Understanding the Impact of BPDU Guard and BPDU Filter with Stratix 5700 Switches and PortFast Configuration

Question:

Hello everyone, I have been experimenting with 2 Stratix switches in my testing setup to observe how various configurations impact the behavior when 2 managed switches are linked. By default, the configuration is set to MSTP with the options for BPDU Guard and BPDU Filter enabled. Question 1: Do these options apply globally to access ports, or are they specifically for ports where PortFast is activated? Question 2: Considering their different purposes, is there a need to have both options activated? It appears that they serve distinct functions, and if PortFast is activated, having BPDU Guard only would suffice. I am just scratching the surface of the features related to spanning tree and would love to hear different perspectives. Update: Initially, I encountered an issue where connecting the two switches resulted in all ports being blocked for approximately 10 seconds. Enabling PortFast on access ports and establishing trunking between the switches seemed to resolve this problem.

Top Replies

While experimenting, I disabled BPDU filtering to observe any changes in behavior. Upon attempting to re-enable it, I received an error message stating that "BPDU Guard and BPDU Filter cannot be activated simultaneously." This sheds light on the situation, but I am curious as to why both features are initially enabled globally.

It is recommended to have both BPDU Guarding and Filter enabled for optimal network security. This may be a GUI-related issue, so make sure to keep both options checked for proper operation. BPDU plays a crucial role in safeguarding your network against malicious attacks.

The BPDU Filter feature is a useful tool to prevent BPDU guard from triggering on a per port basis. This option is ideal for scenarios where you need to connect a switch to a specific port but do not want it to interact with Spanning Tree Protocol (STP) or risk being shutdown by BPDU Guard. By filtering out BPDU packets, you can ensure smooth connectivity without the risk of disruption. It's recommended to check if BPDU Filter is enabled globally by using the CLI and reviewing the configuration settings. Typically, ports with portfast enabled may automatically go into err-disable mode when BPDU Guard is triggered. To avoid this, it's advisable to assign the appropriate macro settings to the ports before connecting any devices.

Hi there, In response to your first query, BPDU Guard and BPDU Filter are not only specific to PortFast activated ports. They can indeed apply to all access ports, regardless of their PortFast status. However, it's worth noting that these options function differently depending on the status of PortFast on the port. As for your second question, whether or not you need both options enabled truly depends on your network's unique requirements and design. It's true that these functions serve different purposes with BPDU Filter ignoring received BPDUs, while BPDU Guard disables the port upon receiving BPDU. So, their simultaneous use can occasionally lead to unforeseen network issues. Yet, in many scenarios, activating PortFast along with BPDU Guard alone could suffice. Lastly, it's great to know that enabling PortFast on access ports and setting up trunking between switches fixed the port blocking issue. Seems like your diligence is paying off! Best of luck with the rest of your experimentation. Always remember, understanding the specifics of your network is key to ensuring optimal configuration.

Hi there, In response to your first question, BPDU Guard and BPDU Filter can be applied globally across all access ports or specifically on ports where PortFast is enabled. It largely depends on how you configure them. As for your second question, while BPDU Guard and BPDU Filter serve distinct functions, they can indeed function in unison depending on the network security and architecture requirements. BPDU Guard helps to prevent potential loops by automatically shutting down a PortFast-enabled port if it receives a BPDU. However, BPDU Filter is aimed at filtering out BPDU messages from being sent on certain ports with PortFast enabled, to prevent a possible network disturbance. Lastly, the issue of all ports being blocked for 10 seconds might be due to STP recalculating the network's tree algorithm. When you enabled PortFast, the switches could bypass the listening and learning states, thus speeding up this process and appearing to have solved the issue. Always keep in mind though, enabling PortFast comes with its own risks of loops in the network if not monitored properly. I hope you find this helpful. Continue experimenting, it's a great way to learn!

More Replies →

Streamline Your Asset Management
See How Oxmaint Works!!

✅   Work Order Management

✅   Asset Tracking

✅   Preventive Maintenance

✅   Inspection Report

We have received your information. We will share Schedule Demo details on your Mail Id.

To add a comment, please sign in or register if you haven't already..   

Frequently Asked Questions (FAQ)

FAQ: 1. Question: Do BPDU Guard and BPDU Filter options apply globally to access ports, or are they specifically for ports where PortFast is activated?

Answer: Answer: These options typically apply to specific ports where PortFast is activated, rather than being global settings for all access ports.

FAQ: 2. Question: Is there a need to have both BPDU Guard and BPDU Filter options activated, considering their different purposes?

Answer: Answer: While both options serve distinct functions, having BPDU Guard enabled may be sufficient when PortFast is activated. However, the specific requirements may vary based on the network setup and security considerations.

Ready to Simplify Maintenance?

Join hundreds of satisfied customers who have transformed their maintenance processes.
Sign up today and start optimizing your workflow.

Request Demo  â†’