Share this
Configuration Guide: STP Extension in Cisco NX-OS
by Hunter Gorman on Aug 6, 2020 1:45:00 PM
Three key advantages in your data center are built around architectural flexibility, operational simplicity, and end-to-end visibility. The Cisco NX-OS is designed for each of these three advantages, helping your network operations move at the same speed as your business operations. Today we'll focus on the configuration of this Cisco Software for your mission-critical data center environments.
Cisco NX-OS has added expansions to the Spanning Tree Protocol (STP) that make assembly increasingly proficient. Now and again, despite the fact that comparable usefulness might be fused into the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) standard, we prescribe utilizing these expansions. These expansions can be utilized with both RPVST+ and MST with available extensions including spanning-tree port types: Bridge Assurance, BPDU Guard, BPDU Filtering, Loop Guard, and Root Guard. Many of these features can be applied either globally or on specified interfaces.
Download the guide and refer back to it at any time!
Understanding STP Port Types
You can arrange a spreading over tree port as an edge port, a system port, or a typical port. A port can be in just one of these states at a given time. The default crossing tree port sort is typical. Contingent upon the kind of gadget to which the interface is associated, you can design spreading over tree port as one of these port sorts.
- STP Edge ports
- STP Networks ports
- STP Normal ports
Spanning Tree Edge Ports
Edge ports, which are connected to hosts, can be either an access port or a trunk port. The edge port interface immediately transitions to the forwarding state, without moving through the blocking or learning states.
Spanning Tree Network Ports
Network ports are connected only to switches or bridges. Bridge Assurance is enabled only on network ports.
Spanning Tree Normal Ports
Normal ports can be connected to either hosts, switches, or bridges. These ports function as normal spanning-tree ports.
STP Extensions Configuration Guidelines
When configuring STP extensions, follow these guidelines:
- Configure all access and trunk ports connected to hosts as edge ports.
- Bridge Assurance runs only on point-to-point spanning-tree network ports. You must configure each side of the link for this feature.
- Loop Guard does not run on spanning-tree edge ports.
- Enabling Loop Guard on ports that are not connected to a point-to-point link will not work.
- You cannot enable Loop Guard if Root Guard is enabled.
Before we get started with the specific configurations, ask yourself a couple of questions:
- Do I have the time to handle configurations?
- Do I have the bandwidth to configure my devices?
If you answered "No" to these questions, consider PivIT's SmartHands through EXTEND. Hire an engineer to take on these basic configurations and more. Click below to learn more about SmartHands.
Configuration of spanning-tree port type
Command | Purpose | |
Step 1 | PivIT-Global(Config)# configure terminal |
Enters configuration mode. |
Step 2 | PivIT-Global(Config)# spanning-tree port type edge default |
Configures all interfaces as edge ports. It assumes all ports are connected to hosts/servers. |
PivIT-Global(Config)# spanning-tree port type network default |
Configures all interfaces as spanning-tree network ports. It assumes all ports are connected to switches and bridges. |
Configuration of spanning-tree port edge in the interface
Here will design the edge port at the interface level with the goal that the port comes up rapidly. It is prescribed to use in host conditions and it could be an access or trunk port. On this port we won't get BPDU so in this respect there will be no spanning circles can make. Design is hereunder
Command | Purpose | |
Step 1 | PivIT-Global# configure terminal |
Enters configuration mode. |
Step 2 | PivIT-Global(Config)# interface type slot/port |
Specifies the interface to configure, and enters the interface configuration mode. |
Step 3 | PivIT-Global(Config-if)spanning-tree port type edge |
Configures the specified access interfaces to be spanning edge ports. Edge ports immediately transition to the forwarding state without passing through the blocking or learning state at linkup. By default, spanning tree ports are normal port types. |
Configuration of the spanning-tree port network in the interface
Command | Purpose | |
Step 1 | PivIT-Global# configure terminal |
Enters configuration mode. |
Step 2 | PivIT-Global(Config)# interface type slot/port |
Specifies the interface to configure, and enters the interface configuration mode. The interface can be a physical Ethernet port. |
Step 3 | PivIT-Global(Config-if)spanning-tree port type network |
Configures the specified interfaces to be spanning network ports. If you enable Bridge Assurance, it automatically runs on network ports. By default, spanning tree ports are normal port types. |
Configuration of BPDU Guard in the interface
Command | Purpose | |
Step 1 | PivIT-Global# configure terminal |
Enters configuration mode. |
Step 2 | PivIT-Global(Config)# interface type slot/port |
Specifies the interface to configure, and enters the interface configuration mode. |
Step 3 | PivIT-Global(Config) # spanning-tree bpduguard { enable | disable } |
Configures the specified access interfaces to be spanning edge ports. Edge ports immediately transition to the forwarding state without passing through the blocking or learning state at linkup. By default, spanning tree ports are normal port types. |
About the Tech Corner
Leave a comment, question, or concern below. We created the Tech Corner to connect with you on Configuration Guides like today's, product discussions, product comparisons, and provide you with information about the industry! Subscribe to the Tech Corner today!
Share this
- Configuration Guides (47)
- Cisco Routers (29)
- Switches (27)
- Network Security (23)
- Cisco Switches (21)
- Routing Protocols (21)
- Routers (20)
- Cisco (19)
- Product Comparisons (19)
- Firewall (18)
- Cisco Security (17)
- Cisco Technical Information (17)
- IT Hardware Solutions (17)
- Network Protocols (17)
- Wireless (17)
- Security (15)
- OneCall (13)
- Servers (12)
- cisco asa (12)
- Cisco Wireless (11)
- Router Protocols (11)
- Cisco Catalyst (9)
- Cisco UCS (9)
- Upgrading Network (9)
- Cisco Servers (8)
- Product Highlight (8)
- Access Control Lists (7)
- Fortinet (7)
- Server Comparisons (7)
- Access Points (6)
- Arista Networks (6)
- OSPF (6)
- Wireless APs (6)
- Cisco ASR (5)
- Cloud Solutions (5)
- HPE-Aruba Wireless (5)
- Juniper Mist (5)
- Network Management (5)
- SD-WAN (5)
- Storage (5)
- Switch Comparison (5)
- Back To Basics (4)
- Cybersecurity (4)
- EIGRP (4)
- Firewall Architecture (4)
- HSRP (4)
- Juniper Networks (4)
- Network Automation (4)
- Network Servers (4)
- OEM Comparison (4)
- Aruba Central (3)
- Cisco Telephony (3)
- DHCP (3)
- DHCP Snooping (3)
- Dell EMC PowerEdge (3)
- Internet (3)
- Maintenance (3)
- Maintenance Renewal (3)
- Network Accessories (3)
- TPM (3)
- Telephony (3)
- aruba (3)
- Cisco NX-OS (2)
- Cisco Nexus (2)
- Dell Servers (2)
- Fortinet NGFWs (2)
- IT Trends (2)
- LAN Networks (2)
- Network Time Protocol (2)
- Palo Alto NGFWs (2)
- Rapid PVST+ (2)
- Remote Configuration (2)
- Software Defined Networking (2)
- WLAN (2)
- Ways to Save (2)
- fortigate (2)
- Asset Management (1)
- CPU Usage (1)
- Cisco AIR-CT (1)
- Cisco Aironet (1)
- Cisco DNA (1)
- Cisco ISR (1)
- Cisco Supervisor Engines (1)
- Cisco UCS Manager (1)
- Cognitive Campus (1)
- Cost of Downtime (1)
- Dell EMC Data Domain (1)
- Edge Switches (1)
- Fabric Extenders (1)
- GRE Tunnel (1)
- HPE BL (1)
- Juniper SRX (1)
- Nexus Switches (1)
- Nutanix (1)
- Optics (1)
- PowerEdge R740xd (1)
- STP Extension (1)
- Sparing Integrity Program (1)
- Switched Virtual Interface (1)
- TCP (1)
- UCS Fabric Interconnects (1)
- hyperconverge (1)
- April 2024 (2)
- March 2024 (1)
- February 2024 (2)
- January 2024 (1)
- December 2023 (1)
- November 2023 (2)
- October 2023 (1)
- September 2023 (3)
- August 2023 (5)
- July 2023 (2)
- June 2023 (4)
- May 2023 (5)
- April 2023 (8)
- March 2023 (7)
- February 2023 (5)
- January 2023 (2)
- December 2022 (3)
- November 2022 (3)
- October 2022 (8)
- September 2022 (9)
- August 2022 (9)
- July 2022 (8)
- June 2022 (9)
- May 2022 (5)
- April 2022 (3)
- March 2022 (1)
- February 2022 (2)
- November 2021 (2)
- October 2021 (1)
- September 2021 (2)
- August 2021 (2)
- July 2021 (3)
- June 2021 (2)
- May 2021 (4)
- April 2021 (4)
- March 2021 (2)
- February 2021 (1)
- January 2021 (2)
- December 2020 (2)
- November 2020 (2)
- October 2020 (2)
- September 2020 (2)
- August 2020 (4)
- July 2020 (5)
- June 2020 (4)
- May 2020 (6)
- April 2020 (2)
- March 2020 (1)
- February 2020 (2)
- January 2020 (2)
- December 2019 (1)
- May 2019 (2)
- April 2019 (5)
- February 2019 (1)
- January 2019 (3)
- December 2018 (1)
No Comments Yet
Let us know what you think