Got it

RSTP Protected port

Created: Sep 14, 2021 06:56:33Latest reply: Sep 15, 2021 14:16:24 241 4 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

On an RSTP network, when an edge port is in protected state, and receives BPDUs, what operation is performed on that port ?


Featured Answers

Best answer

Recommended answer

jason_hu
Admin Created Sep 14, 2021 07:29:46

Hi friend!

After BPDU protection is enabled on a switch, if an edge port on the switch receives a BPDU, the switch will shut down the edge port, while keeping the port attribute unchanged. This ensures that the spanning-tree topology is not recalculated and services are not interrupted. In addition, the switch generates the following log information and notifies the NMS of this event:

MSTP/4/BPDU_PROTECTION:This edged-port [port-name] that enabled BPDU-Protection will be shutdown, because it received BPDU packet!

Hope to help you!

View more
  • x
  • convention:

All Answers
Hello,
We're working on your problem. Please be patient.
View more
  • x
  • convention:

Hi friend!

After BPDU protection is enabled on a switch, if an edge port on the switch receives a BPDU, the switch will shut down the edge port, while keeping the port attribute unchanged. This ensures that the spanning-tree topology is not recalculated and services are not interrupted. In addition, the switch generates the following log information and notifies the NMS of this event:

MSTP/4/BPDU_PROTECTION:This edged-port [port-name] that enabled BPDU-Protection will be shutdown, because it received BPDU packet!

Hope to help you!

View more
  • x
  • convention:

zaheernew
zaheernew MVE Author Created Sep 14, 2021 09:27:08

Hi HI

STP ensures a loop-free network but has a slow network topology convergence speed, leading to service deterioration. If the network topology changes frequently, the connections on the STP-enabled network are frequently torn down, causing frequent service interruption. Users can hardly tolerate such a situation.

Disadvantages of STP are as follows:

Port states or port roles are not subtly distinguished, which is not conducive to the learning and deployment for beginners.

A network protocol that subtly defines and distinguishes different situations is likely to outperform the others.

Ports in the Listening, Learning, and Blocking states do not forward user traffic and are not even slightly different to users.

The differences between ports in essence never lie in the port states but the port roles from the perspective of use and configuration.

It is possible that the root port and designated port are both in the Listening state or Forwarding state.

The STP algorithm determines topology changes after the time set by the timer expires, which slows down network convergence.

The STP algorithm requires a stable network topology. After the root bridge sends configuration Bridge Protocol Data Units (BPDUs), other routers forward them until all bridges on the network receive the configuration BPDUs.

This also slows down topology convergence.

In STP, after the topology becomes stable, the root bridge sends configuration BPDUs at an interval set by the Hello timer. A non-root bridge does not send configuration BPDUs until it receives configuration BPDUs sent from the upstream router. This renders the STP calculation complicated and time-consuming. In RSTP, after the topology becomes stable, a non-root bridge sends configuration BPDUs at Hello intervals, regardless of whether it has received the configuration BPDUs sent from the root bridge. Such operations are implemented on each router independently.

View more
  • x
  • convention:

Good answers
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.