1
0
Fork 0
mirror of https://gitlab.com/netravnen/NetworkLabNotes.git synced 2024-11-29 19:37:53 +00:00

Updated info on udld and loopguard

This commit is contained in:
chhan11 2017-05-28 20:50:23 +02:00
parent ee476ba3dd
commit 620de4040d

View file

@ -255,6 +255,7 @@ Cisco did on their part early on enhance the original spanning tree standard wit
\item Enabled per-port\\\cliline{switch(config-if)# spanning-tree guard loop} \item Enabled per-port\\\cliline{switch(config-if)# spanning-tree guard loop}
\item Enabled globally\\\cliline{switch(config)# spanning-tree loopguard default} {\small only on p2p links} \item Enabled globally\\\cliline{switch(config)# spanning-tree loopguard default} {\small only on p2p links}
\item Works on per-vlan basis when PVSTP is used. \item Works on per-vlan basis when PVSTP is used.
\item On ether-channel links with uni-directional link failures, loop guard will put put the whole ether-channel into loop-inconsistent state.
\end{itemize} \end{itemize}
\item \textbf{Beware} root and loop guard is mutually exclusive \item \textbf{Beware} root and loop guard is mutually exclusive
\begin{itemize} \begin{itemize}
@ -271,10 +272,28 @@ Cisco did on their part early on enhance the original spanning tree standard wit
\item By default only enables on fiber optic links. \item By default only enables on fiber optic links.
\item Works by sending packes every 15 seconds (default timer). If not packet is recieved back, the port can either log (default) a messaage or actively try to re-establish the link (aggresive). 1 packet/second for 8 sec. is send. If non is returned the port will go to \texttt{err-disable} state. \item Works by sending packes every 15 seconds (default timer). If not packet is recieved back, the port can either log (default) a messaage or actively try to re-establish the link (aggresive). 1 packet/second for 8 sec. is send. If non is returned the port will go to \texttt{err-disable} state.
\item \cliline{switch(config)# udld \{enable | aggresive\}} \item \cliline{switch(config)# udld \{enable | aggresive\}}
\item \item On ether-channel links with uni-directional link failures, udld will disable individual failed links.
\item For the best protection. Aggresive mode is recommended.
\item It is recommended to turn on udld in global conf mode.
\item FlexLinks \item FlexLinks
\end{itemize} \end{itemize}
\begin{table}[h]
\centering
\caption{UDLD|Loopguard compared}
\label{udldloopguard}
\resizebox{\textwidth}{!}{%
\begin{tabular}{|l|l|l|}
\hline
\textbf{Functionality} & \textbf{Loop guard} & \textbf{UDLD} \\ \hline
Action granularity & Per vlan & Per port \\ \hline
Protection against stp failures caused by uni-directional links & Yes, when enabled on all potential non-designated ports in redundant topology & Yes, when enabled on all links in redundant topology \\ \hline
Protection against stp failures caused by problem in software resulting in designated switch not sending bpdus & Yes & No \\ \hline
Protection against mis-wiring & No & Yes \\ \hline
\end{tabular}%
}
\end{table}
\section*{Online Ressources on STP} \section*{Online Ressources on STP}
\begin{itemize} \begin{itemize}