cancel
Showing results for 
Search instead for 
Did you mean: 

rstp juniper

rstp juniper

ahmed_Ahmed
New Contributor
i have a prob to applicate rstp between extreme 480e and a juniper switch
14 REPLIES 14

ahmed_Ahmed
New Contributor
""""""""SOLVED"""""""""  😄
this is my config

extrem conf
* Slot-1 Stack.1 # sh conf#
# Module devmgr configuration.
#
configure slot 1 module X450e-48p
configure sys-recovery-level slot 1 reset

#
# Module vlan configuration.
#
configure vlan default delete ports all
configure vr VR-Default delete ports 1:1-50
configure vr VR-Default add ports 1:1-50
configure vlan default delete ports 1:1-10
create vlan "vlan-test"
configure vlan vlan-test tag 100
configure vlan Default add ports 1:11-50 untagged
configure vlan vlan-test add ports 1:1-10 tagged
configure vlan Mgmt ipaddress 192.168.1.100 255.255.255.0
configure vlan vlan-test ipaddress 10.10.10.1 255.255.255.0
enable ipforwarding vlan vlan-test

#
# Module fdb configuration.
#

#
# Module rtmgr configuration.
#

#
# Module mcmgr configuration.
#

#
# Module aaa configuration.
#

#
# Module acl configuration.
#

#
# Module bfd configuration.
#

#
# Module cfgmgr configuration.
#

#
# Module dosprotect configuration.
#

#
# Module dot1ag configuration.
#

#
# Module eaps configuration.
#

#
# Module edp configuration.
#

#
# Module elrp configuration.
#

#
# Module ems configuration.
#

#
# Module epm configuration.
#

#
# Module erps configuration.
#

#
# Module esrp configuration.
#

#
# Module ethoam configuration.
#

#
# Module etmon configuration.
#

#
# Module exsshd configuration.
#
enable ssh2

#
# Module hal configuration.
#

#
# Module idMgr configuration.
#

#
# Module ipSecurity configuration.
#

#
# Module ipfix configuration.
#

#
# Module lldp configuration.
#

#
# Module mrp configuration.
#

#
# Module msdp configuration.
#

#
# Module netLogin configuration.
#

#
# Module netTools configuration.
#

#
# Module poe configuration.
#

#
# Module rip configuration.
#

#
# Module r.png configuration.
#

#
# Module snmpMaster configuration.
#

#
# Module stp configuration.
#
configure mstp region Location1
configure stpd s0 delete vlan default ports all
disable stpd s0 auto-bind vlan default
configure stpd s0 mode mstp cist
configure stpd s0 priority 0
create stpd s1
configure stpd s1 mode mstp msti 1
configure stpd s1 priority 4096
enable stpd s1 auto-bind vlan vlan-test
configure stpd s0 ports mode dot1d 1:1
configure stpd s0 ports cost 50 1:1
configure stpd s0 ports port-priority 128 1:1
configure stpd s0 ports link-type point-to-point 1:1
configure stpd s0 ports edge-safeguard enable 1:1
configure stpd s0 ports bpdu-restrict enable 1:1
enable stpd s0 ports 1:1
configure stpd s0 ports mode dot1d 1:2
configure stpd s0 ports cost 50 1:2
configure stpd s0 ports port-priority 128 1:2
configure stpd s0 ports link-type point-to-point 1:2
configure stpd s0 ports edge-safeguard enable 1:2
configure stpd s0 ports bpdu-restrict enable 1:2
enable stpd s0 ports 1:2
configure stpd s0 ports mode dot1d 1:3
configure stpd s0 ports cost 50 1:3
configure stpd s0 ports port-priority 128 1:3
configure stpd s0 ports link-type point-to-point 1:3
configure stpd s0 ports edge-safeguard enable 1:3
configure stpd s0 ports bpdu-restrict enable 1:3
enable stpd s0 ports 1:3
configure stpd s0 ports mode dot1d 1:4
configure stpd s0 ports cost 50 1:4
configure stpd s0 ports port-priority 128 1:4
configure stpd s0 ports link-type point-to-point 1:4
configure stpd s0 ports edge-safeguard enable 1:4
configure stpd s0 ports bpdu-restrict enable 1:4
enable stpd s0 ports 1:4
configure stpd s0 ports mode dot1d 1:5
configure stpd s0 ports cost 50 1:5
configure stpd s0 ports port-priority 128 1:5
configure stpd s0 ports link-type point-to-point 1:5
configure stpd s0 ports edge-safeguard enable 1:5
configure stpd s0 ports bpdu-restrict enable 1:5
enable stpd s0 ports 1:5
configure stpd s0 ports mode dot1d 1:6
configure stpd s0 ports cost 50 1:6
configure stpd s0 ports port-priority 128 1:6
configure stpd s0 ports link-type point-to-point 1:6
configure stpd s0 ports edge-safeguard enable 1:6
configure stpd s0 ports bpdu-restrict enable 1:6
enable stpd s0 ports 1:6
configure stpd s0 ports mode dot1d 1:7
configure stpd s0 ports cost 50 1:7
configure stpd s0 ports port-priority 128 1:7
configure stpd s0 ports link-type point-to-point 1:7
configure stpd s0 ports edge-safeguard enable 1:7
configure stpd s0 ports bpdu-restrict enable 1:7
enable stpd s0 ports 1:7
configure stpd s0 ports mode dot1d 1:8
configure stpd s0 ports cost 50 1:8
configure stpd s0 ports port-priority 128 1:8
configure stpd s0 ports link-type point-to-point 1:8
configure stpd s0 ports edge-safeguard enable 1:8
configure stpd s0 ports bpdu-restrict enable 1:8
enable stpd s0 ports 1:8
configure stpd s0 ports mode dot1d 1:9
configure stpd s0 ports cost 50 1:9
configure stpd s0 ports port-priority 128 1:9
configure stpd s0 ports link-type point-to-point 1:9
configure stpd s0 ports edge-safeguard enable 1:9
configure stpd s0 ports bpdu-restrict enable 1:9
enable stpd s0 ports 1:9
configure stpd s0 ports mode dot1d 1:10
configure stpd s0 ports cost 50 1:10
configure stpd s0 ports port-priority 128 1:10
configure stpd s0 ports link-type point-to-point 1:10
configure stpd s0 ports edge-safeguard enable 1:10
configure stpd s0 ports bpdu-restrict enable 1:10
enable stpd s0 ports 1:10
configure stpd s1 ports mode dot1d 1:1
configure stpd s1 ports cost auto 1:1
configure stpd s1 ports port-priority 128 1:1
configure stpd s1 ports link-type point-to-point 1:1
configure stpd s1 ports edge-safeguard enable 1:1
enable stpd s1 ports 1:1
configure stpd s1 ports mode dot1d 1:2
configure stpd s1 ports cost auto 1:2
configure stpd s1 ports port-priority 128 1:2
configure stpd s1 ports link-type point-to-point 1:2
configure stpd s1 ports edge-safeguard enable 1:2
enable stpd s1 ports 1:2
configure stpd s1 ports mode dot1d 1:3
configure stpd s1 ports cost auto 1:3
configure stpd s1 ports port-priority 128 1:3
configure stpd s1 ports link-type point-to-point 1:3
configure stpd s1 ports edge-safeguard enable 1:3
enable stpd s1 ports 1:3
configure stpd s1 ports mode dot1d 1:4
configure stpd s1 ports cost auto 1:4
configure stpd s1 ports port-priority 128 1:4
configure stpd s1 ports link-type point-to-point 1:4
configure stpd s1 ports edge-safeguard enable 1:4
enable stpd s1 ports 1:4
configure stpd s1 ports mode dot1d 1:5
configure stpd s1 ports cost auto 1:5
configure stpd s1 ports port-priority 128 1:5
configure stpd s1 ports link-type point-to-point 1:5
configure stpd s1 ports edge-safeguard enable 1:5
enable stpd s1 ports 1:5
configure stpd s1 ports mode dot1d 1:6
configure stpd s1 ports cost auto 1:6
configure stpd s1 ports port-priority 128 1:6
configure stpd s1 ports link-type point-to-point 1:6
configure stpd s1 ports edge-safeguard enable 1:6
enable stpd s1 ports 1:6
configure stpd s1 ports mode dot1d 1:7
configure stpd s1 ports cost auto 1:7
configure stpd s1 ports port-priority 128 1:7
configure stpd s1 ports link-type point-to-point 1:7
configure stpd s1 ports edge-safeguard enable 1:7
enable stpd s1 ports 1:7
configure stpd s1 ports mode dot1d 1:8
configure stpd s1 ports cost auto 1:8
configure stpd s1 ports port-priority 128 1:8
configure stpd s1 ports link-type point-to-point 1:8
configure stpd s1 ports edge-safeguard enable 1:8
enable stpd s1 ports 1:8
configure stpd s1 ports mode dot1d 1:9
configure stpd s1 ports cost auto 1:9
configure stpd s1 ports port-priority 128 1:9
configure stpd s1 ports link-type point-to-point 1:9
configure stpd s1 ports edge-safeguard enable 1:9
enable stpd s1 ports 1:9
configure stpd s1 ports mode dot1d 1:10
configure stpd s1 ports cost auto 1:10
configure stpd s1 ports port-priority 128 1:10
configure stpd s1 ports link-type point-to-point 1:10
configure stpd s1 ports edge-safeguard enable 1:10
enable stpd s1 ports 1:10
enable stpd s0
enable stpd s1

#
# Module telnetd configuration.
#

#
# Module tftpd configuration.
#

#
# Module thttpd configuration.
#

#
# Module vmt configuration.
#

#
# Module vsm configuration.
#

and this is my juniper 4200 config

root@switch4200# run show configuration## Last commit: 2010-01-01 08:58:37 UTC by root
version 15.1R5.5;
system {
host-name switch4200;
auto-snapshot;
time-zone europe/paris;
root-authentication {
encrypted-password "[removed]"; ## SECRET-DATA
}
services {
ftp;
ssh;
telnet;
web-management {
http;
}
dhcp {
pool 10.10.10.10/24 {
router {
10.10.10.15;
}
}
}
}
syslog {
user * {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
archival {
configuration {
transfer-on-commit;
archive-sites {
":/archive]ftp://@[IP_removed]:/archive" password "[removed]"; ## SECRET-DATA
}
}
}
ntp {
server 10.10.10.1;
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family ethernet-switching {
vlan {
members vlan100;
}
}
}
}
ge-0/0/1 {
unit 0 {
family ethernet-switching {
vlan {
members vlan100;
}
}
}
}
ge-0/0/2 {
unit 0 {
family ethernet-switching {
port-mode trunk;
vlan {
members vlan100;
}
}
}
}
ge-0/0/3 {
unit 0 {
family ethernet-switching {
port-mode trunk;
vlan {
members vlan100;
}
}
}
}
ge-0/0/4 {
unit 0 {
family ethernet-switching {
port-mode trunk;
vlan {
members vlan100;
}
}
}
}
ge-0/0/5 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/6 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/7 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/8 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/9 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/10 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/11 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/12 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/13 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/14 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/15 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/16 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/17 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/18 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/19 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/20 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/21 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/22 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/23 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/24 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/25 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/26 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/27 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/28 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/29 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/30 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/31 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/32 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/33 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/34 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/35 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/36 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/37 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/38 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/39 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/40 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/41 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/42 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/43 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/44 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/45 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/46 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/47 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/48 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/49 {
unit 0 {
family ethernet-switching;
}
}
ge-0/0/50 {
unit 0 {
family ethernet-switching;
}
}
xe-0/1/0 {
unit 0 {
family ethernet-switching;
}
}
xe-0/1/1 {
unit 0 {
family ethernet-switching;
}
}
xe-0/1/2 {
unit 0 {
family ethernet-switching;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.2.2/24;
address 192.168.3.3/24;
address 192.168.4.4/24;
address 192.168.5.5/24;
address 192.168.6.6/24;
}
}
}
me0 {
unit 0 {
family inet {
address 192.168.1.150/24;
}
}
}
vlan {
unit 0 {
family inet {
address 10.10.10.10/24;
}
}
}
}
snmp {
trap-group interfaces {
categories {
link;
}
targets {
10.210.14.173;
}
}
}
routing-options {
static {
route 10.10.10.0/30 next-hop 12.12.12.2;
route 20.20.20.0/30 next-hop 12.12.12.2;
route 30.30.30.0/24 next-hop 50.50.50.1;
}
}
protocols {
rstp {
interface ge-0/0/0.0 {
edge;
}
interface ge-0/0/1.0 {
cost 20000;
}
interface ge-0/0/2.0 {
edge;
}
interface ge-0/0/3.0 {
edge;
}
interface ge-0/0/4.0 {
edge;
}
}
}
firewall {
family ethernet-switching {
filter filter-test {
interface-specific;
term term-one {
from {
source-address {
10.10.10.10/32;
}
}
then discard;
}
}
}
}
virtual-chassis {
member 0 {
mastership-priority 255;
}
}
ethernet-switching-options {
storm-control {
interface all;
}
}
vlans {
vlan100 {
vlan-id 100;
l3-interface vlan.0;
}
}
poe {
interface all;
}

{master:0}[edit]
root@switch4200#

And THX 4 every one 

Erik_Auerswald
Contributor II
Hi,

there is a relatively new GTAC Knowledge article describing how to use MSTP on EXOS to create a spanning tree configuration that is compatible with other standard compatible switches, e.g. the EOS default config, but also JunOS:

How To Configure Spanning Tree on EXOS Switch to Connect to EOS Switch Running Default Spanning Tree...

I think this MSTP config is better than using RSTP on EXOS, but it requires a relatively recent EXOS version that can put ports into the MST CIST. Old(er) EXOS versions could not associate ports with only the CIST, the port needed to be added to an additional instance.

MSTP is compatible with RSTP.

Thanks,
Erik

ahmed_Ahmed
New Contributor
hello again  😄

*Slot-1 Stack.11 # configure stpd s0 mode dot1w* Slot-1 Stack.14 # create vlan rstp-test
* Slot-1 Stack.15 # configure vlan "rstp-test" add ports 1:1-3
* Slot-1 Stack.16 # enable stpd "s0" auto-bind vlan "rstp-test"
* Slot-1 Stack.18 # configure stpd "s0" add "rstp-test" ports 1:1-3
* Slot-1 Stack.19 # enable stpd "s0"
Error: Please configure a stpd dot1q tag first

Yeah, RSTP configuration on EXOS is quite involved, because it is very flexible...

The RSTP needs to have a tag on EXOS, but it needs to have one VLAN configured as untagged (configure vlan NAME add ports PORT untagged) on each port that is to participate in RSTP.

MSTP is the better RSTP, because it is easier to configure on EXOS. 

because i was thinkin that the "untagged vlan on any port participating in RSTP" solution is to do not define a tag for the vlan 😞

GTM-P2G8KFN