Can you describe what is the meaning of the statement below:-
If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VLAN 2 then there is no blocking port in the VLAN 2 topology. The BPDU of VLAN 2 never makes a âfull circleâ around the topology; it is replaced by the VLAN 1 BPDU on the B-C link, because B runs only one STP merged with VLAN 1 STP of PVST+. Thus, there is a forwarding loop. Fortunately, switch A sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by switch B) towards switch C. Switch C will put port C-B into a type-inconsistent state, which prevents the loop.
1) Why the BPDU of the root VLAN 1 is better?
2)Why The BPDU of VLAN 2 never makes a âfull circleâ around the topology; it is replaced by the VLAN 1 BPDU on the B-C link, because B runs only one STP merged with VLAN 1 STP of PVST+?
3)In what condition switch A sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by switch B) towards switch C. Switch C will put port C-B into a type-inconsistent state, which prevents the loop.
Re: STP of PVST+ merges with STP of IEEE 802.1D or 802.1Q
the example use a specially built scenario.
Switch B is only capable of 802.1D STP and has a single instance STP running over Vlan1.
Switch A and Switch C are Cisco switches that implement PVST+.
But there is an important difference:
the link between switch A and switch B is a 802.1Q trunk, the link between switch C and switch B is an access port in Vlan 2.
Switch C will send out of port to Switch B 802.1D standard BPDUs not cisco proprietary STP.
This implies that Switch B will understand these messages.
On the other side Switch A detects the presence of a legacy switch over an 802.1Q trunk. It will use standard STP 802.1D frames over native vlan 1 and will use PVST+ proprietary frames :
are sent to the PVST+ MAC address (also called the Shared Spanning Tree Protocol [SSTP] MAC address, 0100.0ccc.cccd), tagged with a corresponding IEEE 802.1Q VLAN tag.
Switch B treats Cisco PVST+ frames as user multicast traffic and will propagate out port to Switch C the ones that are related to vlan 2.
Switch C will receive PVST+ frames for vlan-id 2 over an access port.
Switch B will merge vlan 1 and vlan 2 topologies because it is receiving on both links standard 802.1D BPDUs that it can understand and compare.
So if Vlan1 root bridge (Switch A) has a lower BID then Switch C in vlan2 SwitchB will send out port to C switch the best BPDU (the one received from SWA) and as an end result the BPDU sent by SwitchC stops there.
But switchC by receiving PVST+ frames over the link (they are multicast traffic for switch B) can put the link in inconsistent state cutting the loop.
1) they are making an hypothesis that SWA BID in vlan 1 (priority+ mac address) is lower then SWC BID in Vlan2.
you can build this using the PVST+ commands like
spanning-tree priority vlan 1 8192
spanning-tree priotity vlan 2 16394
this puts in the conditions
2) explained above:
actually without inconsistency checking Switch C would move the port to Switch B as its root port and would stop to claim to be the root bridge for vlan 2 and so it will go to only listen to better BPDUs on link B to C.
For the incosistency check the link is blocked for vlan2.
3) automatically on an 802.1Q trunk non native vlan BPDUs (for each allowed VLans on trunk and in STP forwarding state) SSTP using Cisco proprietary frames are used even betweeen two Cisco switches
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...