Over the years we've built a couple of Meraki sites but seem to have ended up with slightly different configs & conflicting advice re root & loop guard usage. Previously had months of site stability until recent core switch MLAG additions appears to have kicked off a bunch of weirdness like 'Port running LACP and LACP has disabled this port' madness knocking out a bunch of links unexpecting. Firmware updating seems to have helped a lot, but I'm in need of a sanity check to clarify what Meraki's best practices for spanning tree. Is this the recommended STP & UDLD config for a LACP trunk between a stacked MS425 core & MS225 access switches? Inter-Meraki Switch trunk - AGGR/x (Core-side)
Type = Trunk
Native = 1 Allowed = all (or as required) RSTP = Enabled STP Guard = Root Guard UDLD = Alert Inter-Meraki Switch trunk - AGGR/x (Access-Stack-side) Type = Trunk
Native = 1 Allowed = all (or as required) RSTP = Enabled STP Guard = Loop Guard
UDLD = Enforce
And whilst we're on the topic.... All end devices, computers, servers, users, etc Type = Access RSTP = Enabled STP Guard = BPDU Guard UDLD = Alert Only Non-Meraki Wi-Fi Access Point with VLANs Type = Trunk
STP Guard = Root Guard
UDLD = Alert Only
Non-Meraki Switch with VLANs & any inbound STP not to be trusted Type = Trunk STP Guard = Root Guard
UDLD = Alert Only Unmanaged Switch Type = Access
STP Guard = BPDU Guard Non-Meraki Firewall cluster, LACP Trunk to each HA Node - no STP support since failing over results in MAC address jumping between ports Type = trunk
RSTP = Disabled Native VLAN = 1 Allowed VLAN = (selected ID's as required) UDLD = Alert Only Trusted DAI not enabled globally, so that's not a factor. Thanks in advance!
... View more