST by default. Once a
VLAN is mapped to a specified MSTI, it is removed from the CIST.
To avoid unnecessary STP processing, a port that attaches to a LAN that is known to have
no other bridges/switches attached can be configured as an edge port.
Before Before configuring MSTP, configure VLANs and associate them with switch ports (see the
configuring VLAN Feature Overview and Configuration Guide), and determine for your network:
MSTP
which MSTP regions, revision level and instances are required
which VLANs and switch ports will belong to which MSTIs,
which devices you want to be root bridges for each MSTI
Table 9: Configuration procedure for MSTP
COMMAND DESCRIPTION
awplus#
configure Enter Global Configuration mode.
terminal
awplus(config)#
spanning-tree By default, the device is in RSTP mode. Change to MSTP
mode mstp mode.
awplus(config)#
spanning-tree By default, spanning tree is enabled on all switch ports. If it has
enable been disabled, enable it for MSTP.
COMMAND DESCRIPTION
Step 1. Configure MSTP region, revision, and instances
All MSTP devices in this region of the network must have the same region name, revision number, and
VLAN to MSTI mappings.
awplus(config)#
spanning-tree mst Enter MST Configuration mode.
configuration
awplus(config-mst)#
region <region- Specify the MSTP region. The region-name parameter is an
arbitrary string that specifies the name you want to assign to
name> the MST region for identification.
awplus(config-mst)#
revision The revision-number parameter specifies the revision of the
current MST configuration.The revision is an arbitrary number
<revision-number> that you assign to an MST region. It can be used to keep track
of the number of times that MST configuration has been
updated for the network.
Specify the MST revision number in the range 0 to 255.
awplus(config-mst)#
instance <msti- To allow MSTP to block traffic for different VLANs in different
places in a loop, create multiple MSTP instances and associate
id> vlan {<vid>| VLANs with them. Each VLAN can only be in one instance.
<vid-list>}
Specify the MST instance ID in the range 1 to 15.
Step 2. Advanced configuration
The commands above are the minimum required to configure MSTP. The following commands allow
more advanced configuration.
Step 3. Assign root bridge priorities
MSTP lets you distribute traffic more efficiently across a network by blocking different links for different
VLANs.You do this by configuring different devices to be the root bridge for each MSTP instance, and
for the CIST, so that each instance blocks a different link. By default, all devices have the same root
bridge priority, 32768 (8000 in hexadecimal), so the device with the lowest MAC address becomes
the root bridge. If you want the device to be the root bridge for an instance or for the CIST, set the
priority to a lower value (a higher priority) than other devices for this instance. (If you enter a number
that is not a multiple of 4096, the device rounds the number down.)
awplus(config)#
spanning-tree mst Enter MST Configuration mode.
configuration
awplus(config-mst)#
instance <msti- Set the priority for the device to become the root bridge for
id> priority each instance.
<priority> Specify the MST instance ID in the range 1 to 15.
Specify the root bridge priority in the range 0 to 61440. If you
enter a number that is not a multiple of 4096, the switch
rounds the number down.
awplus(config-mst)#
exit Return to Global Configuration mode.
COMMAND DESCRIPTION
awplus(config)#
spanning-tree Set the priority for the device to become the root bridge for
priority the CIST.
<priority> Specify the bridge priority in the range 0 to 61440. If you enter
a number that is not a multiple of 4096, the switch rounds the
number down.
Step 4. Configure edge ports
If some switch ports are connected to devices that cannot generate BPDUs (such as workstations),
you can set particular switch ports as edge ports, or set them to automatically detect whether they
are edge ports.
awplus(config)#
interface <port- Enter Interface Configuration mode for these switch ports.
list>
awplus(config-if)#
Set these ports to be edge ports,
spanning-tree
edgeport
or or
awplus(config-if)#
spanning-tree set these ports to automatically detect whether they are edge
autoedge ports.
Step 5. Configure Root
Guard
awplus(config-if)#
spanning-tree The Root Guard feature makes sure that the port on which it
guard root is enabled is a designated port. If the Root Guard enabled port
receives a superior BPDU, it goes to a Listening state (for STP)
or discarding state (for RSTP and MSTP). Enable the Guard
Root feature if required.
awplus(config-if)#
exit Return to Global Configuration mode.
Step 6. Configure BPDU
Guard
awplus(config)#
spanning-tree If required, enable the BPDU Guard feature.
portfast bpdu-
guard
awplus(config)#
spanning-tree Set a timeout for ports that are disabled due to the BPDU
errdisable- guard feature.
timeout enable
awplus(config)#
spanning-tree Specify the time interval after which a port is brought back up
errdisable- when it has been disabled by the BPDU guard feature.
timeout interval
<10-1000000>
COMMAND DESCRIPTION
Step 7. Check MSTP
configuration
awplus(config)#
exit Return to Privileged Exec mode.
awplus#
show spanning- Check that the digest is the same on this device as for all other
tree mst config devices in the same region.
awplus#
show spanning- Check the MST to VLAN and port mapping.
tree mst
awplus#
show spanning- Check the detailed information for a particular instance, and all
tree mst instance switch ports associated with that instance.
<instance> Specify the MST instance ID in the range 1 to 15.
awplus#
show spanning- Check general information about MSTP, and the CIST settings.
tree mst
interface <port>
Advanced For most networks, the default settings of the following will be suitable. However, you can
configuration also configure them.
path costs for ports in an MSTI (spanning-tree mst instance path-cost command) or for
the CIST (spanning-tree path-cost command)
port priority for ports in an MSTI (spanning-tree mst instance priority command) or for
the CIST (spanning-tree priority command)
C613-22026-00 REV A
North America Headquarters | 19800 North Creek Parkway | Suite 100 | Bothell | WA 98011 | USA | T: +1 800 424 4284 | F: +1 425 481 3895
Asia-Pacific Headquarters | 11 Tai Seng Link | Singapore | 534182 | T: +65 6383 3832 | F: +65 6383 3830
EMEA & CSA Operations | Incheonweg 7 | 1437 EK Rozenburg | The Netherlands | T: +31 20 7950020 | F: +31 20 7950021
alliedtelesis.com
© 2015 Allied Telesis Inc. All rights reserved. Information in this document is subject to change without notice. All company names, logos, and product designs that are trademarks or registered trademarks are the property of their respective owners.