11-09-2014 02:48 AM - edited 03-07-2019 09:25 PM
Hello everybody,
I would appreciate your comments to the following scenario:
Intending to reduce unnecessary traffic in an access layer redundant topology I would consider implementing the following:
Even with bpdufilter active, every port, according to Cisco, transmits 2-3 BPDU before it stops as a result of bpdufilter implementation.
Conclusion
There would be absolutely no risk of loops forming in a topology consisting of 3 switches A, B, C where:
11-09-2014 06:58 PM
Enable portfast globally on a access layer switch
I don't understand why you want to "re-invent the wheel". You really want to follow the KISS principle.
On paper, putting only the portfast globally is "nice". In reality it will cause issues. Why? If I want to look at the configuration of a port, will the portfast configuration show up? No it won't.
My recommendation is to enable portfast on a per-port basis.
Enable bpdufilter globally on the same switch
Enabling BPDU Filter is not really something "popular" among network admin. Enabling BPDU Filter filters out BPDU from both direction, effectively disabling STP ... and this means that you've just significantly increased the chance of having a loop in your network.
11-11-2014 05:48 AM
Thanks for commenting,
I agree with your kiss principle but bpdufiltering with simultaneous protection from loops requires global application of portfast. In any Event, These commands are all under the Group of spanning tree commands.
I know bpdufilter is not sth popular. But enabling it globally, and NOT PER PORT will help guard against loops. Attached document refers. Can there be sth wrong with the config guide from Cisco?
Lab tests have shown that with bpdufilter globally on the port will be err-disabled if a Switch is connected to it. Regardless whether the "incoming" has bpdufilter on or not.
11-11-2014 01:33 PM
I know bpdufilter is not sth popular. But enabling it globally, and NOT PER PORT will help guard against loops. Attached document refers. Can there be sth wrong with the config guide from Cisco?
Yes and no.
On paper and in a sandbox/lab environment, the answer is yes.
In reality, no. BPDU Filter is as destructive as enabling STP on all your ports and disabling BPDU Guard. You will, one day, get a loop and you'll have a fun time finding where the source is originating from.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide