<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: STP Safe Implementation Plans in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118392#M22944</link>
    <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;If you're interoping with Cisco, this config with PVST+ seems OK, provided that the carrier VLAN is tagged on all relevant ports. There are restrictions on using PVST+ with an untagged native VLAN.&lt;BR /&gt;&lt;BR /&gt;You do not need to add ports to STP and also auto-bind the VLAN, you can just auto-bind the VLAN to STP which will also add all current and future ports in that VLAN to STP at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're doing all Extreme, keeping the MSTP mode and dot1d encapsulation defaults is probably easier.&lt;BR /&gt;In a very basic setup, the only configuration you'd need from defaults is:&lt;/P&gt;&lt;P&gt;enable stpd s0 auto-bind vlan &amp;lt;Auto-Bind All VLANs to s0&amp;gt;&lt;BR /&gt;enable stpd s0 #Enabled by default&lt;BR /&gt;#Edge Ports&lt;BR /&gt;&lt;SPAN&gt;configure stpd &amp;lt;STPD&amp;gt; ports link-type edge &amp;lt;Ports&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;configure stpd &amp;lt;STPD&amp;gt; ports edge-safeguard enable &amp;lt;Ports&amp;gt; {recovery-timeout &amp;lt;Seconds&amp;gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;configure stpd &amp;lt;STPD&amp;gt; ports bpdu-restrict enable &amp;lt;Ports&amp;gt; {recovery-timeout &amp;lt;Seconds&amp;gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;An edge port configured with BPDU-restrict is disabled if an STP BPDU is received on the port. Equivalent to Cisco BPDU-guard.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;An edge port configured with edge-safeguard immediately enters the forwarding state and transmits BPDUs. If a loop is detected, STP disables the port. By default, an edge port without edge-safeguard configured immediately enters the forwarding state but does not transmit BPDUs unless a BPDU is received by that edge port. Equivalent to Cisco spantree portfast.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Both commands have an optional recovery-timeout, the duration that the port is disabled in either event. If the recovery-timeout period is not specified, the port is disabled permanently until manually re-enabled or the switch is rebooted.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope that helps!&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 02 Apr 2025 13:04:53 GMT</pubDate>
    <dc:creator>Gabriel_G</dc:creator>
    <dc:date>2025-04-02T13:04:53Z</dc:date>
    <item>
      <title>STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118372#M22934</link>
      <description>&lt;P&gt;Long story short, I have recently began working at a university and I come from a Cisco background. The university is purely Extreme in switching and wireless. They have been having a problem for years where if someone does accidentally cause a loop a large portion of the campus shuts down. This has already happened a couple of times now since I started working here and is to me of the utmost importance to fix.&lt;/P&gt;&lt;P&gt;The issue lies with the 3rd party that installed the switches. They implemented ELRP only at the core. Therefore, when a loop occurs, it disables the corresponding port on the core which shuts off access to everything connecting off of it.&lt;/P&gt;&lt;P&gt;Anyways, I would like to implement STP for all of the switches. This summer, we plan to do a core upgrade. I have already setup the new core in a mlag setup. 2 7520s with the isc lag between them and mlagging two 5520s. Below is the configuration I am thinking for STP:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;SPAN&gt;create vlan stpd_bpdu tag 4064&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure vlan 4064 add ports all tagged&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;        configure stpd s0 mode dot1w&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;enable stpd s0 rapid-root-failover&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure stpd s0 default-encapsulation pvst-plus&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;enable stpd s0 auto-bind vlan 4064&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure stpd s0 ports link-type edge &lt;/SPAN&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;edge_ports&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure stpd s0 ports edge-safeguard enable &lt;/SPAN&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;edge_ports&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure stpd s0 ports bpdu-restrict enable &lt;/SPAN&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;edge_ports&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;SPAN&gt; recovery-timeout 120&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure stpd s0 tag 4064&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;configure stpd s0 ports restricted-tcn on &lt;/SPAN&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;edge_ports&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;BR /&gt;        &lt;SPAN&gt;enable stpd s0&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;In addition, the core will get:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;configure stpd s0 priority 4096&lt;BR /&gt;&lt;BR /&gt;Since stp configuration is quite a bit different than Cisco, I was wondering if this looks about right? I'm planning on introducing this to the core and then slowly rolling out towards the edge.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 31 Mar 2025 13:31:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118372#M22934</guid>
      <dc:creator>gbrown</dc:creator>
      <dc:date>2025-03-31T13:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118379#M22935</link>
      <description>&lt;P&gt;Unless you actually have rings, I'd recommend ditching STP except for STP Edgeport in access. From what you write, the problem isn't the networking staff connecting stuff irresponsibly, but users that connect stuff that cause loops, right? Extreme has a protocol called ELRP which could be an alternative to STP Edgeport, but it has limitations that I don't like personally. STP Edgeport is a generic function that will give you all the protection you need without the massive drawbacks of STP. I guess I don't have to tell you about random topology changes and switches that can't keep up when this occurs, right?&lt;/P&gt;&lt;P&gt;STP was a great invention by Radia Perlman in the 80's, but come on, we've evolved! MLAG/SMLT or SPBm (and/or CWDM/DWDM) will give you the redundancy you need without 40 year old loop resolution protocols!&lt;/P&gt;&lt;P&gt;If you still actually need to build rings, you have EAPS as an alternative, but I can't say I prefer that due to lacking stability, especially in combination with stacks. For those cases, activate STP on the ring interfaces only, nothing else. Why would you? Nobody configures EAPS, ELRP or any other loop protection on all ports "just in case" as Cisco's argument for STP is.&lt;/P&gt;&lt;P&gt;If you still insist on STP, go for root bridge prio 0. Why is everyone so afraid of setting the best value, 0??? It has absolutely no drawbacks and you protect against more cases than with 4k. In switches from other vendors it is even possible to set the system ID, so there, I set the main root bridge to 00:00:00:00:00:01 and the secondary to 00:00:00:00:00:02, both with prio 0. At least nothing can beat that even if another unit could potentially have the same prio and ID. I have seen industrial switches with prio 0 and a low numbered MAC address taking out a factory plant.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 12:48:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118379#M22935</guid>
      <dc:creator>FredrikB-NN2</dc:creator>
      <dc:date>2025-04-01T12:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118380#M22936</link>
      <description>&lt;P&gt;+1 for using ELRP on all access port, and only use STP on switch uplinks if you want.&lt;BR /&gt;You can also configure ELRP to only disable for 300 second, so the loop "pings" every 5 minutes which is helpful as it resurfaces on the logs. That is handy if your logs are being filled up by other issues, and the device/user will periodically come up again to keep it from being forgotten. Don't forget to configure it on all VLANs, and keep the frequency from overwhelming your CPU.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 13:03:44 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118380#M22936</guid>
      <dc:creator>Paul_W</dc:creator>
      <dc:date>2025-04-01T13:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118381#M22937</link>
      <description>&lt;P&gt;If you decide to go with stp, in the deployments I do, I leave spanning tree off of uplinks, and keep all the topo changes to the switch(es) in the closet.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only advantage I've found stp over elrp is the bpdu restrict, to keep other switches from being plugged into network.&amp;nbsp; If that isn't a concern I'd go ELRP, a lot simpler config.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 13:19:12 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118381#M22937</guid>
      <dc:creator>Brian_Anderson1</dc:creator>
      <dc:date>2025-04-01T13:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118384#M22939</link>
      <description>&lt;P&gt;GBrown,&lt;/P&gt;&lt;P&gt;We prefer ELRP to STP due to the fact that ELRP mitigates loops with 3rd party devices/dumb switches.&amp;nbsp; We implement ELRP at nearly all levels except the core just for that reason.&amp;nbsp; Usually in the core there are not connections to edge devices.&amp;nbsp; I think a better option may to re-do the ELRP configuration so that your dedicated uplink ports are not part ELRP, while all your edge ports are configured for ELRP.&amp;nbsp; This will also cut down on the number of ELRP packets flowing across the network uselessly.&amp;nbsp; We've found in our deployments that using ELRP to disable the offending port for 300 seconds (as someone else mentioned) is also a good practice.&lt;/P&gt;&lt;P&gt;Are you all using XMC/XIQ-SE?&amp;nbsp; Using the custom alarm feature to get more information on when a loop occurs is very beneficial.&amp;nbsp; The trap lacks information to tell where the loop is - specific port numbers.&lt;/P&gt;&lt;P&gt;It may be worthwhile to reach out to your Extreme Partner (or a different one if the partner caused this issue...) or your Extreme Engineer for additional information.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 13:43:01 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118384#M22939</guid>
      <dc:creator>Bill_Handler</dc:creator>
      <dc:date>2025-04-01T13:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118386#M22941</link>
      <description>&lt;P&gt;Hellloooo The 90's called, they want their technology back &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;.&lt;/P&gt;&lt;P&gt;I spent 15 years as a cisco engineer myself so know where you are coming from, but honestly, MSTP is a lot of work for very little gain, especially if you have MLAGS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why not roll ELRP out to the rest of the network? It's faster, safer and doesn't suffer from conversion times. You can setup ELRP exclusion ports which will listen out for ELRP loops but not lock the port.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 18:42:44 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118386#M22941</guid>
      <dc:creator>Brent_Addis</dc:creator>
      <dc:date>2025-04-01T18:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: STP Safe Implementation Plans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118392#M22944</link>
      <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;If you're interoping with Cisco, this config with PVST+ seems OK, provided that the carrier VLAN is tagged on all relevant ports. There are restrictions on using PVST+ with an untagged native VLAN.&lt;BR /&gt;&lt;BR /&gt;You do not need to add ports to STP and also auto-bind the VLAN, you can just auto-bind the VLAN to STP which will also add all current and future ports in that VLAN to STP at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're doing all Extreme, keeping the MSTP mode and dot1d encapsulation defaults is probably easier.&lt;BR /&gt;In a very basic setup, the only configuration you'd need from defaults is:&lt;/P&gt;&lt;P&gt;enable stpd s0 auto-bind vlan &amp;lt;Auto-Bind All VLANs to s0&amp;gt;&lt;BR /&gt;enable stpd s0 #Enabled by default&lt;BR /&gt;#Edge Ports&lt;BR /&gt;&lt;SPAN&gt;configure stpd &amp;lt;STPD&amp;gt; ports link-type edge &amp;lt;Ports&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;configure stpd &amp;lt;STPD&amp;gt; ports edge-safeguard enable &amp;lt;Ports&amp;gt; {recovery-timeout &amp;lt;Seconds&amp;gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;configure stpd &amp;lt;STPD&amp;gt; ports bpdu-restrict enable &amp;lt;Ports&amp;gt; {recovery-timeout &amp;lt;Seconds&amp;gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;An edge port configured with BPDU-restrict is disabled if an STP BPDU is received on the port. Equivalent to Cisco BPDU-guard.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;An edge port configured with edge-safeguard immediately enters the forwarding state and transmits BPDUs. If a loop is detected, STP disables the port. By default, an edge port without edge-safeguard configured immediately enters the forwarding state but does not transmit BPDUs unless a BPDU is received by that edge port. Equivalent to Cisco spantree portfast.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Both commands have an optional recovery-timeout, the duration that the port is disabled in either event. If the recovery-timeout period is not specified, the port is disabled permanently until manually re-enabled or the switch is rebooted.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope that helps!&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 02 Apr 2025 13:04:53 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/stp-safe-implementation-plans/m-p/118392#M22944</guid>
      <dc:creator>Gabriel_G</dc:creator>
      <dc:date>2025-04-02T13:04:53Z</dc:date>
    </item>
  </channel>
</rss>

