I'm not sure what your question is here exactly. However I will respond since there does appear to be a lack of other responses.
When it comes to maintenance that could potentially cause impact to users, I always wait until the weekend. If the current problem, that instigated the need for maintenance, is currently causing downtime for users, then yes by all means get it fixed ASAP.
I recommend MST (Multiple Spanning Tree) providing the switch supports it - interoperable, backwards compatible and of course, has the obvious benefit of being able to partition vlans into separate domains. Before the IEEE published a Spanning Tree Protocol standard for VLANs a number of vendors who sold VLAN capable switches developed their own Spanning Tree Protocol versions that were VLAN capable. Cisco developed, implemented and published the Per-VLAN Spanning Tree (PVST) proprietary protocol using its own proprietary Inter-Switch Link (ISL. Spanning tree is used to ensure a loop-free topology over the LAN. Occasionally a hardware or software failure can cause STP to fail, creating STP/ forwarding loops that can cause network failures where unidirectional links are used. The non-designated port transitions in a faulty manner because the port is no longer receiving STP BPDUs. STP (Spanning Tree Protocol) automatically removes layer 2 switching loops by shutting down the redundant links. A redundant link is an additional link between two switches. A redundant link is usually created for backup purposes. Just like every coin has two sides, a redundant link, along with several advantages, has some disadvantages. Every switch taking part in spanning tree has a bridge priority. The switch with the lowest priority becomes the root bridge. If there's a tie, then the switch with the lowest bridge ID number wins. The ID number is typically derived from a MAC address on the switch.
Hp Switch Spanning Tree Best Practices
There are a few things to really focus on with spanning tree. Make sure you set switch priorities. Determine if you need to utilize portfast functionality. Determine your path costs. There are more things to think about but those are some of the basics.
Take a look here for more info: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-5.html
I'm not sure if this answers your questions or not. Hope it does.
BPDU protection is a security feature designed to protect the active STP topology by preventing spoofed BPDU packets from entering the STP domain. In a typical implementation, BPDU protection would be applied to edge ports connected to end user devices that do not run STP. If STP BPDU packets are received on a protected port, the feature will disable that port and alert the network manager via an SNMP trap as shown in BPDU protection enabled at the network edge.
BPDU protection enabled at the network edge
The following commands allow you to configure BPDU protection on VLANs for which the port is a member. Kush do te behet milioner mjellma luaj.
Syntax:
[no] spanning-tree
bpdu-protection
Enables/disables the BPDU protection feature on a port.
Default: Disabled.
Syntax:
[no] spanning-tree
bpdu-protection-timeout
Wondershare filmora product key. Configures the duration of time when protected ports receiving unauthorized BPDUs will remain disabled. The default value of 0 (zero) sets an infinite timeout (that is, ports that are disabled by bpdu-protection
are not, by default, re-enabled automatically).
Default: 0
Range: 0 - 65535 seconds
For an example of using this command, see Re-enabling a port blocked by BPDU protection.
Syntax:
Enables/disables the sending of errant BPDU traps.
CAUTION: This command should only be used to guard edge ports that are not expected to participate in STP operations. Once BPDU protection is enabled, it will disable the port as soon as any BPDU packet is received on that interface. |
Syntax:
Spanning Tree Hp Aruba Switch
When it comes to maintenance that could potentially cause impact to users, I always wait until the weekend. If the current problem, that instigated the need for maintenance, is currently causing downtime for users, then yes by all means get it fixed ASAP.
I recommend MST (Multiple Spanning Tree) providing the switch supports it - interoperable, backwards compatible and of course, has the obvious benefit of being able to partition vlans into separate domains. Before the IEEE published a Spanning Tree Protocol standard for VLANs a number of vendors who sold VLAN capable switches developed their own Spanning Tree Protocol versions that were VLAN capable. Cisco developed, implemented and published the Per-VLAN Spanning Tree (PVST) proprietary protocol using its own proprietary Inter-Switch Link (ISL. Spanning tree is used to ensure a loop-free topology over the LAN. Occasionally a hardware or software failure can cause STP to fail, creating STP/ forwarding loops that can cause network failures where unidirectional links are used. The non-designated port transitions in a faulty manner because the port is no longer receiving STP BPDUs. STP (Spanning Tree Protocol) automatically removes layer 2 switching loops by shutting down the redundant links. A redundant link is an additional link between two switches. A redundant link is usually created for backup purposes. Just like every coin has two sides, a redundant link, along with several advantages, has some disadvantages. Every switch taking part in spanning tree has a bridge priority. The switch with the lowest priority becomes the root bridge. If there's a tie, then the switch with the lowest bridge ID number wins. The ID number is typically derived from a MAC address on the switch.
Hp Switch Spanning Tree Best Practices
There are a few things to really focus on with spanning tree. Make sure you set switch priorities. Determine if you need to utilize portfast functionality. Determine your path costs. There are more things to think about but those are some of the basics.
Take a look here for more info: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-5.html
I'm not sure if this answers your questions or not. Hope it does.
BPDU protection is a security feature designed to protect the active STP topology by preventing spoofed BPDU packets from entering the STP domain. In a typical implementation, BPDU protection would be applied to edge ports connected to end user devices that do not run STP. If STP BPDU packets are received on a protected port, the feature will disable that port and alert the network manager via an SNMP trap as shown in BPDU protection enabled at the network edge.
BPDU protection enabled at the network edge
The following commands allow you to configure BPDU protection on VLANs for which the port is a member. Kush do te behet milioner mjellma luaj.
Syntax:
[no] spanning-tree
bpdu-protection
Enables/disables the BPDU protection feature on a port.
Default: Disabled.
Syntax:
[no] spanning-tree
bpdu-protection-timeout
Wondershare filmora product key. Configures the duration of time when protected ports receiving unauthorized BPDUs will remain disabled. The default value of 0 (zero) sets an infinite timeout (that is, ports that are disabled by bpdu-protection
are not, by default, re-enabled automatically).
Default: 0
Range: 0 - 65535 seconds
For an example of using this command, see Re-enabling a port blocked by BPDU protection.
Syntax:
Enables/disables the sending of errant BPDU traps.
CAUTION: This command should only be used to guard edge ports that are not expected to participate in STP operations. Once BPDU protection is enabled, it will disable the port as soon as any BPDU packet is received on that interface. |
Syntax:
Spanning Tree Hp Aruba Switch
show spanning-tree bpdu-protection
Displays a summary listing of ports with BPDU protection enabled. To display detailed per-port status information, enter the specific port number(s). BPDU protected ports are displayed as separate entries of the spanning tree category within the configuration file.
Displaying BPDU protection status for specific ports
Ports disabled by BPDU Protection remain disabled unless BPDU Protection is removed from the switch or by configuring a nonzero BPDU protection timeout. For example, if you want to re-enable protected ports 60 seconds after receiving a BPDU, you would use this command: