cancel
Showing results for 
Search instead for 
Did you mean: 

How to configure PVST+ between x450-G2 and a CISCO

How to configure PVST+ between x450-G2 and a CISCO

Victor_Sumano
New Contributor

I have a Cisco Switch as a Core, and I have 3 Stack of X450-G2 each ones, I have a lot of topology Changes, hundreds per day. The topology it’s a star so I have 1 port from the cisco to 1 port to each one of my stacks.

Cisco is configure with PVST+, so I need some help to understand how to configure in my EXOS switches.

All my trunk ports on my stacks are 1:52. the mac address for my root its the cisco, but I have MSTP configured

I’ve been reading a lot of gtac knowledge articles, and some other here, but each one, of course, are diferent. 

Can some one help me how to configure in my EXOS switches.

This is the actual status of stpd:

Slot-2 MDF_Stack_7.1 # show stpd detail 

Stpd: s0        Stp: ENABLED        Number of Ports: 202
Rapid Root Failover: Disabled
Operational Mode: MSTP            Default Binding Mode: 802.1D
MSTI Instance:     CIST
802.1Q Tag: (none)
Ports: 1:6,1:7,1:9,1:10,1:11,1:12,1:13,1:14,1:15,1:16,
       1:17,1:18,1:19,1:20,1:21,1:22,1:23,1:24,1:25,1:26,
       1:27,1:28,1:29,1:30,1:31,1:32,1:33,1:34,1:35,1:36,
       1:37,1:38,1:39,1:40,1:41,1:42,1:43,1:44,1:45,1:46,
       1:47,1:48,1:49,1:50,1:51,1:52,2:1,2:2,2:3,2:4,
       2:5,2:6,2:7,2:8,2:9,2:10,2:11,2:12,2:13,2:14,
       2:15,2:16,2:17,2:18,2:19,2:20,2:21,2:22,2:23,2:24,
       2:25,2:26,2:27,2:28,2:29,2:30,2:31,2:32,2:33,2:34,
       2:35,2:36,2:37,2:38,2:39,2:40,2:41,2:42,2:43,2:44,
       2:45,2:46,2:47,2:48,2:49,2:50,2:51,2:52,3:1,3:2,
       3:3,3:4,3:5,3:6,3:7,3:8,3:9,3:10,3:11,3:12,
       3:13,3:14,3:15,3:16,3:17,3:18,3:19,3:20,3:21,3:22,
       3:23,3:24,3:25,3:26,3:27,3:28,3:29,3:30,3:31,3:32,
       3:33,3:34,3:35,3:36,3:37,3:38,3:39,3:40,3:41,3:42,
       3:43,3:44,3:45,3:46,3:47,3:48,3:49,3:50,3:51,3:52,
       4:1,4:2,4:3,4:4,4:5,4:6,4:7,4:8,4:9,4:10,
       4:11,4:12,4:13,4:14,4:15,4:16,4:17,4:18,4:19,4:20,
       4:21,4:22,4:23,4:24,4:25,4:26,4:27,4:28,4:29,4:30,
       4:31,4:32,4:33,4:34,4:35,4:36,4:37,4:38,4:39,4:40,
       4:41,4:42,4:43,4:44,4:45,4:46,4:47,4:48,4:49,4:50,
       4:51,4:52
Participating Vlans: Administracion,CCTV_Control_de_Acceso,Default,Etherne,Ethernet_Adicional,
                     Printing,RED_192_168_150_0-24,Servers,Transporte,Videoconferencia,
                     VoIP,Wifi_Global,Wifi_Group,WiFi_Guest
Auto-bind Vlans: Administracion,CCTV_Control_de_Acceso,Default,Etherne,Ethernet_Adicional,
                     Printing,RED_192_168_150_0-24,Servers,Transporte,Videoconferencia,
                     VoIP,Wifi_Global,Wifi_Group,WiFi_Guest
Bridge Priority            : 32768        Bridge Priority Mode: 802.1t
Operational Bridge Priority: 32768
BridgeID            : 80:00:02:04:96:b4:16:c6
Designated root        : 40:01:00:d6:fe:c3:ce:00
CIST Root            : 40:01:00:d6:fe:c3:ce:00
CIST Regional Root        : 80:00:02:04:96:b4:16:c6
External RootPathCost      : 20000     Internal RootPathCost: 0 
Root Port   : 1:52      
MaxAge      : 20s    HelloTime     : 2s    ForwardDelay     : 15s
CfgBrMaxAge : 20s     CfgBrHelloTime: 2s    CfgBrForwardDelay: 15s
RemainHopCount: 20    CfgMaxHopCount: 20
Topology Change Time           : 35s        Hold time        : 1s
Topology Change Detected       : FALSE        Topology Change  : FALSE
Number of Topology Changes     : 36364
Time Since Last Topology Change: 911s
Topology Change initiated locally on Port 1:52
Topology Change last received on Port 1:52 from 00:d6:fe:c3:ce:01
Backup Root               : Off       Backup Root Activated  : FALSE
Loop Protect Event Window : 180s        Loop Protect Threshold : 3
New Root Trap             : On         Topology Change Trap   : Off
Tx Hold Count             : 6
Participating VLANs:
VLAN                                     Tag    Number of Ports
          Ports  
-------------------------------------------------------------------------------
Administracion                           15     19    
          1:7(F),1:17(D),1:29(F),1:30(F),1:31(F),1:38(D),1:39(F),1:40(F),
          1:41(F),1:42(F),1:43(D),1:44(F),1:45(F),1:46(F),1:47(F),1:48(D),
          1:51(D),1:52(F),3:48(D)
CCTV_Control_de_Acceso                   11     35    
          1:51(D),1:52(F),2:1(F),2:3(F),2:5(F),2:6(F),2:7(F),2:9(F),
          2:11(F),2:13(F),2:15(F),2:17(F),2:19(F),2:20(F),2:21(F),2:23(F),
          2:25(F),2:27(F),2:29(F),2:31(F),2:33(F),2:35(F),2:37(F),2:38(F),
          2:39(F),2:40(F),2:41(F),2:42(F),2:43(F),2:44(D),2:45(F),2:46(D),
          2:47(F),2:48(F),3:48(D)
 

 

1 REPLY 1

BradP
Extreme Employee

Hi Victor, 

 

Please see the following document: 

https://extremeportal.force.com/ExtrArticleDetail?an=000079698

 

Also, pelase be aware that we cannot add the native vlan because Cisco’s implementation is proprietary when it includes the native vlan.

 

Thanks
Brad

GTM-P2G8KFN