H3C Technologies H3C SecPath F1000-E User Manual
Page 84
59
NOTE:
Configuration BPDU comparison uses the following principles:
•
The configuration BPDU that has the lowest root bridge ID has the highest priority.
•
If all the configuration BPDUs have the same root bridge ID, their root path costs are compared. For
example, the root path cost in a configuration BPDU plus the path cost of a receiving port is S. The
configuration BPDU with the smallest S value has the highest priority.
•
If all configuration BPDUs have the same S value, their designated bridge IDs, designated port IDs, and
the IDs of the receiving ports are compared in sequence. The configuration BPDU with a smaller ID wins
out.
•
Selection of the root bridge
Initially, each STP-enabled device on the network assumes itself to be the root bridge, with the root
bridge ID being its own device ID. By exchanging configuration BPDUs, the devices compare their
root bridge IDs to elect the device with the smallest root bridge ID as the root bridge.
•
Selection of the root port and designated ports on a non-root device
Table 11 Selection of the root port and designated ports
Step
Description
1
A non-root device regards the port on which it received the optimum configuration BPDU as
the root port.
2
Based on the configuration BPDU and the path cost of the root port, the device calculates a
designated port configuration BPDU for each of the rest ports.
•
The root bridge ID is replaced with that of the configuration BPDU of the root port.
•
The root path cost is replaced with that of the configuration BPDU of the root port plus the
path cost of the root port.
•
The designated bridge ID is replaced with the ID of this device.
•
The designated port ID is replaced with the ID of this port.
3
The device compares the calculated configuration BPDU with the configuration BPDU on the
port of which the port role is to be defined, and acts depending on the comparison result:
•
If the calculated configuration BPDU is superior, the device considers this port as the
designated port, and replaces the configuration BPDU on the port with the calculated
configuration BPDU, which will be sent out periodically.
•
If the configuration BPDU on the port is superior, the device blocks this port without
updating its configuration BPDU. The blocked port can receive BPDUs but cannot send
BPDUs or forward data.
NOTE:
When the network topology is stable, only the root port and designated ports forward traffic, and other
ports are all in the blocked state—they receive BPDUs but do not forward BPDUs or user traffic.
A tree-shape topology forms upon successful election of the root bridge, the root port on each non-root
bridge and the designated ports.
The following is an example of how the STP algorithm works. As shown in
, the priority of
Device A is 0, the priority of Device B is 1, the priority of Device C is 2, and the path costs of these links
are 5, 10 and 4 respectively.
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS H3C SecBlade LB Cards H3C SecPath L1000-A Load Balancer