Skip to main content

Rapid Spanning Tree Protocol (RSTP)


The Rapid Spanning Tree Protocol (RSTP) is an optimized version of STP. RSTP allows a newly elected root port or designated port to enter the forwarding state much quicker under certain conditions than in STP, hence quicker network convergence.
Although RSTP allows quicker network convergence, it has the same drawback as STP does: All bridges within a LAN share the same spanning tree, so redundant links cannot be blocked based on VLAN and the packets of all VLANs are forwarded along the same spanning tree.

Network Diagram

Figure 1 Network diagram for RSTP configuration


Networking and Configuration Requirements

1)        Switch A at the core layer.
Configure it as the root bridge.
2)        Switch B and Switch C at the distribution layer.
l          Configure Switch C as the standby switch of Switch B. When Switch B fails, Switch C automatically takes over to forward data.
l          Configure two links between Switch C and Switch B, ensuring one link is available when the other fails.
3)        Switch D, Switch E, and Switch F at the access layer.
l          User PCs are connected to Switch D, Switch E, and Switch F.
l          Connect Switch D, Switch E, Switch F to Switch C and Switch B.
Only RSTP-related configurations are provided in the sample configuration. In addition, as the RSTP configurations on Switch D through Switch F are basically the same, only those on Switch D are provided.

Configuration Example

1)        Configuration on Switch A
#
stp mode rstp
stp instance 0 priority 0
(stp instance 0 root primary)
stp TC-protection enable
stp enable
#
interface GigabitEthernet2/0/1
 stp root-portection
#
interface GigabitEthernet2/0/2
 stp root-portection
#
interface GigabitEthernet2/0/4
 stp disable
2)        Configuration on Switch B
#
stp mode rstp
stp instance 0 priority 4096
stp enable
#
interface Ethernet1/0/4
 stp root-portection
#
interface Ethernet1/0/5
 stp root-portection
#
interface Ethernet1/0/6
 stp root-portection
#
interface Ethernet1/0/8
 stp disable
3)        Configuration on Switch C
#
stp mode rstp
stp instance 0 priority 8192
stp enable
#
interface Ethernet1/0/1
 stp root-portection
#
interface Ethernet1/0/2
 stp root-portection
#
interface Ethernet1/0/3
 stp root-portection
#
interface Ethernet1/0/8
 stp disable
4)        Configuration on Switch D
#
stp mode rstp
stp enable
#
interface Ethernet1/0/3
 stp disable
 interface Ethernet3/0/5
 stp edged-port enable
 stp bpdu-portection

Configuration Guidelines

To change the STP mode between STP, RSPT, or MSTP, use the stp mode command. By default, an MSTP-enabled device works in MSTP mode.

Comments

Popular posts from this blog

INSTALL CISCO VPN CLIENT ON WINDOWS 10 (32 & 64 BIT). FIX REASON 442

This article shows how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘ This app can’t run on this PC ’ installation error , plus fix the Reason 442: Failed to enable Virtual Adapter error message . The article applies to New Windows 10 installations or Upgrades from earlier Windows versions and all versions before or after Windows 10 build 1511 .  To simplify the article, we’ve broken it into the following two sections: How to Install Cisco VPN client on Windows 10 (clean installation or upgrade from previous Windows), including Windows 10 build prior or after build 1511 . How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10 Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10 HOW TO INSTALL CISCO VPN CLIENT ON WINDOWS 10 (NEW INSTALLATIONS OR O/S UPGRADES) The instructions below are for new or clean Windows 10 inst...

Linux File and Directory Permissions

file & directory protection is a essential of any OS and Linux OS is no exception for it! These authorizations allow you to choose exactly who can access your files & directory, providing an overall improved system security. There was one of the major flaws in the older Windows operating-system where, by standard, all users can see each other people's information (Windows 95, 98, Me). For overcoming it, editions of the Windows based computer system such as NT, 2000, XP and 2003 lot more security features added. They fully support file & directory permissions, just as Linux system has since the beginning. Together, we'll now assess a directory listing from our Lab Linux system hosting server, to help us understand the information provided. a simple 'ls' command will give you the file and directory listing within a given directory, including the option  '-l' will display number of new areas that we are going to discuss here:

How to create a Hirens Boot CD 15.2 USB Disk

Hiren’s BootCD (HBCD) is a bootable CD that contains a set of tools that can help users to fix their computer if their system fails to boot. More specifically, HBCD contains hardware diagnostic programs, partition tools, data recovery utilities, antivirus tools and many other tools to fix your computer problems.  I write this article because I use Hiren’s BootCD frequently to troubleshoot computer problems, specially when a computer doesn’t boot anymore due to a virus attack or due to a corrupted file system. In this article you will find instructions on how to put Hiren’s BootCD on a USB flash drive (stick) in order to troubleshoot computer problems in the future.