CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Advertisements

CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Part 2: Preventing Loops in the Network
Spanning Tree Protocol
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Request For Proposal (RFP) A request for proposal (RFP) is a solicitation made, often through a bidding process, by an agency or company interested in.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement VTP LAN Switching and Wireless – Chapter 4.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
STP Spanning tree protocol. Trunk port : A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific.
Spanning Tree protocol- Chapter 5
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Describing STP Stability Mechanisms.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Spanning Tree Protocol Enhancements.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Layer 2 Switching. Overview Introduction Spanning Tree Protocol Spanning Tree Terms Spanning Tree Operations LAN Switch Types Configuring Switches.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
Switching in an Enterprise Network
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – Chapter 2 Spanning tree Protocol 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5 Part.
Author: Bill Buchanan. Transparent bridge Author: Bill Buchanan CAM.
Cisco 3 - Switch Perrine. J Page 110/3/2015 Chapter 7 How does STP provide a loop-free network? 1.By placing all ports in the blocking state 2.By placing.
Instructor & Todd Lammle
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
S7C5 – Spanning Tree Protocol And other topics. Switch Port Aggregation Bundling –Combining 2 to 8 links of FE (Fast Ethernet) or GE (Gigabit) Full duplex.
Instructor & Todd Lammle
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless – Chapter.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Spanning Tree protocol
VLAN Design Etherchannel. Review: Private VLANS  Used by Service providers to deploy host services and network access where all devices reside in the.
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
Layer-2 Switching and STP
W&L Page 1 CCNA CCNA Training 2.8 Identify enhanced switching technologies Jose Luis Flores / Amel Walkinshaw Aug, 2015.
Lecture3 Secured Network Design W.Lilakiatsakun.  Spanning Tree Protocol (STP)  Attack on Spanning Tree Protocol Topics.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
Prepared by: PACE Academy ( 1. TRADITIONAL SPANNING TREE SPANNING-TREE CONFIGURATION PROTECTING THE SPANNING TREE PROTOCOL TOPOLOGY ADVANCED.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Exploration 3 Chapter 5. Redundancy in Switched Networks Switches learn the MAC addresses of devices on their ports so that data can be properly forwarded.
Instructor Materials Chapter 3: STP
Implement Spanning Tree Protocols
Spanning Tree Protocol
Implement Spanning Tree Protocols
Spanning Tree Protocols
Instructor & Todd Lammle
Lecture#10: LAN Redundancy
Configuring Catalyst Switch Operations
Spanning Tree Protocol
Implement Spanning Tree Protocols
© 2002, Cisco Systems, Inc. All rights reserved.
Spanning Tree Protocol
NT2640 Unit 9 Activity 1 Handout
STP – Spanning Tree Protocol A closer look
CCNA Routing and Switching Scaling Networks v6.0
Spanning Tree Protocol (STP)
Cisco networking CNET-448
Implement Spanning Tree Protocols
Presentation transcript:

CCNP 3: Chapter 3 Implementing Spanning Tree

Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels

Basics of implementing STP The basic functionality of a switch is identical to that of the transparent bridge. It must not modify the frames that are forwarded. It learns addresses by “listening” on a port for the source address of a device. It must forward all broadcasts out of all ports, except for the port that initially received the broadcast. If a destination address is unknown to the bridge, it forwards the frame out of all ports, except for the port that initially received the frame. This is called unicast flooding. Describing Transparent Bridges

Basics of implementing STP A bridge loop occurs when there is no Layer 2 mechanism, such as time-to-live, to manage the redundant paths and stop the frame from circulating endlessly. Spanning Tree is a protocol that prevents loop formation by detecting redundant links and disabling them until needed. The Spanning Tree Algorithm (STA) runs on each switch to activate or block redundant links. The STA chooses a reference point in the network and determines if there are redundant paths to that reference point. What is a Bridge Loop?

Basics of implementing STP 802.1D STP communicates Layer 2 information between adjacent switches by exchanging bridge protocol data unit (BPDU) messages. STP sends BPDUs out of every port of the bridge. Each switch, except for the root bridge (Of which there’s always only one), selects a root port that provides the best path to the root bridge, redundant ports enter a blocking The “Type” field for the BPDU message is 0x00, it uses the multicast MAC address of C Anatomy of a BPDU STP communication

Election of Root Bridge and Backup The STP topology is converged after a root bridge has been selected, and each bridge has selected its root port, designated bridge, and the participating ports. Path calculation through the network is based on the root bridge which serves as reference point for the topology. One root is elected for each VLAN. The root maintains the topology and propagtes timers. General Overview

Election of Root Bridge and Backup The bridge is selected using the bridge ID (BID), which consists of a 2-byte Priority field plus a 6-byte MAC address. Lower BID values are preferred. The Priority field value helps determine which bridge is going to be the root and can be manually altered. When the default Priority field is the same for all bridges, selecting the root bridge is based on the lowest MAC address. When a switch first boots and begins sending BPDUs, it has no knowledge of a root ID, so it populates the Root ID field of outbound BPDUs with its own BID. Spanning tree operation requires that each switch have a unique BID. Selecting the Root Bridge

Election of Root Bridge and Backup Because PVST requires that a separate instance of spanning tree run for each VLAN, the BID field is required to carry VLAN ID (VID) information, which is accomplished by reusing a portion of the Priority field as the extended system ID. Selecting the Root Bridge - Continued

Election of Root Bridge and Backup Each Layer 2 port on a switch running STP is running in one of the following 5 states: Blocking (Determined by Max Age Timer) Listening (Determined by Fwd Delay Timer) Learning (Determined by Fwd Delay Timer) Forwarding (Participates in networking) Disabled (Port is administratively down) Port States

Election of Root Bridge and Backup Hello timer: Determines how often root bridge sends configuration BPDUs. The default is 2 seconds. Maximum Age (Max Age): Tells the bridge how long to keep ports in the blocking state before listening. The default is 20 seconds. Forward Delay (Fwd Delay): Determines how long to stay in the listening state before going to the learning state, and how long to stay in the learning state before forwarding. The default is 15 seconds. STP Timers

Election of Root Bridge and Backup If no priority has been configured, every switch will have the same default priority of Assuming all other switches are at default priority, the spanning-tree vlan “vlan-id” root primary command sets a value of Assuming all other switches are at default priority, the spanning-tree vlan “vlan-id” root secondary command sets a value of By default STP is enabled and need no configuration. Configuring PVST CAUTION:Spanning tree commands take effect immediately, so network traffic is disrupted while the reconfiguration occurs. CAUTION:Spanning tree commands take effect immediately, so network traffic is disrupted while the reconfiguration occurs.

Enhancing STP Spanning Tree enhancements focus on faster network convergence. PortFast Skips learning and listening, going straight to forwarding. (Config-if)Spanning-tree portfast UplinkFast The switch identifies backupports on upstream fail, going straight to backup. (Config)Spanning-tree uplinkfast Uplink fast is set globally, the switch creates uplinkgroups for faster convergence. BackboneFas t Like uplinkfast but used to detect indirect failures. RootLinkQueries are sent out on all ports to determine the new root route. (Config)Spanning-tree backbonefast Backbonefast is set globally and need to be set on all switches in the network. STP Enhancements

Enhancing STP -RSTP RSTP works much like RTP, the main differences are: RSTP is proactive and doesn’t just “forget” blocked ports RSTP cust downtime during convergence by up to 50 seconds RSTP is... Well.. Rapid...

Enhancing STP -RSTP Port States and Roles

Enhancing STP -RSTP How it works

Enhancing STP -RSTP Configuring RSTP

Enhancing STP -MSTP MSTP differs from other spanning tree implementations in that it combines some, but not necessarily all, VLANs into logical spanning tree instances.

Enhancing STP -MSTP

Configuring MSTP

EtherChannels EtherChannels are just that ;)

EtherChannels To configure EtherChannels you need to both Make ports ready for EtherChannels Configure the Port Channel

EtherChannels Configuring a Port Channel

EtherChannels Configuring ports for EtherChannel

EtherChannels EtherChannels can be Layer 3 Use the command “No Switchport” in the Interface Portchannel Configuration Mode Assign an IP address like you would a Layer 3 port

EtherChannels Port-channel load-balance Load balancing is applied globally for all EtherChannel bundles in the switch. To configure EtherChannel load balancing, use the port- channel load-balance command. Load balancing can be based on the following variables: src-mac: Source MAC address dst-mac: Destination MAC address src-dst-mac: Source and destination MAC addresses src-ip: Source IP address dst-ip: Destination IP address src-dst-ip: Source and destination IP addresses (default) src-port: Source TCP/User Datagram Protocol (UDP) port dst-port: Destination TCP/UDP port src-dst-port: Source and destination TCP/UDP ports

EtherChannels

This example shows an example of how to configure and verify EtherChannel load balancing. Switch(config)# port-channel load- balance src-dst-ip Switch(config)# exit Switch# show etherchannel load- balance