1 MSTP Configuration ··································································································································1-1
MSTP Overview·······························································································································1-1
Introduction to STP··························································································································1-1
How STP works ·······························································································································1-3
Introduction to MSTP·······················································································································1-9
Protocols and Standards ···············································································································1-14
Configuration Task List ·························································································································1-14
Configuring the Root Bridge··················································································································1-16
Configuring an MST Region ··········································································································1-16
Configuring Timers of MSTP ·········································································································1-21
Enabling the MSTP Feature ··········································································································1-27
Configuring Leaf Nodes ························································································································1-28
Configuring an MST Region ··········································································································1-28
Configuring Port Priority ················································································································1-30
Enabling the MSTP Feature ··········································································································1-31
Performing mCheck ······························································································································1-31
Configuration Prerequisites ···········································································································1-31
Configuration Procedure················································································································1-31
Configuration Example ··················································································································1-32
Configuring Digest Snooping ················································································································1-32
Configuration Prerequisites ···········································································································1-32
Configuration Procedure················································································································1-33
Configuration Example ··················································································································1-33
Table of Contents
i