spanning tree protocol
spanning tree protocol
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Spanning Tree Protocol
Fundamentals
• Spanning Tree Protocol (STP) enables switches to become aware of other switches
through the advertisement and receipt of bridge protocol data units (BPDUs).
• STP operates by selecting a master switch and running a tree-based algorithm to
identify which redundant ports should not forward traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Spanning Tree Protocol Fundamentals
Spanning Tree Versions
STP has multiple iterations:
• 802.1D, which is the original specification
• Per-VLAN Spanning Tree (PVST)
• Per-VLAN Spanning Tree Plus (PVST+)
• 802.1W Rapid Spanning Tree Protocol (RSTP)
• 802.1S Multiple Spanning Tree Protocol (MST)
Note: Catalyst switches now operate in PVST+, RSTP, and MST modes.
All three of these modes are backward compatible with 802.1D.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Spanning Tree Protocol Fundamentals
IEEE 802.1D STP Port States
Every port transitions through the following states:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Spanning Tree Protocol Fundamentals
STP Key Terminology
Terms Description
Root Bridge The most important switch. All ports are in a forwarding state and are
categorized as designated ports.
Bridge protocol data Used to identify a hierarchy and notify of changes in the topology
unit (BPDU) There are two types of BPDUs: configuration BPDU and topology
change notification BPDU.
Configuration BPDU Used to identify the root bridge, root, designated, and blocking ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Spanning Tree Protocol Fundamentals
STP Key Terminology (Cont.)
Terms Description
System priority This 4-bit value indicates the preference for a switch to be root
bridge. The default value is 32,768.
System ID extension This 12-bit value indicates the VLAN that the BPDU correlates.
Root bridge identifier This is a combination of the root bridge system MAC address,
system ID extension, and system priority of the root bridge.
Local bridge identifier This is a combination of the local switch’s bridge system MAC
address, system ID extension, and system priority of the root bridge.
Max age Maximum length of time that passes before a bridge port saves its
BPDU information. The default value is 20 seconds.
Hello time The time that a BPDU is advertised out of a port. The default value
is 2 seconds, but the value can be configured to 1 to 10 seconds.
Forward delay The amount of time that a port stays in a listening and learning
state. The default value is 15 seconds.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Spanning Tree Protocol Fundamentals
STP Path Cost
• The root path is found based on Link Speed Short-Mode Long-Mode STP Cost
the cumulative interface STP cost STP Cost
to reach the root bridge.
10 Mbps 100 2,000,000
• The interface STP cost was
originally stored as a 16-bit value 100 Mbps 19 200,000
with a reference value of 20 1 Gbps 4 20,000
Gbps.
10 Gbps 2 2,000
• Another method, called long
20 Gbps 1 1,000
mode, uses a 32-bit value and
uses a reference speed of 20 100 Gbps 1 200
Tbps.
1 Tbps 1 20
• The original method, known as
short mode, is the default mode. 10 Tbps 1 2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Spanning Tree Protocol Fundamentals
Building the STP Topology
• This section focuses on
the logic switches use to
build an STP topology.
• The focus is on VLAN 1,
but VLANs 10, 20, and 99
also exist.
• SW1 has been identified
as the root bridge, and the
RP, DP, and blocking ports
have been identified.
.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Spanning Tree Protocol Fundamentals
Root Bridge Election
The first step with STP is to identify the root bridge.
As a switch initializes, it assumes that it is the root bridge and uses the local bridge
identifier as the root bridge identifier.
It then listens to its neighbor’s configuration BPDU and does the following:
• If the neighbor’s configuration BPDU is inferior to its own BPDU, the switch ignores that
BPDU.
• If the neighbor’s configuration BPDU is preferred to its own BPDU, the switch updates its
BPDUs to include the new root bridge identifier along with a new root path cost that
correlates to the total path cost to reach the new root bridge.
• This process continues until all switches in a topology have identified the root bridge
switch.
• STP prefers lower priority number then goes to lower MAC address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Spanning Tree Protocol Fundamentals
STP Root Path Costs
• The advertised root path cost is
always the value calculated on
the local switch.
• The local root path cost is the
advertised root path cost plus
the local interface port cost.
• The root path cost is always
zero on the root bridge.
• Figure 2-2 illustrates the root
path cost as SW1 advertises
the configuration BPDUs
toward SW3 and then SW3’s
configuration BPDUs toward
SW5.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
.
Spanning Tree Protocol Fundamentals
Locating Root Ports
Once the Root Bridge is found, the switch must determine its Root Port.
The RP is selected using the following logic:
1. The interface associated to lowest path cost is more preferred.
2. The interface associated to the lowest system priority of the advertising switch is
preferred next.
3. The interface associated to the lowest system MAC address of the advertising switch is
preferred next.
4. When multiple links are associated to the same switch, the lowest port priority from the
advertising switch is preferred.
5. When multiple links are associated to the same switch, the lower port number from the
advertising switch is preferred.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Spanning Tree Protocol Fundamentals
Locating Root Ports Verified
Use the show spanning-tree root command to verify the Root ID and the Root Port.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Spanning Tree Protocol Fundamentals
Locating Blocked Designated Switch Ports
The RPs have been identified and all other ports are considered designated ports. If two
non-root switches are connected to each other on their designated ports, one port must be set
to a blocking state to prevent a forwarding loop. Calculate which ports should be blocked
between two non-root switches:
1. The interface is a designated port and must not be considered an RP.
2. The switch with the lower path cost to the root bridge forwards, and the one with the higher path
cost blocks. If they tie, they move on to the next step.
3. The system priority of the local switch is compared to the system priority of the remote switch.
The local port is moved to a blocking state if the remote system priority is lower than that of the
local switch. If they tie, they move on to the next step.
4. The system MAC address of the local switch is compared to the system priority of the remote
switch. The local designated port is moved to a blocking state if the remote system MAC address
is lower than that of the local switch. If the links are connected to the same switch, they move on
to the next step.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Spanning Tree Protocol Fundamentals
Viewing STP Information
These port types are expected on
Catalyst switches:
Point-to-point (P2P) - This port
type connects with another
network device (PC or RSTP
switch).
P2P edge -This port type specifies
that portfast is enabled on this
port.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Spanning Tree Protocol Fundamentals
Viewing STP Information
Verify Cost and Root Ports with the
show spanning-tree vlan 1
command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Spanning Tree Protocol Fundamentals
Verify VLAN Information on a Trunk
If a VLAN is missing on a trunk
port, check the trunk port
configuration for accuracy.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Spanning Tree Protocol Fundamentals
STP Topology Changes
BPDUs always flow from the root bridge toward the edge switches, unless there are changes in
the topology.
• The switch that detects a link status change sends a topology change notification (TCN)
BPDU toward the root bridge out of its RP.
• If an upstream switch receives the TCN, it sends out an acknowledgment and forwards the
TCN out its RP to the root bridge.
• Upon receipt of the TCN, the root bridge creates a new configuration BPDU with the Topology
Change flag set, and it is then flooded to all the switches.
• When switches receive this, they set their MAC address timer to a default 15 seconds. Then
the device flushes its MAC table if has not heard from a device in that last 15 seconds.
• TCNs are generated on a VLAN basis, so the impact of TCNs directly correlates to the
number of hosts in a VLAN.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Spanning Tree Protocol Fundamentals
Verify STP Topology Changes
Use the show spanning-tree vlan # detail command to see topology changes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Spanning Tree Protocol Fundamentals
Converging with Direct Link Failures
When a switch loses power or reboots, or when a cable is removed from a port, the Layer 1
signaling places the port into a down state, which can notify other processes, such as STP.
STP considers such an event a direct link failure and can react in one of three ways:
• The link between SW2 and SW3 fails. If the link is already blocking there is no impact to
traffic between the two switches as they both transmit data through SW1. Both SW2 and
SW3 will advertise a TCN toward the root switch, which results in the Layer 2 topology
flushing its MAC address table.
• The link between SW1 and SW3 fails. Network traffic from SW1 or SW2 toward SW3 is
impacted because SW3 Gi1/0/2 port is in a blocking state.
• The link between SW1 and SW2 fails. Network traffic from SW1 or SW3 toward SW2 is
impacted because SW3’s Gi1/0/2 port is in a blocking state.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Spanning Tree Protocol Fundamentals
Converging with Direct Link Failures (Cont.)
The link between SW1 and SW3 fails.
Phase 1. SW1 detects a link failure on its
Gi1/0/3 interface. SW3 detects a link failure
on its Gi1/0/1 interface.
Phase 2. Normally SW1 would generate a
TCN flag out its root port, but it is the root
bridge, so it does not. SW1 would advertise
a TCN if it were not the root bridge.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Spanning Tree Protocol Fundamentals
Converging with Direct Link Failures (Cont.)
Phase 3. SW1 advertises a configuration
BPDU with the Topology Change flag out of all
its ports. This BPDU is received and relayed to
all switches in the environment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Spanning Tree Protocol Fundamentals
Converging with Direct Link Failures (Cont.)
Phase 3. SW1 advertises a configuration
BPDU with the Topology Change flag out of
all its ports. This BPDU is then received
and relayed to SW3. SW3 cannot relay this
to SW2 as its Gi1/0/2 port is still in a
blocking state. SW2 assumes that it is now
the root bridge and advertises configuration
BPDUs with itself as the root bridge.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Spanning Tree Protocol Fundamentals
Converging with Direct Link Failures (Cont.)
Phase 5. The Max Age timer on SW3
expires, and now the Gi1/0/2 port on
SW3 transitions from blocking to
listening state. SW3 can now forward
the next configuration BPDU it receives
from SW1 to SW2.
Phase 6. SW2 receives the
configuration BPDU of SW via SW3
and recognizes it as superior. It marks
its Gi1/0/3 interface as the root port and
transitions it to the listening state.
Total convergence time for SW2 is 52
seconds.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Spanning Tree Protocol Fundamentals
Indirect Failures
STP communication between
switches is impaired or filtered while
the network link remains up. This
situation is known as an indirect link
failure, and timers are required to
detect and remediate the topology.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Spanning Tree Protocol Fundamentals
Indirect Failures (Cont.)
There is an impediment or data corruption
on the link between SW1 and SW3.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Rapid Spanning Tree Protocol
• IEEE 802.1D has only one topology tree and a slower convergence which can be
problematic.
• Rapid Spanning Tree Protocol (RSTP) IEEE 802.1W reduces the number of port states
to be faster and more efficient.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Rapid Spanning Tree Protocol
Rapid Spanning Tree Port States
IEEE 802.1D has only one topology tree which can be problematic. Larger environments with
multiple VLANs need different STP topologies for traffic engineering purposes.
• Cisco created the proprietary Per-VLAN Spanning Tree (PVST) and Per-VLAN Spanning Tree
Plus (PVST+)
• Rapid Spanning Tree Protocol (RSTP) IEEE 802.1W reduces the number of port states to three:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Rapid Spanning Tree Protocol
Building the RSTP Topology
RSTP switches exchange handshakes with other RSTP switches to transition through the
following STP states faster. They establish a bidirectional handshake across the shared link to
identify the root bridge.
The process proceeds as follows:
1. As the first two switches connect to each other, they verify that they are connected with a
point-to-point link by checking the full-duplex status.
2. They establish a handshake with each other to advertise a proposal (in configuration BPDUs)
that their interface should be the DP for that port.
3. There can be only one DP per segment, so each switch identifies whether it is the superior or
inferior switch, using the same logic as in 802.1D for the system identifier (that is, the lowest
priority and then the lowest MAC address).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Rapid Spanning Tree Protocol
Building the RSTP Topology (Cont.)
4. The inferior switch (SW2) recognizes that it is inferior and marks its local port (Gi1/0/1) as the
RP. At that same time, it moves all non-edge ports to a discarding state. At this point in time, the
switch has stopped all local switching for non-edge ports.
5. The inferior switch (SW2) sends an agreement (configuration BPDU) to the root bridge (SW1),
which signifies to the root bridge that synchronization is occurring on that switch.
6. The inferior switch (SW2) moves its RP (Gi1/0/1) to a forwarding state. The superior switch
moves its DP (Gi1/0/2) to a forwarding state, too.
7. The inferior switch (SW2) repeats the process for any downstream switches connected to it.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Prepare for the Exam
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Prepare for the Exam
Key Topics for Chapter 2
Description
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Prepare for the Exam
Key Terms for Chapter 2
Term
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Prepare for the Exam
Command Reference for Chapter 2
Task Command Syntax
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39