SlideShare una empresa de Scribd logo
1 de 60
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 2: LAN
Redundancy
Scaling Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2
2.0 Introduction
2.1 Spanning Tree Concepts
2.2 Varieties of Spanning Tree Protocols
2.3 Spanning Tree Configuration
2.4 First-Hop Redundancy Protocols
2.5 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Objectives
 Describe the issues with implementing a redundant network.
 Describe IEEE 802.1D STP operation.
 Describe the different spanning tree varieties.
 Describe PVST+ operation in a switched LAN environment.
 Describe Rapid PVST+ operation in a switched LAN environment.
 Configure PVST+ in a switched LAN environment.
 Configure Rapid PVST+ in a switched LAN environment.
 Identify common STP configuration issues.
 Describe the purpose and operation of first hop redundancy protocols.
 Describe the different varieties of first hop redundancy protocols.
 Use Cisco IOS commands to verify HSRP and GLBP
implementations.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
2.1 Spanning Tree
Concepts
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Redundancy at OSI Layers 1 and 2
Multiple cabled paths between switches:
 Provide physical redundancy in a switched network.
 Improves the reliability and availability of the network.
 Enables users to access network resources, despite path
disruption.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
MAC Database Instability
 Ethernet frames do not have a time to live (TTL) attribute.
• Frames continue to propagate between switches endlessly, or
until a link is disrupted and breaks the loop.
• Results in MAC database instability.
• Can occur due to broadcast frames forwarding.
 If there is more than one path for the frame to be forwarded out, an
endless loop can result.
• When a loop occurs, it is possible for the MAC address table
on a switch to constantly change with the updates from the
broadcast frames, resulting in MAC database instability.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
Broadcast Storms
 A broadcast storm occurs when there are so many broadcast
frames caught in a Layer 2 loop that all available bandwidth is
consumed. It is also known as denial of service
 A broadcast storm is inevitable on a looped network.
• As more devices send broadcasts over the network, more
traffic is caught within the loop; thus consuming more
resources.
• This eventually creates a broadcast storm that causes the
network to fail.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
Broadcast Storms
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
Duplicate Unicast Frames
 Unicast frames sent onto a looped network can result in duplicate
frames arriving at the destination device.
 Most upper layer protocols are not designed to recognize, or cope
with, duplicate transmissions.
 Layer 2 LAN protocols, such as Ethernet, lack a mechanism to
recognize and eliminate endlessly looping frames.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
Duplicate Unicast Frames
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introduction
 STP ensures that there is only one logical path between all
destinations on the network by intentionally blocking redundant
paths that could cause a loop.
 A port is considered blocked when user data is prevented from
entering or leaving that port. This does not include bridge protocol
data unit (BPDU) frames that are used by STP to prevent loops.
 The physical paths still exist to provide redundancy, but these
paths are disabled to prevent the loops from occurring.
 If the path is ever needed to compensate for a network cable or
switch failure, STP recalculates the paths and unblocks the
necessary ports to allow the redundant path to become active.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introduction
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introduction
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introduction
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Port Roles
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Root Bridge
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Path Cost
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
802.1D BPDU Frame Format
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
BPDU Propagation and Process
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
BPDU Propagation and Process
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Extended System ID
STP was enhanced to include support for VLANs, requiring the
VLAN ID to be included in the BPDU frame through the use of the
extended system ID
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Extended System ID
In the example, the priority of all the switches is 32769. The value is
based on the 32768 default priority and the VLAN 1 assignment
associated with each switch (32768+1).
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
2.2 Varieties of Spanning
Tree Protocols
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview
List of Spanning Tree Protocols
 STP or IEEE 802.1D-1998
 PVST+
 IEEE 802.1D-2004
 Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w
 Rapid PVST+
 Multiple Spanning Tree Protocol (MSTP) or IEEE 802.1s
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Overview
Characteristics of the Spanning Tree
Protocols
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Overview of PVST+
Networks running PVST+ have these characteristics:
 A network can run an independent IEEE 802.1D STP instance for
each VLAN in the network.
 Optimum load balancing can result.
 One spanning-tree instance for each VLAN maintained can mean
a considerable waste of CPU cycles for all the switches in the
network. In addition to the bandwidth that is used for each instance
to send its own BPDU.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Overview of PVST+
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Port States and PVST+ Operation
STP introduces the five port states:
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Extended System ID and PVST+
Operation
 In a PVST+ environment, the extended switch ID ensures each
switch has a unique BID for each VLAN.
 For example, the VLAN 2 default BID would be 32770; priority
32768, plus the extended system ID of 2.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Overview of Rapid PVST+
 RSTP is the preferred protocol for preventing Layer 2 loops in a
switched network environment.
 With Rapid PVST+, an independent instance of RSTP runs for
each VLAN.
 RSTP supports a new port type: an alternate port in discarding
state.
 There are no blocking ports. RSTP defines port states as
discarding, learning, or forwarding.
 RSTP (802.1w) supersedes STP (802.1D) while retaining backward
compatibility
 RSTP keeps the same BPDU format as IEEE 802.1D, except that
the version field is set to 2 to indicate RSTP, and the flags field
uses all 8 bits.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Overview of Rapid PVST+
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
RSTP BPDU
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Edge Ports
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Link Types
The link type can determine whether the port can immediately
transition to forwarding state. Edge port connections and point-to-
point connections are candidates for rapid transition to forwarding
state.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35
2.3 Spanning Tree
Configuration
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
Catalyst 2960 Default Configuration
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
Configuring and Verifying the Bridge ID
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
Configuring and Verifying the Bridge ID
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PortFast and BPDU Guard
 When a switch port is
configured with PortFast
that port transitions from
blocking to forwarding
state immediately.
 BPDU guard puts the port
in an error-disabled state
on receipt of a BPDU.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancing
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancing
 Another method to specify the root bridge is to set the spanning
tree priority on each switch to the lowest value so that the switch is
selected as the primary bridge for its associated VLAN.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancing
 Display and verify spanning tree configuration details.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancing
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+ Configuration
Spanning Tree Mode
Rapid PVST+ is the Cisco
implementation of RSTP. It
supports RSTP on a per-
VLAN basis.
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Analyzing the STP Topology
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Expected Topology versus Actual Topology
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Overview of Spanning Tree Status
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Spanning-Tree Failure Consequences
 STP erroneously moves
one or more ports into the
forwarding state.
 Any frame that is flooded
by a switch enters the
loop.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Repairing a Spanning Tree Problem
 One way to correct spanning-tree failure is to manually remove
redundant links in the switched network, either physically or
through configuration, until all loops are eliminated from the
topology.
 Before restoring the redundant links, determine and correct the
cause of the spanning-tree failure.
 Carefully monitor the network to ensure that the problem is fixed.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 50
2.4 First-Hop Redundancy
Protocols
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Concept of First-Hop Redundancy Protocols
Default Gateway Limitations
 If the default gateway
cannot be reached, the
local device is unable
to send packets off the
local network segment.
 Even if a redundant
router exists that could
serve as a default
gateway for that
segment, there is no
dynamic method by
which these devices
can determine the
address of a new
default gateway.
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Concept of First-Hop Redundancy Protocols
Router Redundancy
 Multiple routers are
configured to work
together to present
the illusion of a
single router to the
hosts on the LAN.
 The ability of a
network to
dynamically
recover from the
failure of a device
acting as a default
gateway is known
as first-hop
redundancy.
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Concept of First-Hop Redundancy Protocols
Steps for Router Failover
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Varieties of First-Hop Redundancy Protocols
First-Hop Redundancy Protocols
 Hot Standby Router Protocol (HSRP)
 HSRP for IPv6
 Virtual Router Redundancy Protocol version 2 (VRRPv2)
 VRRPv3
 Gateway Load Balancing Protocol (GLBP)
 GLBP for IPv6
 ICMP Router Discovery Protocol (IRDP)
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Varieties of First-Hop Redundancy Protocols
First-Hop Redundancy Protocols
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
FHRP Verification
HSRP Verification
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
FHRP Verification
GLBP Verification
 Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary
solution to allow automatic selection and simultaneous use of
multiple available gateways in addition to automatic failover
between those gateways.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58
2.5 Summary
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Summary
 IEEE 802.1D is implemented on Cisco switches on a per-VLAN
basis in the form of PVST+. This is the default configuration on
Cisco switches.
 RSTP, can be implemented on Cisco switches on a per-VLAN basis
in the form of Rapid PVST+.
 With PVST+ and Rapid PVST+, root bridges can be configured
proactively to enable spanning tree load balancing.
 First hop redundancy protocols, such as HSRP, VRRP, and GLBP
provide alternate default gateways for hosts in the switched
environment.
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Más contenido relacionado

La actualidad más candente

CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 

La actualidad más candente (20)

CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA
CCNACCNA
CCNA
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 

Similar a CCNAv5 - S3: Chapter2 Lan Redundancy

Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
parthasn83
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
CamTESOL2015
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
Lema John Michael
 

Similar a CCNAv5 - S3: Chapter2 Lan Redundancy (20)

Sca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_finalSca n instructorppt_chapter2_final
Sca n instructorppt_chapter2_final
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
57798_Lectures1415.pptx
57798_Lectures1415.pptx57798_Lectures1415.pptx
57798_Lectures1415.pptx
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Chapter 6 : Network layer
Chapter 6 : Network layerChapter 6 : Network layer
Chapter 6 : Network layer
 
Chapter 06 - Network Layer
Chapter 06 - Network LayerChapter 06 - Network Layer
Chapter 06 - Network Layer
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernet
 
SRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptxSRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptx
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_final
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
 

Más de Vuz Dở Hơi

Más de Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

CCNAv5 - S3: Chapter2 Lan Redundancy

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2 2.0 Introduction 2.1 Spanning Tree Concepts 2.2 Varieties of Spanning Tree Protocols 2.3 Spanning Tree Configuration 2.4 First-Hop Redundancy Protocols 2.5 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Objectives  Describe the issues with implementing a redundant network.  Describe IEEE 802.1D STP operation.  Describe the different spanning tree varieties.  Describe PVST+ operation in a switched LAN environment.  Describe Rapid PVST+ operation in a switched LAN environment.  Configure PVST+ in a switched LAN environment.  Configure Rapid PVST+ in a switched LAN environment.  Identify common STP configuration issues.  Describe the purpose and operation of first hop redundancy protocols.  Describe the different varieties of first hop redundancy protocols.  Use Cisco IOS commands to verify HSRP and GLBP implementations.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 2.1 Spanning Tree Concepts
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of Spanning Tree Redundancy at OSI Layers 1 and 2 Multiple cabled paths between switches:  Provide physical redundancy in a switched network.  Improves the reliability and availability of the network.  Enables users to access network resources, despite path disruption.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of Spanning Tree Issues with Layer 1 Redundancy: MAC Database Instability  Ethernet frames do not have a time to live (TTL) attribute. • Frames continue to propagate between switches endlessly, or until a link is disrupted and breaks the loop. • Results in MAC database instability. • Can occur due to broadcast frames forwarding.  If there is more than one path for the frame to be forwarded out, an endless loop can result. • When a loop occurs, it is possible for the MAC address table on a switch to constantly change with the updates from the broadcast frames, resulting in MAC database instability.
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of Spanning Tree Issues with Layer 1 Redundancy: Broadcast Storms  A broadcast storm occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed. It is also known as denial of service  A broadcast storm is inevitable on a looped network. • As more devices send broadcasts over the network, more traffic is caught within the loop; thus consuming more resources. • This eventually creates a broadcast storm that causes the network to fail.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of Spanning Tree Issues with Layer 1 Redundancy: Broadcast Storms
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of Spanning Tree Issues with Layer 1 Redundancy: Duplicate Unicast Frames  Unicast frames sent onto a looped network can result in duplicate frames arriving at the destination device.  Most upper layer protocols are not designed to recognize, or cope with, duplicate transmissions.  Layer 2 LAN protocols, such as Ethernet, lack a mechanism to recognize and eliminate endlessly looping frames.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of Spanning Tree Issues with Layer 1 Redundancy: Duplicate Unicast Frames
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Introduction  STP ensures that there is only one logical path between all destinations on the network by intentionally blocking redundant paths that could cause a loop.  A port is considered blocked when user data is prevented from entering or leaving that port. This does not include bridge protocol data unit (BPDU) frames that are used by STP to prevent loops.  The physical paths still exist to provide redundancy, but these paths are disabled to prevent the loops from occurring.  If the path is ever needed to compensate for a network cable or switch failure, STP recalculates the paths and unblocks the necessary ports to allow the redundant path to become active.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Introduction
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Introduction
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Introduction
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Port Roles
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Root Bridge
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Spanning Tree Algorithm: Path Cost
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation 802.1D BPDU Frame Format
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation BPDU Propagation and Process
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation BPDU Propagation and Process
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Extended System ID STP was enhanced to include support for VLANs, requiring the VLAN ID to be included in the BPDU frame through the use of the extended system ID
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Operation Extended System ID In the example, the priority of all the switches is 32769. The value is based on the 32768 default priority and the VLAN 1 assignment associated with each switch (32768+1).
  • 23. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23 2.2 Varieties of Spanning Tree Protocols
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview List of Spanning Tree Protocols  STP or IEEE 802.1D-1998  PVST+  IEEE 802.1D-2004  Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w  Rapid PVST+  Multiple Spanning Tree Protocol (MSTP) or IEEE 802.1s
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Overview Characteristics of the Spanning Tree Protocols
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Overview of PVST+ Networks running PVST+ have these characteristics:  A network can run an independent IEEE 802.1D STP instance for each VLAN in the network.  Optimum load balancing can result.  One spanning-tree instance for each VLAN maintained can mean a considerable waste of CPU cycles for all the switches in the network. In addition to the bandwidth that is used for each instance to send its own BPDU.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Overview of PVST+
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Port States and PVST+ Operation STP introduces the five port states:
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Extended System ID and PVST+ Operation  In a PVST+ environment, the extended switch ID ensures each switch has a unique BID for each VLAN.  For example, the VLAN 2 default BID would be 32770; priority 32768, plus the extended system ID of 2.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rapid PVST+ Overview of Rapid PVST+  RSTP is the preferred protocol for preventing Layer 2 loops in a switched network environment.  With Rapid PVST+, an independent instance of RSTP runs for each VLAN.  RSTP supports a new port type: an alternate port in discarding state.  There are no blocking ports. RSTP defines port states as discarding, learning, or forwarding.  RSTP (802.1w) supersedes STP (802.1D) while retaining backward compatibility  RSTP keeps the same BPDU format as IEEE 802.1D, except that the version field is set to 2 to indicate RSTP, and the flags field uses all 8 bits.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rapid PVST+ Overview of Rapid PVST+
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rapid PVST+ RSTP BPDU
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rapid PVST+ Edge Ports
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rapid PVST+ Link Types The link type can determine whether the port can immediately transition to forwarding state. Edge port connections and point-to- point connections are candidates for rapid transition to forwarding state.
  • 35. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35 2.3 Spanning Tree Configuration
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration Catalyst 2960 Default Configuration
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration Configuring and Verifying the Bridge ID
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration Configuring and Verifying the Bridge ID
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration PortFast and BPDU Guard  When a switch port is configured with PortFast that port transitions from blocking to forwarding state immediately.  BPDU guard puts the port in an error-disabled state on receipt of a BPDU.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration PVST+ Load Balancing
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration PVST+ Load Balancing  Another method to specify the root bridge is to set the spanning tree priority on each switch to the lowest value so that the switch is selected as the primary bridge for its associated VLAN.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration PVST+ Load Balancing  Display and verify spanning tree configuration details.
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential PVST+ Configuration PVST+ Load Balancing
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rapid PVST+ Configuration Spanning Tree Mode Rapid PVST+ is the Cisco implementation of RSTP. It supports RSTP on a per- VLAN basis.
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Configuration Issues Analyzing the STP Topology
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Configuration Issues Expected Topology versus Actual Topology
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Configuration Issues Overview of Spanning Tree Status
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Configuration Issues Spanning-Tree Failure Consequences  STP erroneously moves one or more ports into the forwarding state.  Any frame that is flooded by a switch enters the loop.
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential STP Configuration Issues Repairing a Spanning Tree Problem  One way to correct spanning-tree failure is to manually remove redundant links in the switched network, either physically or through configuration, until all loops are eliminated from the topology.  Before restoring the redundant links, determine and correct the cause of the spanning-tree failure.  Carefully monitor the network to ensure that the problem is fixed.
  • 50. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 50 2.4 First-Hop Redundancy Protocols
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Concept of First-Hop Redundancy Protocols Default Gateway Limitations  If the default gateway cannot be reached, the local device is unable to send packets off the local network segment.  Even if a redundant router exists that could serve as a default gateway for that segment, there is no dynamic method by which these devices can determine the address of a new default gateway.
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Concept of First-Hop Redundancy Protocols Router Redundancy  Multiple routers are configured to work together to present the illusion of a single router to the hosts on the LAN.  The ability of a network to dynamically recover from the failure of a device acting as a default gateway is known as first-hop redundancy.
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Concept of First-Hop Redundancy Protocols Steps for Router Failover
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Varieties of First-Hop Redundancy Protocols First-Hop Redundancy Protocols  Hot Standby Router Protocol (HSRP)  HSRP for IPv6  Virtual Router Redundancy Protocol version 2 (VRRPv2)  VRRPv3  Gateway Load Balancing Protocol (GLBP)  GLBP for IPv6  ICMP Router Discovery Protocol (IRDP)
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Varieties of First-Hop Redundancy Protocols First-Hop Redundancy Protocols
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential FHRP Verification HSRP Verification
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential FHRP Verification GLBP Verification  Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary solution to allow automatic selection and simultaneous use of multiple available gateways in addition to automatic failover between those gateways.
  • 58. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58 2.5 Summary
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Summary  IEEE 802.1D is implemented on Cisco switches on a per-VLAN basis in the form of PVST+. This is the default configuration on Cisco switches.  RSTP, can be implemented on Cisco switches on a per-VLAN basis in the form of Rapid PVST+.  With PVST+ and Rapid PVST+, root bridges can be configured proactively to enable spanning tree load balancing.  First hop redundancy protocols, such as HSRP, VRRP, and GLBP provide alternate default gateways for hosts in the switched environment.
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential