1 MSTP Configuration ··································································································································1-1
Overview ·················································································································································1-1
Protocols and Standards ···············································································································1-15
MSTP Configuration Task List ··············································································································1-15
Configuring Root Bridge························································································································1-17
Configuring an MST Region ··········································································································1-17
Enabling MSTP······························································································································1-28
Configuring Leaf Nodes ························································································································1-29
Configuring the MST Region ·········································································································1-29
Configuring Port Priority ················································································································1-32
Enabling MSTP······························································································································1-33
Performing mCheck Operation ·············································································································1-33
Configuration Prerequisites ···········································································································1-33
Configuration Procedure················································································································1-34
Configuration Example ··················································································································1-34
Configuring Guard Functions ················································································································1-34
Configuring BPDU Guard ··············································································································1-34
Configuring Root Guard·················································································································1-35
Configuring Loop Guard ················································································································1-37
Configuring BPDU Dropping ·········································································································1-38
Configuring Digest Snooping ················································································································1-39
Table of Contents
i