[c-nsp] REP

Rubens Kuhl Jr. rubensk at gmail.com
Wed Jul 23 12:16:51 EDT 2008


On Wed, Jul 23, 2008 at 11:54 AM, Phil Mayers <p.mayers at imperial.ac.uk> wrote:
>> <list of points why STP shouldn't interact>
>
> ...the key thing being "should not", rather than "will not". Using an
> entirely different protocol protects to a degree against human or machine
> error e.g. forgetting the bpduguard config.

I agree. It's an extra protection that doesn't hurt... but I prefer to
do bpudfilter, as the customer won't interfere with our STP and
vice-versa. spanning-tree portfast bpdufilter default (or something
like that) is a good tool do impose that beyond normal human error
(forgetting to insert a command) but not advanced human error
(configuring a customer interface as a backbone interface, for
instance).


>> I have never seen the point in more STP-like protocols when you can
>> configure 802.1w or 1s w/ 1w to converge just as quickly with uniform
>> support on all platforms to boot.  EAPS does not offer any benefits and in
>> fact it offer serious limitations thanks to its infancy.  Every vendor has
>> interpreted RFC 3619 differently since it was published nearly 5 years ago.
>>  For example Pannaway supports EAPS but their implementation is limited to
>> not allowing EAPS rings to cross VLANs. That's a serious design limitation.
>
> We've tuned metro rings for 100ms convergence. I've *never* seen STP come
> anywhere even close to that, and I frankly doubt it has the capability.

It hasn't, and we discovered that the bad way, with a loop that took
us a painful downtime.  And that's why we are looking at non-standard
ring protocols, not because our customers also use STP.

One point that could be argued, is what would be the performance of
Rapid PVST+ or their IEEE counterparts on a ring-only topology.

> 802.1s is (IMNSHO) a bad joke. There are topologies where it's not just
> worse than PVST, it's actively harmful. This would be significantly
> alleviated if:


>  * Cisco could run >1 MST "process"
>  * 802.1s had some way of versioning the config, as opposed to breaking the
> 802.1s domain into pieces every time you update the config (or mandating you
> decide on vlan->instance mappings on day 0 and never change it - yeah,
> right...)

We tried to migrate to MST, but just couldn't find a way to migrate
gradually from Rapid PVST+.


> EAPS (and Foundry MRP) aren't universal solutions, but correctly applied
> they bring significant benefits in my experience.

Also in the market, Allied Telesis has EPSR or something like that. It
would be a Good Thing if all those Ethernet ring protocols were
replaced by a standard one, but that doesn't prevent a network from
running different rings with different vendors, as they all provide
similar performance.

> When you say L2VPN, you mean point-to-point? What about multipoint e.g.
> VPLS? It's difficult to see how you could avoid MAC learning in a multipoint
> case.
>
> ...which is one reason I prefer L3VPNs, but there's a market for L2VPN.

I second that.

Rubens


More information about the cisco-nsp mailing list