Professional Documents
Culture Documents
Switeching Math
Switeching Math
STP
What is VLAN
STP root bridge is elected based on the LOWEST bridge id (BID). - The BID consists of: > Bridge priority consisting of + Priority (default = 32768) (configured in increments of 4096) + Sys-id-ext = vlan. > MAC address
logical grouping of network users and resources connected to administratively defined ports on a switch. The
segmentation into VLAN creates smaller collision and broadcast domains and enhances security. Layer 3
switches or routers are needed to route packets between VLANs
Vlan Basics
Priority 0 means always Root bridge / priority 61440 means Never Root bridge
Broadcasts generated in one VLAN are not propagated to other VLANs. So now to pass traffic between VLANs
on the same Cisco switch, you must use a Cisco router.
Broadcast Control
- The switch which gets elected root bridge: > Will show 'this bridge is root' from "sh span vlan". > Will show
the same priority and MAC for both root id and bridge id. > Will have all its interface for that VLAN in designated
forwarding state
Security
Control over each port and user which is not possible with hubs.
Allow adding or removing users to broadcast domain regardless of their physical location
1st> Lowest cumulative cost to the root: >> Inverse value based on interface bandwidth (Iinterface with higher
bandwidth will have a lower cost). 2nd> Lowest upstream BID: >> Used to isolate multiple connections to the
same upstream bridge. 3th> Lowest port ID >> Lowest port priority (0-255) (default = 128) >> Lowest port
number ie Fa0/5 = 5.
A static VLAN is one in which the administrator manually configured the port VLAN membership.
Static Vlan
Dynamic VLAN determine a host s VLAN assignment automatically from a MAC address table, protocols,
or applications. VMPS (VLAN Management Policy Server) can be used to set up a database of MAC addressto-VLAN mappings
Dynamic Vlan
Can be changed to influence how the local switch elects its local ROOT port upstream.
Port Cost
Changing the port cost will affect all downstream switches, as cost is the sum of all port costs to the root
Influencing the Root Port Election:
>> Can be changed to influence how a downstream switch elects its root port. >> Priority is locally significant
between two directly connected switches. >> Upstream port priority seen with "sh span VLAN {id} detail" as
'designated port id x.x
The native VLAN , aka 802.1Q trunking; If one of devices does not support trunking, the traffic for that one
native VLAN can still be sent over the link. By default, the native VLAN is VLAN 1. STP on vlan 1 works without a
trunk link
Native Vlan
Port Priority
Downstream devices from the root bridge inherit the timers configured on the root.
Timers
Identifying Vlans
VLAN Memberships
Is the one port on a switch that is closest (with the lowest root path cost) to the root bridge
Is the downstream port on a LAN segment that is closest to the root. This port relays, or transmits BPDUs
down the tree.
Designated port
It inserts a field into the frame for VLAN identification; original frame is altered, not encapsulated.
IEEE-(802.1Q)
Forwarding port
Original frame is encapsulated in ISL frame with 26 byte ISL headers and 4 byte FCS trailers. The original
frame is not altered. Inter-Switched-Link is a Cisco Properitary
NOTE !!!!
ISL enabled NICs are required to read ISL frames because ISL frame can be up to 1522 bytes while standard
Ethernet frames are up to 1518 bytes.
Disabled
ONLY when a port initializes, will it be in the blocking state. - The port is allowed to receive only BPDUs so that
the switch can hear from other neighboring switches. - The port cannot receive or transmit data and cannot
add MAC addresses to its address table. - Blocking delay = 20 sec, and this value CANNOT be changed.
A port is moved from blocking state if the switch thinks that the port can be selected as a root port or
designated port. - The port is allowed to receive and send BPDUs so that it can actively participate in STP. The port still cannot send or receive data frames. - Listening delay = 15 sec.
The VTP domain name is the basic configuration needed for a switch to be part of a domain unless a domain
password is configured
Listening 15 Sec
After the listening delay, the port is allowed to move into the learning state. - The port still sends and receives
BPDUs as before. - The switch now can learn new MAC addresses to add to its address table. - The port
cannot yet send any data frames. - Learning delay = 15 sec.
Learning 15 Sec
After the forward delay (listening and learning states) (default = 30 sec) the port transitions to forwarding
state. - The port now can send and receive data frames, collect MAC addresses in its address table, and
send and receive BPDUs
Forwarding
> RFC dictates that Listening and Learning times have to be equal values. > Blocking state delay ONLY
applies when a port first initializes, ie after a reboot, not when a port transitions to forwarding. > When a port
transitions to forwarding state, the is only listening and forwarding delay. > So when a port first comes up
there is a collective delay of 50 sec (20+15+15) of no data flow. > And when a port changes state the collective
delay is only 30 sec (15+15) of no data flow. > Keep this in mind, on how a question could be asked
Frames are tagged when they traverse a trunk link. VLAN tags are removed from the frame before exiting the
trunk link.
Ports where no other STP activity is detected or expected. These are ports with normal end-user connections.
A scheme is needed to identify what VLAN a frame belongs to (called frame tagging). ISL and IEEE 802.1q
are two standards of frame tagging supported by Cisco switches
Uniquely assigns a VLAN ID to all passing frames to identify which frame belongs to which VLAN.
Frame Tagging
Blocking port
Is a port that is a candidate root port in blocking state. (Next-closest to the root bridge) - These ports are
identified for quick use by the STP uplinkfast feature.
Ports that are in a down state. This state is special and is not part of the normal STP progression for a port.
Trunk Ports
Root port
Links that are part of one VLAN are access links. Devices attached to an access link are unaware of their
VLAN membership. Trunk links can carry up to 1005 VLANs
Access ports
VLANs
Even though the passwords are the same, the MD5 hashes could be different. Instead always make sure that
the MD5's are the same.
Authentication
Convergence
Configured with "vtp password {pwd}" and MD5 hashes are seen with "sh vtp status"
Vtp password / domain name must be same on all switches to forward vlan updates
Changes are done ONLY on the VTP server
Server (Default)
VLAN configuration is stored in the VLAN database file called vlan.dat and is located on flash (const_nvram)
VLANs 2-1000 are configurable
Receives their configuration from the VTP server. VTP changes can t be done on clients
Client
VLAN configuration is stored in the VLAN database file called vlan.dat and is located on flash (const_nvram)
20+15+15 = 50 sec Blocking , Listening , Learning
Is used to bypass the forwarding delay, thus a port transitions immediately to a forwarding state. > Enabling
this on a non-host port could create loops. > Configured globally with "spanning-tree portfast default" >
Interface configuration "spanning-tree portfast enable
Maintains local database, with the VLAN configuration stored in the running config
Modes
> Cisco proprietary > Is used to speed up convergence time when direct failure of the local root port occurs. >
When a root port fails, the next alternate port is immediately transitioned to the root port and placed into
forwarding state. > The CAM table is flooded out of this new root port to expedite the learning phase of
upstream neighbors. > Configured globally with "spanning-tree uplinkfast "
> Cisco proprietary > Used to speed up convergence when a indirect failure occurs upstream in the network
by immediately expiring the MAX_AGE timer. > Will generate RLQ (Root Link Query) PDU's to check if it should
expire max_age for its current BDPU's and begin convergence. > Configured globally with "spanning-tree
backbonefast "
STP timers
Transparent
Spanning Tree Uplinkfast
VLAN add/removes in the VTP domain does not affect transparent switches as the updates are not stored.
A revision of 0 indicates a transparent mode switch is not participating in the update sequence of the VTP
domain
Transparent mode will have a revision number of 0 and will not increase with database changes
For every change i.e (create or rename or edit ) in Server mode the revision number will be increased by 1,
and will be propagated to VTP clients
Root port
Configuration Revision
Designated port
RSTP port roles
- Is a port that has an alternate path to the root. An alternate port, is less desirable than the root port. - In
blocking state will receive STP info, but not send any out that interface.
Alternate port
Eliminates the need to statically remove VLANs from trunk links where they not needed, this is done by having
the switches automatically communicate with each other which VLANs they have locally assigned or are in the
transit path for
Backup port
Discarding
If a layer2 network is converged, all devices should agree that VTP pruning is enabled, as per 'sh vtp status
VTP Pruning
Learning
Forwarding
From the 'show interface pruning':
Ether-Channel
The field 'VLANs pruned for lack of request by neighbor', indicates the VLANs that the upstream neighbor did
not request
Shutdown
o Violators cannot send traffic in. o This mode disables learning when any VLAN reaches the max limit, not
recommended on trunk ports.
Protect
Control what VLANs are allowed to be pruned or not, across a link, based on what VLANs are assigned locally
Port security
Removing a VLAN from the "prune eligible list" forces the switch to receive traffic for that VLAN. Configured
with "switchport trunk pruning vlan" command
Violation mode
ONLY VLANs 2-1000 are "prune eligible", the 5 default VLANs (1, 1002-1005) and extended VLANs cannot be
pruned off an interface
Restrict
Copy the vlan.dat file from const_nvram in flash to either the bootflash partition or to an extenal TFTP server
Backing up vlan.dat
> Used to enforce access layer security, when an erroneous BPDU is received on an access interface, by
transitioning the interface to shutdown and err-disable state. > Err-disable recovery can be configured to bring
the interface out of err-disable state automatically after configured interval. > The err-disable state can be
seen with "sh interface status" > Configured globally with "spanning-tree portfast bpduguard default" >
Interface configuration "spanning-tree bpduguard enable
Vlan 3
Name sales
int fa 0/1
ccna - SWITCHING
> Drops all inbound BDPU's and does not send BDPU's out of the interface. > Unlike BPDU guard, the
interface does not go into err-disable state when violation occurs. > Other user traffic will still be forwarded. >
If BPDU filter default is enabled with portfast, all interface will run in portfast mode except those which are
receiving BPDU's. > Configured globally with "spanning-tree portfast bpdufilter default" > Interface
configuration "spanning-tree bpdufilter enable"
BPDU filter
delete flash:vlan.dat
Cost Value
int fa 0/1
Statically trunking
Int vlan 1
ip add a.b.c.d
exit
Vlan / Vtp commands & Configuration
ip default-gateway
switchport nonegotiate
Int fa 0/1
Int fa 0/1
Int fa 0/1
mode
Configuration Commands
Domain
Int fa 0/1
VTP pruning
pruning
Switchport port-security
Default Gateways
xxx
Spanning-Tree vlan 5
Int fa 0/5
Switchport port-security Mac-address Sticky
password
vtp v2-mode
version 2 mode
Basic Commands
int fa 0/1
int gi 0/1
duplex full
Configuring Path cost
no shut
int fa 0/1.1
description management VLAN 1
ADVANCEDSTPCOMMANDS
STP Commands
Port fast
int fa 0/1.10
Inter-VLAN-Routing
encapsulation dot1q 10
Layer2 switch trunks to external layer3 router
Router-on-a-Stick
HUB
Ether-Channel
Spanning-tree Uplinkfast
Uplink fast
Backbone fast
VLAN
L2 devices or bridges and switches R similar
STP
Sh spanning-tree / sh spanning-tree vlan [id] / show spanning-tree active / show spanning-tree brief / show
spanning-tree detail / show spanning-tree interface gigabitethernet 0/1 / show spanning-tree summary / show
spanning-tree summary totals / show spanning-tree vlan 5 / show spanning-tree interface fastethernet 0/10
portfast
Bridges & switches makes forward decision based on L2 Addresses i.e MAC ..they forward L2 BROADCAST
Bridges and switches learn MAC addresses by examing the source address of each frame received
when a host transmits a frame, it s hardware address is recorded in the MAC Address Table, along with the
port the frame has been received on
Address Learning
These problems can be avoided by the Spanning Tree Protocol (STP). Bridges are software based and can
only have one Spanning Tree instance, switches are hardware based (ASIC Application Specific
Integrated Circuit) and have lower latency.
Port-Security
debug spanning-tree all / debug spanning-tree events / debug spanning-tree backbonefast / debug
spanning-tree uplinkfast / debug spanning-tree mstp all / debug spanning-tree switch state / debug
spanning-tree pvst+ !!! NOTE !!! If we r using debug . dont forget to undebug all ..
Ether-Channel
Loops occur when there are multiple links between switches. A broadcast storm occurs when two switches
constantly rebroadcast the same frame. Devices may receive the same frames several times, and from
different origins. The same problem can cause MAC Address Table confusion (called trashing) if the device
is a switch trying to determine the entry port of a MAC address
Verification/Troubleshooting
VTP
Bridges r software based / Switches r Hardware based bcoz they use ASIC chips to help make filtering
decisions
Switch can also view as Multiport Bridge bcoz most switches have a higher number of ports than most
bridges.
BASIC
If the address is unknown, the frame is forwarded to all ports except the one on which the frame was
received. In other cases, the frame is only sent to the appropriate interface
Spanning-tree Backbonefast
ROUTER
show running-config / interface fastethernet 0/12 / show etherchannel / show etherchannel 1 port-channel
show etherchannel summary / show pagp neighbor / clear pagp 1 counters / clear lacp 1 counters
sh port-security [address] , [interface]