Lab 2.4
Lab 2.4
Addressing Table
Device Interface IP Address Subnet Mask
PC-A NIC 192.168.10.1 255.255.255.0
PC-C NIC 192.168.10.2 255.255.255.0
Objectives
Part 1: Build the Network and Configure Device Initial Settings
Part 2: Configure the Root Bridge and Examine PVST+ Convergence
Part 3: Configure Rapid PVST+, PortFast, BPDU Guard, and Examine Convergence
Background / Scenario
Rapid PVST+ (IEEE 802.1w) is an enhanced version of PVST+ and allows for faster spanning-tree
calculations and convergence in response to Layer 2 topology changes. Rapid PVST+ defines three port
states: discarding, learning, and forwarding, and provides multiple enhancements to optimize network
performance.
In this lab, you will configure the primary and secondary root bridge, examine PVST+ convergence, configure
Rapid PVST+ and compare its convergence to PVST+. In addition, you will configure edge ports to transition
immediately to a forwarding state using PortFast and prevent the edge ports from forwarding BDPUs using
BDPU guard.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Lab – Configuring and Verifying Standard IPv4 ACLs
Step 1: Configure a primary and secondary root bridge for all existing VLANs.
a. Configure switch S2 to be the primary root bridge for all existing VLANs.
What command/s are needed to accomplish this?
b. Configure switch S1 to be the secondary root bridge for all existing VLANs.
What command/s are needed to accomplish this?
c. Wait for the network spanning tree to converge then observe the state of the network links.
b. Immediately afterwards, issue the show spanning-tree command on S3 every 15 seconds to observe
changes in port states.
S3#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Lab – Configuring and Verifying Standard IPv4 ACLs
S3#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 24577
Address 00E0.B096.BB8C
Cost 38
Port 3(FastEthernet0/3)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
S3#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 24577
Address 00E0.B096.BB8C
Cost 38
Port 3(FastEthernet0/3)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
Lab – Configuring and Verifying Standard IPv4 ACLs
Which port states did F0/3 transition through during network convergence?
BLK to LSN (blocking to listening state), LSN to FWD (listening to forward state).
Approximately how long did it take the network to converge and ports to settle in forwarding state after the
topology change?
Approximately 20 seconds.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Lab – Configuring and Verifying Standard IPv4 ACLs
Rapid pvst supercedes the original PVST by increasing the speed of spanning tree calculation.
c. After some time, the link indicator should turn green, reattempt to ping PC-C from PC-A
Why do you think is there a noticeable delay from the time that the PC is connected to the port before the
link becomes fully operational?
Initialization and negotiation processes between the PC and the port cause the delay.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Lab – Configuring and Verifying Standard IPv4 ACLs
c. Using the show spanning tree command on S1, view the status of F0/6.
Port fa/06 was blocked and disabled, then a red link light appeared between S1 and the additional
switch.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Lab – Configuring and Verifying Standard IPv4 ACLs
Down, err-disabled
Reflection
1. Why would the faster convergence time of Rapid-PVST+ be considered an advantage over PVST+?
Rapid-PVST+ offers faster convergence time by using a rapid spanning tree protocol, providing quicker
network recovery in the event of topology changes compared to the slower convergence of PVST+.
2. Why is it considered a security risk to enable Portfast on access ports without enabling BPDUGuard as well?
Enabling Portfast without BPDUGuard on access ports may pose a security risk by allowing unauthorized
switches to introduce loops into the network without being detected.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7