SlideShare a Scribd company logo
1 of 25
Chapter 4: Multiple Spanning
Tree Protocol
Instructor Materials
CCNP Enterprise: Core Networking
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 4 Content
This chapter covers the following content:
Multiple Spanning Tree Protocol - This section explains the advantages and
operations of Multiple Spanning Tree Protocol (MST).
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree
Protocol
• The original 802.1D standard only supported one STP instance for an entire switch
network. Which means that it was not possible to load share traffic across links by
blocking for specific VLANs on one line and blocking for other VLANS on alternate
links.
• Multiple Spanning Tree Protocol (MST) maps one or multiple VLANs to one STP
instance.
4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
CST Topology
The figure below shows a Common Spanning Tree (CST) topology. VLANs 1 - 4 share
the same topology. Traffic from SW2 to SW3 must pass through SW1. If only SW2 and
SW3 had end devices in VLAN 4, the topology could not be tuned to allow traffic to
traverse directly between the two switches.
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
PVST Topologies
Per-VLAN Spanning Tree (PVST) provides a separate spanning tree instance for each
VLAN configured on the network. The topologies below show how the switches maintain
a different STP topology for each of the four VLANs. In environments with thousands of
VLANs, maintaining an STP state for every VLAN can burden the switch’s processor.
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Topology
MST maps one or multiple VLANs into one STP tree, called an MST instance (MSTI).
The figure shows how the switches maintain STP topologies for four VLANs. If more
VLANs were added to the environment, the switches would maintain three STP
topologies if the VLANs aligned to one of the existing MSTIs.
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Region
A group of MST switches with
the same high-level
configuration is known as an
MST region. MST
incorporates mechanisms
that make an MST region
appear as a single virtual
switch to external switches.
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Instances
MST uses a special instance, instance 0, called the internal spanning tree (IST). It is
always the first instance and runs on all switch port interfaces in the MST region
regardless of the VLANs associated with the ports. Additional information about other
MSTIs is nested in the IST BPDU that is transmitted throughout the MST region. This
allows MST to advertise only one set of BPDUs, which minimizes STP traffic.
Note: Up to 16 MST instances are supported by default.
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Configuration
The following steps are used to configure MST:
Step 1. Define MST as the spanning tree protocol with the command spanning-tree mode mst
Step 2. (Optional) Define MST instance priority, using one of two methods:
• spanning-tree mode mst instance-number priority priority
• spanning-tree mode mst instance-number root {primary | secondary} [diameter
diameter]
(Note: Priority is a value between 0 and 61,440 in increments of 4096. The primary keyword
sets the priority to 24,576 and the secondary keyword sets the priority to 28,672.)
Step 3. Associate VLANs to an MST instance. By default, all VLANs are associated
to the MST 0 instance. The MST configuration sub-mode must be entered with the command
spanning-tree mst configuration. Then the VLANs are assigned to a different MST instance
with the command instance instance-number vlan vlan-id.
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Configuration (Cont.)
Step 4. Specify the MST version
number. The MST version number
must match for all switches in the
same MST region. The MST version
number is configured with the sub-
mode configuration command
revision version.
Step 5. (Optional) Define the MST
region name. MST regions are
recognized by switches that share a
common name. By default, a region
name is an empty string. The MST
region name is set with the command
name mst-region-name.
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Verification
• To verify MST use the command show
spanning-tree mst configuration.
• Relevant spanning tree information can
be obtained with the command show
spanning- tree.
• A consolidated view of the MST topology
table is displayed with the command
show spanning-tree mst [instance-
number].
• Specific MST settings are viewed for a
specific interface with the command
show spanning-tree mst interface
interface-id.
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Tuning
MST supports the tuning of port
cost and port priority.
The interface config command
spanning-tree mst instance-
number cost cost sets the
interface cost.
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Tuning (Cont.)
The interface config command
spanning-tree mst instance-
number port-priority priority sets
the interface priority.
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
Common MST Misconfigurations
There are two common misconfigurations within the MST region:
• VLAN assignment to the IST
• Trunk link pruning
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
VLAN Assignment to IST
• The IST topology may not correlate to the access
layer and might introduce a blocking port that was
not intentional.
• In the example, it appears as if traffic between PC-A
and PC-B would flow across the Gi1/0/2 interface, as
it is an access port assigned to VLAN 10. However,
all interfaces belong to the IST instance.
• SW2 must block either Gi1/0/1 or Gi1/0/2. Since SW1
is the root bridge, SW2 blocks Gi1/0/2 based on the
port identifier from SW1. Therefore, blocking the IST
instance.
• There are two solutions for this scenario:
• Move VLAN 10 to an MSTI instance other than
the IST. If you do this, the switches will build a
topology based on the links in use by that
MSTI.
• Allow the VLANs associated with the IST on all
interswitch (trunk) links.
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
Trunk Link Pruning
Pruning of VLANs on a trunk link is a common practice for load balancing. However, it is
important that pruning of VLANs does not occur for VLANs in the same MST on different
network links.
• Links between SW1 to SW2 and
SW1 to SW3 have been pruned to
help with load balancing traffic.
• After implementing the changes,
users attached to SW1 and SW3
can no longer communicate with
the servers on SW1.
• This is due to the VLANs on the
trunk links changing but not the
MSTI topology.
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Region Boundary
• An MST region boundary is any port that connects to a switch that is in a different
MST region or that connects to 802.1D or 802.1W BPDUs.
• MSTI’s never interact outside of the region and MST switches can detect PVST+
neighbors at MST region boundaries.
• Propagating CST at the MST region boundary involves a feature called PVST
simulation mechanism. It sends out PVST+ & RSTP BPDUs, one for each VLAN.
• The PVST simulation mechanism is required because PVST+/RSTP topologies do
not understand the structure of IST BPDUs.
• When the MST boundary receives the PVST+ BPDU it doesn’t map the VLAN to the
MSTI. Instead the MST boundary maps the PVST+ BPDU from VLAN 1 to the
instance. It only does this when it receives a PVST BPDU on a port.
18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Region Design Considerations
There are two design considerations when integrating an MST region with a
PVST+/RSTP environment:
• MST region as the root bridge
• MST region is not a root bridge for any VLAN
19
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Region as the Root Bridge
The MST region as the root bridge ensures that all region boundary ports flood the same
IST instance BPDU to all the VLANs in the PVST topology. This makes the IST instance
preferred over any other switch in the PVST+ topology. The MST region appears as a
single device and the PVST+ switches detect and place the alternative link into a
blocking state.
20
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multiple Spanning Tree Protocol
MST Region Not a Root Bridge for Any VLAN
• In the situation that the MST region is not a root bridge for any VLAN, the MST region
boundary ports can only block or forward for all VLANs.
• There is not an option to load balance traffic because the IST instance must remain
constant.
• If the MST switch detects a better BPDU for a specific VLAN on a boundary port, the
switch will use BPDU guard to block the port. This is called PVST simulation check and it
done to ensure a loop-free topology.
21
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prepare for the Exam
22
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prepare for the Exam
Key Topics for Chapter 4
Description
Multiple Spanning Tree Protocol
MST instance
MST region
Internal Spanning Tree (IST)
MST region boundary
23
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prepare for the Exam
Key Terms for Chapter 4
Terms
Common Spanning Tree (CST)
Internal spanning tree (IST)
MST instance (MSTI)
MST region
MST region boundary
PVST simulation check
24
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prepare for the Exam
Command Reference for Chapter 4
Task Command Syntax
Configure the switch for a basic MST region that
includes all VLANS and the version number 1
spanning-tree mode mst
spanning-tree mst configuration
instance 0 vlan 1-4094
revision 1
Modify a switch’s MSTI priority or make it the root
bridge for the MSTI
spanning-tree mst instance-number priority priority
OR
spanning-tree mst instance-number root {primary |
secondary}[diameter diameter]
Specify additional VLANs to an MSTI
spanning-tree mst configuration instance instance-number
vlan vlan-id
Change the MST version number spanning-tree mst configuration revision version
Change the port cost for a specific MSTI spanning-tree mst instance-number cost cost
Change the port priority for a specific MSTI spanning-tree mst instance-number port- priority priority
Display the MST configuration show spanning-tree mst configuration
Verify the MST switch status show spanning-tree mst [instance-number]
View the STP topology for the MST show spanning-tree mst interface interface-id
ENCOR_Capitulo 4.pptx

More Related Content

Similar to ENCOR_Capitulo 4.pptx

CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3Chaing Ravuth
 
ccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxGiyaShefin
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.igede tirtanata
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolRafat Khandaker
 
Cluster control protocol_reference
Cluster control protocol_referenceCluster control protocol_reference
Cluster control protocol_referenceSwarup Hait
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteActionPacked Networks
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfBuntha Chhay
 
SRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptxSRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptxSaqibAli696638
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANSanilinvns
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsMike McLain
 
Virtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptxVirtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptxmarunkumareee77
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2Juli Yaret
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answerNarayana Samy
 
Chapter 14 : vlan
Chapter 14 : vlanChapter 14 : vlan
Chapter 14 : vlanteknetir
 

Similar to ENCOR_Capitulo 4.pptx (20)

CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
ccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptx
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Cluster control protocol_reference
Cluster control protocol_referenceCluster control protocol_reference
Cluster control protocol_reference
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
LiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application NoteLiveAction Spanning Tree Protocol (STP) Application Note
LiveAction Spanning Tree Protocol (STP) Application Note
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdf
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
 
SRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptxSRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptx
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
Virtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptxVirtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptx
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
Chapter 14 : vlan
Chapter 14 : vlanChapter 14 : vlan
Chapter 14 : vlan
 
Chapter 03 - VLANs
Chapter 03 - VLANsChapter 03 - VLANs
Chapter 03 - VLANs
 

More from ManuelRojas960410

Clasificación de las Competencias en la Virtualidad.pptx
Clasificación de las Competencias en la Virtualidad.pptxClasificación de las Competencias en la Virtualidad.pptx
Clasificación de las Competencias en la Virtualidad.pptxManuelRojas960410
 
libro-aprenda-redes-visualmente.pdf
libro-aprenda-redes-visualmente.pdflibro-aprenda-redes-visualmente.pdf
libro-aprenda-redes-visualmente.pdfManuelRojas960410
 
Química, Chang Undécima edición - JPR504.pdf
Química, Chang Undécima edición - JPR504.pdfQuímica, Chang Undécima edición - JPR504.pdf
Química, Chang Undécima edición - JPR504.pdfManuelRojas960410
 
Instrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdf
Instrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdfInstrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdf
Instrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdfManuelRojas960410
 
Analisis forense de sistemas informaticos.pdf
Analisis forense de sistemas informaticos.pdfAnalisis forense de sistemas informaticos.pdf
Analisis forense de sistemas informaticos.pdfManuelRojas960410
 
3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...
3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...
3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...ManuelRojas960410
 
2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...
2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...
2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...ManuelRojas960410
 
1 Curso de Formación en Educación Abierta y a Distancia.pdf
1 Curso de Formación en Educación Abierta y a Distancia.pdf1 Curso de Formación en Educación Abierta y a Distancia.pdf
1 Curso de Formación en Educación Abierta y a Distancia.pdfManuelRojas960410
 

More from ManuelRojas960410 (12)

ENCOR_Capitulo 3.pptx
ENCOR_Capitulo 3.pptxENCOR_Capitulo 3.pptx
ENCOR_Capitulo 3.pptx
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
Clasificación de las Competencias en la Virtualidad.pptx
Clasificación de las Competencias en la Virtualidad.pptxClasificación de las Competencias en la Virtualidad.pptx
Clasificación de las Competencias en la Virtualidad.pptx
 
culto.ppsx
culto.ppsxculto.ppsx
culto.ppsx
 
libro-aprenda-redes-visualmente.pdf
libro-aprenda-redes-visualmente.pdflibro-aprenda-redes-visualmente.pdf
libro-aprenda-redes-visualmente.pdf
 
Química, Chang Undécima edición - JPR504.pdf
Química, Chang Undécima edición - JPR504.pdfQuímica, Chang Undécima edición - JPR504.pdf
Química, Chang Undécima edición - JPR504.pdf
 
lista de verbos.pdf
lista de verbos.pdflista de verbos.pdf
lista de verbos.pdf
 
Instrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdf
Instrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdfInstrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdf
Instrumento_para_la_evaluacion_de_objetos_de_aprendizaje-LORI.pdf
 
Analisis forense de sistemas informaticos.pdf
Analisis forense de sistemas informaticos.pdfAnalisis forense de sistemas informaticos.pdf
Analisis forense de sistemas informaticos.pdf
 
3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...
3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...
3 Libro Orientaciones Básicas Sobre Educación a Distancia y la Función Tutori...
 
2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...
2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...
2 Lectura La Inclusión como base de la educación del Siglo XXI EDUCACION VIRT...
 
1 Curso de Formación en Educación Abierta y a Distancia.pdf
1 Curso de Formación en Educación Abierta y a Distancia.pdf1 Curso de Formación en Educación Abierta y a Distancia.pdf
1 Curso de Formación en Educación Abierta y a Distancia.pdf
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

ENCOR_Capitulo 4.pptx

  • 1. Chapter 4: Multiple Spanning Tree Protocol Instructor Materials CCNP Enterprise: Core Networking
  • 2. 2 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 4 Content This chapter covers the following content: Multiple Spanning Tree Protocol - This section explains the advantages and operations of Multiple Spanning Tree Protocol (MST).
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol • The original 802.1D standard only supported one STP instance for an entire switch network. Which means that it was not possible to load share traffic across links by blocking for specific VLANs on one line and blocking for other VLANS on alternate links. • Multiple Spanning Tree Protocol (MST) maps one or multiple VLANs to one STP instance.
  • 4. 4 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol CST Topology The figure below shows a Common Spanning Tree (CST) topology. VLANs 1 - 4 share the same topology. Traffic from SW2 to SW3 must pass through SW1. If only SW2 and SW3 had end devices in VLAN 4, the topology could not be tuned to allow traffic to traverse directly between the two switches.
  • 5. 5 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol PVST Topologies Per-VLAN Spanning Tree (PVST) provides a separate spanning tree instance for each VLAN configured on the network. The topologies below show how the switches maintain a different STP topology for each of the four VLANs. In environments with thousands of VLANs, maintaining an STP state for every VLAN can burden the switch’s processor.
  • 6. 6 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Topology MST maps one or multiple VLANs into one STP tree, called an MST instance (MSTI). The figure shows how the switches maintain STP topologies for four VLANs. If more VLANs were added to the environment, the switches would maintain three STP topologies if the VLANs aligned to one of the existing MSTIs.
  • 7. 7 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Region A group of MST switches with the same high-level configuration is known as an MST region. MST incorporates mechanisms that make an MST region appear as a single virtual switch to external switches.
  • 8. 8 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Instances MST uses a special instance, instance 0, called the internal spanning tree (IST). It is always the first instance and runs on all switch port interfaces in the MST region regardless of the VLANs associated with the ports. Additional information about other MSTIs is nested in the IST BPDU that is transmitted throughout the MST region. This allows MST to advertise only one set of BPDUs, which minimizes STP traffic. Note: Up to 16 MST instances are supported by default.
  • 9. 9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Configuration The following steps are used to configure MST: Step 1. Define MST as the spanning tree protocol with the command spanning-tree mode mst Step 2. (Optional) Define MST instance priority, using one of two methods: • spanning-tree mode mst instance-number priority priority • spanning-tree mode mst instance-number root {primary | secondary} [diameter diameter] (Note: Priority is a value between 0 and 61,440 in increments of 4096. The primary keyword sets the priority to 24,576 and the secondary keyword sets the priority to 28,672.) Step 3. Associate VLANs to an MST instance. By default, all VLANs are associated to the MST 0 instance. The MST configuration sub-mode must be entered with the command spanning-tree mst configuration. Then the VLANs are assigned to a different MST instance with the command instance instance-number vlan vlan-id.
  • 10. 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Configuration (Cont.) Step 4. Specify the MST version number. The MST version number must match for all switches in the same MST region. The MST version number is configured with the sub- mode configuration command revision version. Step 5. (Optional) Define the MST region name. MST regions are recognized by switches that share a common name. By default, a region name is an empty string. The MST region name is set with the command name mst-region-name.
  • 11. 11 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Verification • To verify MST use the command show spanning-tree mst configuration. • Relevant spanning tree information can be obtained with the command show spanning- tree. • A consolidated view of the MST topology table is displayed with the command show spanning-tree mst [instance- number]. • Specific MST settings are viewed for a specific interface with the command show spanning-tree mst interface interface-id.
  • 12. 12 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Tuning MST supports the tuning of port cost and port priority. The interface config command spanning-tree mst instance- number cost cost sets the interface cost.
  • 13. 13 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Tuning (Cont.) The interface config command spanning-tree mst instance- number port-priority priority sets the interface priority.
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol Common MST Misconfigurations There are two common misconfigurations within the MST region: • VLAN assignment to the IST • Trunk link pruning
  • 15. 15 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol VLAN Assignment to IST • The IST topology may not correlate to the access layer and might introduce a blocking port that was not intentional. • In the example, it appears as if traffic between PC-A and PC-B would flow across the Gi1/0/2 interface, as it is an access port assigned to VLAN 10. However, all interfaces belong to the IST instance. • SW2 must block either Gi1/0/1 or Gi1/0/2. Since SW1 is the root bridge, SW2 blocks Gi1/0/2 based on the port identifier from SW1. Therefore, blocking the IST instance. • There are two solutions for this scenario: • Move VLAN 10 to an MSTI instance other than the IST. If you do this, the switches will build a topology based on the links in use by that MSTI. • Allow the VLANs associated with the IST on all interswitch (trunk) links.
  • 16. 16 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol Trunk Link Pruning Pruning of VLANs on a trunk link is a common practice for load balancing. However, it is important that pruning of VLANs does not occur for VLANs in the same MST on different network links. • Links between SW1 to SW2 and SW1 to SW3 have been pruned to help with load balancing traffic. • After implementing the changes, users attached to SW1 and SW3 can no longer communicate with the servers on SW1. • This is due to the VLANs on the trunk links changing but not the MSTI topology.
  • 17. 17 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Region Boundary • An MST region boundary is any port that connects to a switch that is in a different MST region or that connects to 802.1D or 802.1W BPDUs. • MSTI’s never interact outside of the region and MST switches can detect PVST+ neighbors at MST region boundaries. • Propagating CST at the MST region boundary involves a feature called PVST simulation mechanism. It sends out PVST+ & RSTP BPDUs, one for each VLAN. • The PVST simulation mechanism is required because PVST+/RSTP topologies do not understand the structure of IST BPDUs. • When the MST boundary receives the PVST+ BPDU it doesn’t map the VLAN to the MSTI. Instead the MST boundary maps the PVST+ BPDU from VLAN 1 to the instance. It only does this when it receives a PVST BPDU on a port.
  • 18. 18 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Region Design Considerations There are two design considerations when integrating an MST region with a PVST+/RSTP environment: • MST region as the root bridge • MST region is not a root bridge for any VLAN
  • 19. 19 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Region as the Root Bridge The MST region as the root bridge ensures that all region boundary ports flood the same IST instance BPDU to all the VLANs in the PVST topology. This makes the IST instance preferred over any other switch in the PVST+ topology. The MST region appears as a single device and the PVST+ switches detect and place the alternative link into a blocking state.
  • 20. 20 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multiple Spanning Tree Protocol MST Region Not a Root Bridge for Any VLAN • In the situation that the MST region is not a root bridge for any VLAN, the MST region boundary ports can only block or forward for all VLANs. • There is not an option to load balance traffic because the IST instance must remain constant. • If the MST switch detects a better BPDU for a specific VLAN on a boundary port, the switch will use BPDU guard to block the port. This is called PVST simulation check and it done to ensure a loop-free topology.
  • 21. 21 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Prepare for the Exam
  • 22. 22 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Prepare for the Exam Key Topics for Chapter 4 Description Multiple Spanning Tree Protocol MST instance MST region Internal Spanning Tree (IST) MST region boundary
  • 23. 23 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Prepare for the Exam Key Terms for Chapter 4 Terms Common Spanning Tree (CST) Internal spanning tree (IST) MST instance (MSTI) MST region MST region boundary PVST simulation check
  • 24. 24 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Prepare for the Exam Command Reference for Chapter 4 Task Command Syntax Configure the switch for a basic MST region that includes all VLANS and the version number 1 spanning-tree mode mst spanning-tree mst configuration instance 0 vlan 1-4094 revision 1 Modify a switch’s MSTI priority or make it the root bridge for the MSTI spanning-tree mst instance-number priority priority OR spanning-tree mst instance-number root {primary | secondary}[diameter diameter] Specify additional VLANs to an MSTI spanning-tree mst configuration instance instance-number vlan vlan-id Change the MST version number spanning-tree mst configuration revision version Change the port cost for a specific MSTI spanning-tree mst instance-number cost cost Change the port priority for a specific MSTI spanning-tree mst instance-number port- priority priority Display the MST configuration show spanning-tree mst configuration Verify the MST switch status show spanning-tree mst [instance-number] View the STP topology for the MST show spanning-tree mst interface interface-id