Solved

Cisco Switch:  If portfast is used on all non trunks ports will this cause an issue with determining the root bridge or domain?

Posted on 2012-04-04
2
440 Views
Last Modified: 2012-04-05
If portfast is used on all non trunks ports will this cause an issue with determining the root bridge or domain? What is the switch is the root bridge and what if it is not?
0
Comment
Question by:dsterling
2 Comments
 
LVL 10

Accepted Solution

by:
Netty earned 300 total points
ID: 37809525
(Sorry for my English)
1. No (if the ports are connected to the end stations)
2. To determining root bridge you can use next command:
#show spanning tree root

Look at this document "Understanding and Configuring Spanning Tree Protocol (STP) on Catalyst Switches"
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_configuration_example09186a008009467c.shtml
and this "Configuring STP Features"
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.1E/native/configuration/guide/stp_enha.html#wp1022412
0
 
LVL 15

Assisted Solution

by:Nayyar HH (CCIE RS)
Nayyar HH (CCIE RS) earned 200 total points
ID: 37811453
If portfast is enabled on all non-trunk ports (that is access ports) this will not cause an issue as long as no switch is connected to these ports - only edge devices should be connected to these ports e.g. PC, printer, video camera

If the switch is the root switch or not - the above must be adhered to else a layer-2 loop could be introduced into the network
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now