STP recommendation for connecting to non-meraki switches

Mark-SPS
Here to help

STP recommendation for connecting to non-meraki switches

Hi All,

 

We only have Meraki switches in our network, but we connect directly with a partner network who doesn't.

 

Basically two of our switches connect directly with their two of their Catalyst 3560 switches.

 

Could these switches cause STP issues with our Meraki switches?

 

Currently the STP Guard is disabled for these ports, as under no circumstances can these connections be blocked.

 

It's been running this way for years, without any obvious issues, but I was wondering what potential issues there could be and how to protect against it.

 

The trigger for this was that today a trunk port on a different switch went to "STP root guard activated" today.

 

Thanks Mark

7 Replies 7
alemabrahao
Kind of a big deal

Not necessarily, it depends on how STP is configured on the 3560. In this case, it is recommended that multiple spanning-tree be configured on the catalyst switch.

 

https://documentation.meraki.com/MS/Port_and_VLAN_Configuration/Configuring_Spanning_Tree_on_Meraki_...)

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
michalc
Meraki Employee
Meraki Employee

Hi @Mark-SPS ,

 

I'd recommend verifying STP type used by your non-meraki switches and review our STP Protocol interoperability KB.

Another recommendation would be properly electing root bridge on your network as per our articles 1 and 2.

Lastly I'd recommend enabling STP guard on your switchports as per the linked KB.

Most importantly I'd ensure BPDU guard is enabled on all access layer ports.

 

Hope it helps a little 🙂 

If you found this post helpful, please give it kudos. If it solved your problem, click "accept as solution" so that others can benefit from it.
michalc
Meraki Employee
Meraki Employee

My apologies! It looks like I don't know how to hyperlink 😑  Please see the last hyperlink fixed here.

If you found this post helpful, please give it kudos. If it solved your problem, click "accept as solution" so that others can benefit from it.
PhilipDAth
Kind of a big deal
Kind of a big deal

>Could these switches cause STP issues with our Meraki switches?

 

Yes if there is a loop.  On the Cisco 3560's you should use:

spanning-tree mode mst

 

Note there will be a 30s to 60s outage when this command is applied.

Tony-Sydney-AU
Meraki Employee All-Star Meraki Employee All-Star
Meraki Employee All-Star

Yes, @PhilipDAth good point! If you change the STP type on the CORE, then it triggers STP to restart and converge again. So We would see a 30 to 60 seconds outage.

 

In summary: always do your changes in a maintenance window.🤓

If you found this post helpful, please give it kudos. If my answer solved your problem, click "accept as solution" so that others can benefit from it.
Tony-Sydney-AU
Meraki Employee All-Star Meraki Employee All-Star
Meraki Employee All-Star

Hello everyone!

 

Hope you're doing great! That's a very interesting discussion.

 

TL/DR: only configure Root Guard in your CORE switch on trunk ports connecting to downstream switches; only configure BPDU Guard on ports connecting to end-user devices/hosts and never on a trunk connecting to any switch; Meraki switches can only run Rapid Spanning Tree so make sure STP types are compatible by running RSTP on all switches or tweak MSTP to be more like RSTP.

 

@michalc made a good point about compatibility between spanning tree types and interoperability, while @alemabrahao also raised a point to how STP is configured in Catalyst 3560.

 

To your point, @alemabrahao , it's true that the best action would be just to change STP type on the 3560s to RSTP so then every switch would run the same and the root election would be predictable.

 

However, not all IOS firmware offer you RSTP. An even more compatible approach would be to run MSTP (check if your IOS supports - most likely yes, it does). But MSTP needs some tweaks:

 

  1. Single instance (0); running single instance 0 means there will be only one single STP process running in memory
  2. single region (region1), and single revision (revision 1); doing this together with step-1 basically makes MSTP behave like RSTP
  3. have your trunk ports configured as Native VLAN 1 and switch Management IP in VLAN1; you must to this because VLAN1 is used by MSTP to interact with other STP types

 

Making MSTP more compatible is described on section "Enable RSTP Globally" in Configuring Spanning Tree on Meraki Switches (MS).

 

Having said that, I want to dial back to the issue that raised @Mark-SPS 's post: "The trigger for this was that today a trunk port on a different switch went to "STP root guard activated" today."

 

@Mark-SPS , I need you to be careful when configuring STP Guard options. In a nutshell:

 

  1. Root Guard will protect the switch from losing the STP election or changing the current Root. The way Root Guard protection does it is by transition the port to an STP-inconsistent state it the ports receives a superior BPDU (i.e. a STP management packet showing there's a better Root); the port in this state still processes BPDUs but will not learn MAC addresses or forward traffic. As a result, hosts upstream that port won't be reachable and you may lose access to your switch until the previous Root gets elected again. This is why you only configure Root Guard in your CORE switch on trunk ports connecting to downstream switches.
  2.  BPDU Guard protects the switch against "alien switches" and small loops. The way it does this is by putting port in a disabled state if it receives any BPDU at all. So if someone messes with the cables and create a loop or maybe if someone connects a hub or switch, the port would receive BPDU and then shutdown. This protection is useful when you are 100% positive that the devices connecting to this port will be only ip-phones and end-user hosts. This is why you only configure BPDU Guard on Access port type - never on a trunk connecting to any switch, as @michalc suggested.
  3. Loop Guard protects your switch from an exceptional situation where a switch believes there's a loop and starts transitioning port states and trying to check root election. It's recommended to configure this protection on redundant ports connecting to non-root downstream switches and also enable UDLD together with this.

 

Lastly, @Mark-SPS , you mentioned "Currently the STP Guard is disabled for these ports, as under no circumstances can these connections be blocked." I'm assuming your Catalyst 3560 upstream is your CORE switch and it has STP Root role. If that's the case here, then don't configure any STP Guard option on the Meraki switches' trunk ports connecting upstream to your CORE.


Hope this information is useful. Feel free to post here anytime if you have further questions / concerns.

If you found this post helpful, please give it kudos. If my answer solved your problem, click "accept as solution" so that others can benefit from it.
Mark-SPS
Here to help

Thanks everyone for all the feedback. That's a lot of info to go through and investigate.

Since we don't control or know anything about the 3560 switches, it will take some collaboration to see what is currently setup and what needs to be fixed.

 

More info to come.

Get notified when there are additional replies to this discussion.