iTable of Contents1 MSTP Configuration ··································································································································1-1Overview ·················································································································································1-1Spanning Tree Protocol Overview···································································································1-1Rapid Spanning Tree Protocol Overview ······················································································1-10Multiple Spanning Tree Protocol Overview ···················································································1-10MSTP Implementation on Switches ······························································································1-14Protocols and Standards ···············································································································1-15MSTP Configuration Task List ··············································································································1-15Configuring Root Bridge························································································································1-17Configuring an MST Region ··········································································································1-17Specifying the Current Switch as a Root Bridge/Secondary Root Bridge·····································1-18Configuring the Bridge Priority of the Current Switch····································································1-20Configuring How a Port Recognizes and Sends MSTP Packets ··················································1-20Configuring the MSTP Operation Mode ························································································1-21Configuring the Maximum Hop Count of an MST Region ·····························································1-22Configuring the Network Diameter of the Switched Network ························································1-23Configuring the MSTP Time-related Parameters ··········································································1-23Configuring the Timeout Time Factor····························································································1-25Configuring the Maximum Transmitting Rate on the Current Port ················································1-25Configuring the Current Port as an Edge Port ··············································································1-26Setting the Link Type of a Port to P2P ··························································································1-27Enabling MSTP······························································································································1-28Configuring Leaf Nodes ························································································································1-29Configuring the MST Region ·········································································································1-29Configuring How a Port Recognizes and Sends MSTP Packets ··················································1-30Configuring the Timeout Time Factor····························································································1-30Configuring the Maximum Transmitting Rate on the Current Port ················································1-30Configuring a Port as an Edge Port·······························································································1-30Configuring the Path Cost for a Port ·····························································································1-30Configuring Port Priority ················································································································1-32Setting the Link Type of a Port to P2P ··························································································1-33Enabling MSTP······························································································································1-33Performing mCheck Operation ·············································································································1-33Configuration Prerequisites ···········································································································1-34Configuration Procedure················································································································1-34Configuration Example ··················································································································1-34Configuring Guard Functions ················································································································1-34Configuring BPDU Guard ··············································································································1-34Configuring Root Guard·················································································································1-35Configuring Loop Guard ················································································································1-36Configuring TC-BPDU Attack Guard ·····························································································1-37Configuring BPDU Dropping ·········································································································1-38Configuring Digest Snooping ················································································································1-39