Configuring the Root Bridge and Secondary Root Bridge

Created Aug 02, 2018 02:26:08 319 0 0 0

Context
The root bridge of a spanning tree is automatically calculated. You can also manually specify a root bridge or secondary root bridge.
A spanning tree can have only one effective root bridge. When two or more devices are specified as root bridges for a spanning tree, the device with the smallest MAC address is elected as the root bridge.
You can specify multiple secondary root bridges for each spanning tree. When the root bridge fails or is powered off, a secondary root bridge becomes the new root bridge. If a new root bridge is specified, the secondary root bridge will not become the root bridge. If there are multiple secondary root bridges, the one with smallest MAC address becomes the root bridge of the spanning tree.
NOTE:
It is recommended that you specify the root bridge and secondary root bridge when configuring STP/RSTP.
Procedure
Perform the following operations on the device you want to use as the root bridge.
Run:
system-view
The system view is displayed.

Run:
stp root primary
The device is configured as the root bridge.

By default, a switching device does not function as the root bridge. After you run this command, the priority value of the device is set to 0 and cannot be changed.
Perform the following operations on the device you want to use as the secondary root bridge.
Run:
system-view
The system view is displayed.

Run:
stp root secondary
The device is configured as the secondary root bridge.

By default, a switching device does not function as the secondary root bridge. After you run this command, the priority value of the device is set to 4096 and cannot be changed.
  • x
  • convention:

Responses

Reply
You need to log in to reply to the post Login | Register

Notice:To ensure the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but not limited to politically sensitive content, content concerning pornography, gambling, drug abuse and trafficking, content that may disclose or infringe upon others' intellectual properties, including commercial secrets, trade marks, copyrights, and patents, and personal privacy. Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see“ Privacy Policy.”
If the attachment button is not available, update the Adobe Flash Player to the latest version!
Fast reply Scroll to top