cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1070
Views
0
Helpful
17
Replies

Root switch conflict in PVST+

subharojdahal
Level 1
Level 1

I have 40+ switches including 4 CatOs 6513 switches in VTP server mode with more than 100 vlans.

Most of the access switches don't have all vlan configured in their access ports. when I issue SHOW SPANTREE VLAN 4 on the access switch which is vtp client ( CONSIDERING no access port configured on this switch with vlan 4) it claims itself as root switch for vlan 4.

When I issue same command on the other switch having access port configured in vlan 4, shows actual root switch ( on of the core switch) for vlan 4.

Please anyone help me out from this.

Appreciated.

1 Accepted Solution

Accepted Solutions

I guess that when you do "show spantree vlan 4" on your access switch, you are indeed seeing some ports active in vlan 4 (whether they are access or not is irrelevant).

If you switch is showing itself as a root for vlan 4, it simply means that it does not receive the superior information generated by the root bridge on the core. This, probably because you manually pruned vlan 4 from the uplink leading to this core bridge. On the bridge where you are using vlan 4, you probably enabled vlan 4 on the uplink, hence the correct root information.

That should not cause any problem. Your network is de facto partitioned for vlan 4, it is normal to have one root bridge per partition.

Regards,

Francois

View solution in original post

17 Replies 17

glen.grant
VIP Alumni
VIP Alumni

Check to see if it is a smaller switch like a 2950 which only supports like 64 stp instances per switch , if you try to feed it more than it will put itself in transparent mode and it will then think it is the root for anything on that switch . If you are running into something like this "manually" prune off unneeded vlans off the trunk (good practice anyway) .

Thanks for your reply

Yes, I have configured some of the switch uplink (trunk port) to allow only vlans which are configured on local switch access port ( local VLANs).

But I doubt that even i mannually pruned the vlan still switch claims root bridge for that vlan that are not configured in access port of the switch.

So, Any other idea to resolve the issues.

I guess that when you do "show spantree vlan 4" on your access switch, you are indeed seeing some ports active in vlan 4 (whether they are access or not is irrelevant).

If you switch is showing itself as a root for vlan 4, it simply means that it does not receive the superior information generated by the root bridge on the core. This, probably because you manually pruned vlan 4 from the uplink leading to this core bridge. On the bridge where you are using vlan 4, you probably enabled vlan 4 on the uplink, hence the correct root information.

That should not cause any problem. Your network is de facto partitioned for vlan 4, it is normal to have one root bridge per partition.

Regards,

Francois

Could you please clear my concepts about inter-vlan routing in multilayer switch?

There are four 6500 switch.

Switch A, B are HSRP pair and stp root for 20 VLANs and C and D are core switch, HSRP pair and STP root for more than 40 VLANs.

routing protocols is eigrp

RAPID PVST+ is enable in each core switches.

Current topology

A<--->B C<---->D

B<--->C

My objective is to make full redundant link in four switch. If I add link as

A<--->D

A<--->D

B<--->D

B<--->

and make all newly added link as trunk similar to old one.

Does it work ?? If not what should I do?

I would appreciate.

anyone have any solutions ???

I may not understanding your setup correctly but why would you want to tie A,B and C,D together unless you want to extend your vlans across to those layers.

I read your previous post and understand what you are trying to do now.

Seems like you are running collapsed core setup. You can use L3 links to connect them together and use EIGRP for load-balancing between AB and CD communication if you can't afford the downtime to consolidate AB vlans on CD.

Your solutions still works if I want to expand my some of the vlan across the switch.

Lets say I want some of the nodes on vlan 134 on switch A and some any other switch.

Could you sugeest me the exact links needed among those switches ?

With only L3 links between block AB and CD, how are you going to expand any of your vlans from AB to CD without L2 trunk between them ?

Without understanding how your network traffic flows, it is hard to give you the exact link setup.

A <--> B

C <--> D

A <--> C

B <--> D

Assuming AB and CD are both running HSRP, and A , C are both primary gateway.

You can fully mesh them if you have the interface to spare incase of C fails and D takes over and traffic doesn't flow from D --> B --> A.

Paul

Thanks for the question. You guys are absolutely right. But My question is little different. Please go through it once.

Switch A and B are connected.

B is connected to D, D is conneced to C

physical topology like

A C

B D

The switch C and D are connected with WAN VLAN. When I issue SHOW IP ROUTE command in MSFC card of each switches, I found route for each and every VLAN as well as default route.

The Switch C and D are connected with firewal or router ( which i dont wanna bother ) via vlan 16 (WAN VLAN). Each MSFC has default route that forwards packet to IP address of VLAN 16 ( WAN VLAN.

The curret setup is running properly.

My question is if I add redundant link among those swithces, configure its trunk port exactly same as before and let the EIGRP do its work, THEN WHAT IS THE EFFECT IF DOING SO ?? THAT IS MY QUESTION ???

As each trunk link are in native vlan 100 and I have knowledge of root bridge for each vlan.

Switch has CatOS and MSFC (IOS) native mode in all switch.

Let me make sure I understand this correctly.

C <--L3--> Net

D <--L3--> Net

C <--L2 Trunk--> D

B <--L2 Trunk--> D

A <--L2 Trunk--> B

Please let me know if I understand this correctly.

Yes

C and D have connection to WAN VLAN with IP block size 16 ( /28).

I could see EIGRP route in all of the MSFC ( all switches).

Please let me know if you need more information.

I would assume C is primary gateway for internet and D is backup and you don't need to extend AB vlans to CD or vice versa.

A <--L3--> C

A <--L3--> D

B <--L3--> C

B <--L3--> D

A <--L2 Trunk--> B

take out B <--L2 Trunk--> D

I don't think extending vlans from AB to CD is a good idea while AB is also aggregating AB vlans. This is hard to scale in my point of view.

You can leave the B <--L2 Trunk--> D to extend the vlan, however, traffic flow will need to be well planned to avoid unpredictable outcome.

Your solution sounds great.

At the same time i have couple of vlan like voice and device management vlan that span over the core switch.

If I consider your solution, do you have ways out to streamline the flow of traffic in those VLAN that spans across the switch.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Innovations in Cisco Full Stack Observability - A new webinar from Cisco