[c-nsp] Spanning Tree help sought

Christopher Gray Christopher.Gray at Newscope-Solutions.co.uk
Thu Nov 15 11:25:46 EST 2012


Ross,

Thank you for that:


>> I'm new to Spanning Trees and have read up on them, but need 
>> advice and guidance.  I have the manuals and can set STP up -  
>> it is design that is my concern.  My LAN is more complicated 
>> than this, but the following example will help me explain.

> Quick word of advice especially with STP - do many mockups 
> in your lab and understand how to troubleshoot it when it blows
> up. Implementing STP on an existing network can go horribly 
> wrong in a hurry

I will.  I have some old switches lying around and, while they don't support
RSTP, it will help me understand behaviour.

>> I have four switches (A, B, C & D) linked in a loop comprising
>> 1Gbps fibre.  Switch A is connected to a primary WAN router
>> while switch C is connected to the secondary WAN router - the
>> two routers working in a simple HSRP fail-over set.  I want to
>> ensure that this loop will survive the failure of any one link 
>> (e.g. if the link between A & B goes down, B will still be able
>> to connect to the primary router via C & D.

> Like this?
 
> R1--A----B
>    |    |
> R2--C----D

> Or...

> R1--A----B
>     |    |
>    D----C--R2

The second of those.

>> I currently have the STP path costs set to A=4, B=5, C=6 and D=7

> This doesn't make much sense. STP path costs are determined by 
> tallying the port costs (remember two ports per link), this happens
> for each path it sees back to the root, and if the two paths are of the
> same cost then port priority is consulted. In a basic ring it doesn't
> really matter that much, but you said your LAN is more complex 
> than this example.

On reading your response - and used the links you suggested - I note that I
could just leave everything as default and let STP sort itself out.

The core topology is that simple, but we have some core clients off switch B
and they need the best resilience / throughput.  When this was originally
set up - all links were 1Gb with the exception of C/D which was 100Mb.  I've
just upgraded C/D to 1Gb.  We plan to upgrade D/A and B/C to 10Gb - but the
other two distances are too much and will need to stay at 1Gb.  All four
switches have other switches hanging off them on long fibre links - but none
of these satellite switches are connected to more than one switch.  Only the
four core switches have two links between them (e.g. A-B or A-D-C-B).

>> Question 1: Does this make sense?  Should the "root bridge" (using 
>> Wikipedia terminology) always be the one connected to the primary 
>> WAN router? Does STP work well when the WAN uplink fails over
>> to the secondary or doesn't it matter.

> In your example, each switch can be designated as a root bridge by way 
> of priority. On newer IOS switches you can simply run "spanning tree
> vlan 9 priority root primary" or "...priority root secondary". Older units
> you just enter the number on your own. You can configure this to match
> the priorities of your routers.

> In a basic example with the 4 switches, the default behaviour will be to 
> block off the longest path back to root. In the first little diagram, B 
> would block it's link towards D. D however has two equal-length paths
> so will block whichever port is higher numbered. (lower numbered ports
> = lower numeric priority). If D's link to C is on port 1 and D's link to B
> on port 24 or whatever, this will be fine. Otherwise you need some manual
> configuration.

I will need to ponder on this.

> The better idea IMHO is to determine which link should normally see lower
> bandwidth and block that. With the first diagram, if your traffic is
primarily
> LAN stuff between B & D, I'd consider increasing port costs to block
either 
> A-C or C-D depending on how your HSRP is configured and the other
> resources lurking on your switches.

The primary router is on A.  Key, but low bandwidth, users are on B (they
generate cash for the business).  "Power" users (big spread sheets) are on
A. C & D support "normal" users.

>> The switch configurations seem to show that other ports - e.g. those 
>> connected to end-devices (printers / PCs) have an STP state of 
>> "forwarding".
>> 
>> Question 2: Should I set all non-uplink (interswitch) ports as
"disabled"?

> Bad idea. One rogue D-Link and the whole thing blows up. (or maybe just 
> that switch). Spanning Tree is pretty much mandatory anywhere near edge 
> ports where curious hands can play with cables. One problem that arises is
> that default timers in the 30s range can cause some operating systems to
> think DHCP isn't working. You can turn the timers down to address this, 
> or set portfast and enable root guard and BPDU guard.

These switches, and their patch panels) are in locked cabinets.  But people
could plug anything into the wall-ports.

I will certainly set portfast and enable root guard and BPDU guard on all
non-fibre ports.  [Fibre is only used for the inter-switch links.]

>I strongly recommend reading through some of the stuff here:

>http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a008
00951ac.shtml
>http://www.cisco.com/en/US/tech/tk389/tk621/tsd_technology_support_protocol
_home.html

Thank you.
>Cheers
>Ross



More information about the cisco-nsp mailing list