Scenario: 400 user LAN (30 VLANs - L2 througout - L3 routing at the core) with about 30% of the users having small 5-port gig switches because they must run 3-4 machines. Physically we can only deliver 2 ports/user and each user has a Cisco IP phone. Current policy allows end-users to use these small switches in their offices.
Question: Is the following config safe to use globally on our access switches (3750G L2 running 12.37.SE1)?
Thanks for reviewing Edison. I wanted a second opinion. We ran BPDU guard and loop detection tests by using multilpe hubs and switches and looping them back into the network. Switches and RSPT handled the loop detection and port err_disablement perfectly. The network didn't skip a beat.
If i understand you correctly then yes portfast is the equivalent of an "edge" port in RSTP. However you still need to use portfast keyword ie. from Cisco doc
The edge port concept is already well known to Cisco spanning tree users, as it basically corresponds to the PortFast feature. All ports directly connected to end stations cannot create bridging loops in the network. Therefore, the edge port directly transitions to the forwarding state, and skips the listening and learning stages. Neither edge ports or PortFast enabled ports generate topology changes when the link toggles. Unlike PortFast, an edge port that receives a BPDU immediately loses edge port status and becomes a normal spanning tree port. At this point, there is a user-configured value and an operational value for the edge port state. The Cisco implementation maintains that the PortFast keyword be used for edge port configuration. This makes the transition to RSTP simpler.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...