Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Spanning-Tree Protocols User Guide
Table of Contents Expand all
list Table of Contents

BPDU Protection for Spanning-Tree Protocols

date_range 22-Nov-23

Understanding BPDU Protection for Spanning-Tree Instance Interfaces

ACX Series routers, MX Series routers, PTX Series routers, EX Series switches, and QFX Series switches support spanning-tree protocols that prevent loops in a network by creating a tree topology (spanning-tree) of the entire bridged network. All spanning-tree protocols use a special type of frame called bridge protocol data units (BPDUs) to communicate with each other.

The Spanning Tree Protocol (STP) family is designed to break possible loops in a Layer 2 bridged network. Loop prevention avoids damaging broadcast storms that can potentially render the network useless. STP processes on bridges exchange BPDUs to determine the LAN topology, decide the root bridge, stop forwarding on some ports, and so on. However, a misbehaving user application or device can interfere with the operation of the STP protocols and cause network problems.

BPDU-block is a feature that defends the STP topology from a misbehaving user application or device or a threat. You must enable BPDU guard on the interfaces that are not supposed to receive any BPDUs.

If an interface is configured to be edge port, it will transition directly to the Forwarding state. Such ports are connected to end devices and are not expected to receive BPDU. Therefore, to avoid loops, you must protect edge ports by enabling bpdu-block-on-edge.

On the routers and switches that support STP, you can configure BPDU protection to ignore BPDUs received on interfaces where none should be expected (for example, a LAN interface on a network edge with no other bridges present). If a BPDU is received on a protected interface, the interface is disabled and stops forwarding frames. By default, all BPDUs are accepted and processed on all interfaces.

You can achieve BPDU protection in several ways. By default, if bpdu-block is enabled on the interface, on receiving BPDU, the interface will be disabled and all traffic forwarding will stop on the interface. However, if you do not want to disable the interface and do not want that interface to take part in the STP calculation, you can configure action drop. If you configure action drop, the interface remains up and running and traffic continues to flow; however, BPDUs are dropped.

The edge ports do not support action drop. BPDU-block-on-edge disables the interface if the edge ports receive BPDUs. You must clear the error to bring the interface back up.

You can configure BPDU protection on interfaces with the following encapsulation types:

  • ethernet-bridge

  • ethernet-vpls

  • extended-vlan-bridge

  • vlan-vpls

  • vlan-bridge

  • extended-vlan-vpls

You can configure BPDU protection on individual interfaces or on all the edge ports of the bridge.

Enable BPDU protection on interfaces that are configured as edge ports by using the bpdu-block-on-edge command under the set protocols (mstp|rstp|vstp) hierarchy. If you have not configured a port as an edge port, you can still configure BPDU protection on the interface by using the bpdu-block command under the set protocols layer2-control hierarchy. You can also use the bpdu-block command to configure BPDU protection on interfaces configured for a spanning-tree.

Understanding BPDU Protection for STP, RSTP, and MSTP

Networks frequently use multiple protocols simultaneously to achieve different goals and in some cases those protocols might conflict with each other. One such case is when spanning-tree protocols are active on the network, where a special type of switching frame called a bridge protocol data unit (BPDU) can conflict with BPDUs generated on other devices such as PCs. The different kinds of BPDUs are not compatible, but they can still be recognized by other devices that use BPDUs and cause network outages. You need to protect any device that recognizes BPDUs from picking up incompatible BPDUs.

Different Types of BPDUs

Spanning-tree protocols such as Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), VLAN Spanning Tree Protocol (VSTP), and Multiple Spanning Tree Protocol (MSTP) generate their own BPDUs. These peer STP applications use their BPDUs to communicate, and ultimately, the exchange of BPDUs determines which interfaces block traffic and which interfaces become root ports. The root ports and designated ports forward traffic; the alternate and back up ports block the traffic.

Configuring BPDU Protection for Individual Spanning-Tree Instance Interfaces

To configure BPDU protection on one or more spanning-tree instance interfaces, include the bpdu-block statement:

content_copy zoom_out_map
bpdu-block {
    interface interface-name;
    disable-timeout seconds;
}
Note:

If you also include the optional disable-timeout seconds statement, protected interfaces are automatically cleared after the specified time interval unless the interval is 0.

Understanding BPDUs Used for Exchanging Information Among Bridges

In a Layer 2 bridge environment, spanning-tree protocols use data frames called Bridge Protocol Data Units (BPDUs) to exchange information among bridges.

Spanning-tree protocols on peer systems exchange BPDUs, which contain information about port roles, bridge IDs, and root path costs. On each router or switch, the spanning-tree protocol uses this information to elect a root bridge, identify root ports for each switch, identify designated ports for each physical LAN segment, and prune specific redundant links to create a loop-free tree topology. The resulting tree topology provides a single active Layer 2 data path between any two end stations.

Note:

In discussions of spanning-tree protocols, the terms bridge and switch are often used interchangeably.

The transmission of BPDUs is controlled by the Layer 2 Control Protocol process (l2cpd) on MX Series 5G Universal Routing Platforms.

The transmission of periodic packets on behalf of the l2cpd process is carried out by periodic packet management (PPM), which, by default, is configured to run on the Packet Forwarding Engine. The ppmd process on the Packet Forwarding Engine ensures that the BPDUs are transmitted even when the l2cpd is unavailable, and keeps the remote adjacencies alive during a unified in-service software upgrade (unified ISSU). However, if you want the distributed PPM (ppmd) process to run on the Routing Engine instead of the Packet Forwarding Engine, you can disable the ppmd process on the Packet Forwarding Engine.

On routers and switches with redundant Routing Engines (two Routing Engines that are installed in the same router), you can configure nonstop bridging. Nonstop bridging enables the router to switch from a primary Routing Engine to a backup Routing Engine without losing Layer 2 Control Protocol (L2CP) information. Nonstop bridging uses the same infrastructure as graceful Routing Engine switchover (GRES) to preserve interface and kernel information. However, nonstop bridging also saves L2CP information by running the l2cpd process on the backup Routing Engine.

Note:

To use nonstop bridging, you must first enable GRES.

Nonstop bridging is supported for the following Layer 2 control protocols:

  • Spanning-Tree Protocol (STP)

  • Rapid Spanning-Tree Protocol (RSTP)

  • Multiple Spanning-Tree Protocol (MSTP)

Understanding BPDU Protection for EVPN-VXLAN

EVPN-VXLAN data center fabrics have a number of built-in Ethernet loop prevention mechanisms, such as split-horizon and designated forwarder and non-designated forwarder election. In some existing data center environments where a new IP EVPN fabric is being deployed, you might need to configure BPDU protection at the leaf-to-server interface in order to avoid network outages due to xSTP miscalculations. Incorrect cabling between the server and leaf interfaces, or any back-door layer 2 link between two or more ESI-LAG interfaces, might cause miscalculations and then result in Ethernet loops. Without BPDU protection, BPDUs might not be recognized and will be flooded as unknown Layer 2 packets on the VXLAN interfaces. With BPDU protection, when a BPDU is received on an edge port in an EVPN-VXLAN environment, the edge port is disabled and stops forwarding all traffic. You can also configure BPDU protection to drop BPDU traffic but have all other traffic forwarded on the interfaces without having to configure a spanning-tree protocol.

Configuring Interface for BPDU Protection With Port Shutdown Mode

To configure BPDU protection on an edge interface of a switch:

Note:

Ensure that the switch is connected to an end device.

  1. Configure any spanning-tree protocol on the switch if not configured already. RSTP is configured in this procedure.
    content_copy zoom_out_map
    [edit protocols]
    user@switch# set rstp
  2. Enable RSTP on a specific interface and set a priority for the interface—for example, et-0/0/0.0:
    content_copy zoom_out_map
    [edit protocols]
    user@switch# set rstp interface et-0/0/0.0 priority 16
  3. Enable BPDU protection on the et-0/0/0.0 interface:
    content_copy zoom_out_map
    [edit protocols]
    user@switch# set layer2-control bpdu-block interface et-0/0/0.0
  4. Commit the configuration:
    content_copy zoom_out_map
    [edit]
    user@switch# commit
  5. Verify that BPDU protection is configured properly on the interface (et-0/0/0.0):
    • Run the show ethernet-switching interfaces operational mode command to see the state of STP configured on the interface:

      content_copy zoom_out_map
      user@switch> show ethernet-switching interface et-0/0/0
      Routing Instance Name : default-switch
      Logical Interface flags (DL - disable learning, AD - packet action drop,
                               LH - MAC limit hit, DN - interface down,
                               MMAS - Mac-move action shutdown,  AS - Autostate-exclude enabled,
                               SCTL - shutdown by Storm-control, SL - Secure Learning,
                               MI - MAC+IP limit hit)
       
      Logical         Vlan                   TAG   MAC    MAC+IP STP         Logical          Tagging
      interface       members                      limit  limit  state       interface flags
      et-0/0/0.0                                   1007616 0                 DN               tagged
                      default                1     1007616 0     Discarding                   tagged
                      vlan100                100   1007616 0     Discarding                   tagged

      In this output, note that the et-0/0/0.0 interface is in blocked state because it has received BPDUs from the end device.

    • Run the show spanning-tree interfaces operational mode command to ensure that the et-0/0/0.0 interface is blocked:

      content_copy zoom_out_map
      user@switch> show spanning-tree interface et-0/0/0
      Spanning tree interface parameters for instance 0
       
      Interface                  Port ID    Designated         Designated         Port    State  Role
                                             port ID           bridge ID          Cost
      et-0/0/0                    128:58       128:58  32768.605f7e0507de           50    BLK    DIS (Bpdu-Incon)
    • Run the show interfaces interface-name operational mode command to verify that the interface is disabled:

      content_copy zoom_out_map
      user@switch> show interfaces et-0/0/0
      Physical interface: et-0/0/0, Enabled, Physical link is Down
        Interface index: 1036, SNMP ifIndex: 521
        Link-level type: Ethernet, MTU: 1518, LAN-PHY mode, Speed: 400Gbps, BPDU Error: Detected, Loop Detect PDU Error: None, Ethernet-Switching Error: None, MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled,
        Flow control: Disabled, Auto-negotiation: Disabled, Media type: Fiber
        Device flags   : Present Running Down
        Interface flags: Down SNMP-Traps Internal: 0x20
        CoS queues     : 8 supported, 8 maximum usable queues
        Current address: 60:5f:7e:05:00:28, Hardware address: 60:5f:7e:05:00:28
        Last flapped   : 2023-01-19 11:46:36 IST (00:02:03 ago)
        Input rate     : 248 bps (0 pps)
        Output rate    : 0 bps (0 pps)
        Active alarms  : None
        Active defects : None
        PCS statistics                      Seconds
          Bit errors                             0
          Errored blocks                         0
        PRBS Mode : Disabled
        Interface transmit statistics: Disabled
        Link Degrade :
          Link Monitoring                   :  Disable
       
        Logical interface et-0/0/0.0 (Index 1005) (SNMP ifIndex 533)
          Flags: Device-Down SNMP-Traps Encapsulation: Ethernet-Bridge DF
          Input packets : 36590
          Output packets: 0
          Protocol ethernet-switching, MTU: 1518
            Flags: Trunk-Mode

    The physical link is down and BPDU error is detected.

Configuring Interface for BPDU Protection With BPDU Drop Mode

For certain access switches, you might want interfaces on the switch not to shutdown on encountering incompatible BPDU packets; instead, only drop incompatible BPDU packets while allowing the remaining traffic to pass through. Such an interface must not have a spanning-tree protocol configured on it, so that packets that pass through the interface will not cause STP misconfiguration and consequent network outages.

To configure BPDU protection for an interface to only drop incompatible BPDU packets and to allow the remaining traffic to pass through, while retaining the interface status as up:

Note:

Ensure that the switch on which you are configuring BPDU protection is connected to a peer device.

  1. Delete or disable any spanning-tree protocol (for instance, RSTP as in this procedure) configured on the switch or on any interface.
    • To delete a spanning-tree protocol on the entire switch:

      content_copy zoom_out_map
      [edit]
      user@switch# delete protocols rstp

      Or,

      content_copy zoom_out_map
      [edit]
      user@switch# set protocols rstp disable
    • To delete a spanning-tree protocol on a specific interface (for example, et-0/0/0.0) on the switch:

      content_copy zoom_out_map
      [edit]
      user@switch# set protocols rstp interface et-0/0/0.0 disable
  2. Enable the BPDU protection on the interface (et-0/0/0.0 in this procedure) to drop BPDU packets:
    content_copy zoom_out_map
    [edit]
    user@switch set layer2-control bpdu-block interface et-0/0/0.0 drop
  3. Commit the configuration:
    content_copy zoom_out_map
    [edit]
    user@switch# commit
  4. Verify that the BPDU protection action-drop is configured on the interface:
    • Run the show ethernet-switching interfaces operational mode command to ensure that the the STP state of the interface is forwarding:

      content_copy zoom_out_map
      user@switch> show ethernet-switching interface et-0/0/0
      Routing Instance Name : default-switch
      Logical Interface flags (DL - disable learning, AD - packet action drop,
                               LH - MAC limit hit, DN - interface down,
                               MMAS - Mac-move action shutdown,  AS - Autostate-exclude enabled,
                               SCTL - shutdown by Storm-control, SL - Secure Learning,
                               MI - MAC+IP limit hit)
       
      Logical         Vlan                   TAG   MAC    MAC+IP STP         Logical          Tagging
      interface       members                      limit  limit  state       interface flags
      et-0/0/0.0                                   1007616 0                                  tagged
                      default                1     1007616 0     Forwarding                   tagged
                      vlan100                100   1007616 0     Forwarding                   tagged

      In this output, note that the et-0/0/0.0 interface is up even though it has received incompatible BPDU packets because the drop feature is configured for this interface.

    • Run the show interfaces interface-name operational mode command to ensure that the et-0/0/0.0 interface is displayed in the output and that the State of the interface is Up:

      content_copy zoom_out_map
      user@switch> show interfaces et-0/0/0
      Physical interface: et-0/0/0, Enabled, Physical link is Up
        Interface index: 1036, SNMP ifIndex: 521
        Link-level type: Ethernet, MTU: 1518, LAN-PHY mode, Speed: 400Gbps, BPDU Error: None, Loop Detect PDU Error: None, Ethernet-Switching Error: None, MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled,
        Flow control: Disabled, Auto-negotiation: Disabled, Media type: Fiber
        Device flags   : Present Running Down
        Interface flags: Down SNMP-Traps Internal: 0x20
        CoS queues     : 8 supported, 8 maximum usable queues
        Current address: 60:5f:7e:05:00:28, Hardware address: 60:5f:7e:05:00:28
        Last flapped   : 2023-01-18 17:44:33 IST (00:00:01 ago)
        Input rate     : 744 bps (0 pps)
        Output rate    : 0 bps (0 pps)
        Active alarms  : None
        Active defects : None
        PCS statistics                      Seconds
          Bit errors                             0
          Errored blocks                         0
        PRBS Mode : Disabled
        Interface transmit statistics: Disabled
        Link Degrade :
          Link Monitoring                   :  Disable
       
        Logical interface et-0/0/0.0 (Index 1005) (SNMP ifIndex 533)
          Flags: Device-Down SNMP-Traps Encapsulation: Ethernet-Bridge DF
          Input packets : 83
          Output packets: 0
          Protocol ethernet-switching, MTU: 1518
            Flags: Trunk-Mode

    The physical link is up and there is no BPDU error.

Configuring BPDU Protection for Edge Interfaces

In a spanning-tree topology, if a switch is an access switch then interfaces on that switch will be connected to end devices such as PCs, servers, routers, or hubs, that are not connected to other switches. You configure these interfaces as edge interfaces because they directly connect to end devices.

Interfaces that are configured as edge interfaces can transition to a forwarding state immediately because they cannot create network loops. A switch detects edge ports by noting the absence of communication from the end stations. As edge ports are connected to end devices, it is imperative that you configure BPDU protection on edge ports to avoid loops. If BPDU protection is enabled on an edge interface, the interface shuts down on encountering ae BPDU thereby preventing any traffic from passing through the interface. You can re-enable the interface by issuing the clear error bpdu interface interface-name operational mode command. The clear error bpdu interface interface-name command will only re-enable an interface but the BPDU configuration for the interface will continue to exist unless you explicitly remove the BPDU configuration.

To configure BPDU protection on an edge interface of a switch:

Note:

Ensure that the switch is connected to an end device.

  1. Configure any spanning-tree protocol on the switch if not configured already. RSTP is configured in this procedure.
    content_copy zoom_out_map
    [edit protocols]
    user@switch# set rstp
  2. Enable RSTP on a specific interface and set a priority for the interface—for example, et-0/0/0.0:
    content_copy zoom_out_map
    [edit protocols]
    user@switch# set rstp interface et-0/0/0.0 priority 16
  3. Configure the et-0/0/0.0 interface as an edge interface and enable BPDU protection on that interface:
    content_copy zoom_out_map
    [edit protocols]
    user@switch# set rstp bpdu-block-on-edge interface et-0/0/0.0 edge
  4. Commit the configuration:
    content_copy zoom_out_map
    [edit]
    user@switch# commit
  5. Verify that BPDU protection is configured properly on the edge interface (et-0/0/0.0):
    • Run the show ethernet-switching interfaces operational mode command to see the state of STP configured on the interface:

      content_copy zoom_out_map
      user@switch> show ethernet-switching interface et-0/0/0
      Routing Instance Name : default-switch
      Logical Interface flags (DL - disable learning, AD - packet action drop,
                               LH - MAC limit hit, DN - interface down,
                               MMAS - Mac-move action shutdown,  AS - Autostate-exclude enabled,
                               SCTL - shutdown by Storm-control, SL - Secure Learning,
                               MI - MAC+IP limit hit, LP - Loop Protect Down)
      Logical Interface flags (DL - disable learning, AD - packet action drop,
                               LH - MAC limit hit, DN - interface down,
                               MMAS - Mac-move action shutdown,  AS - Autostate-exclude enabled,
                               SCTL - shutdown by Storm-control, SL - Secure Learning,
                               MI - MAC+IP limit hit, LP - Loop Protect Down)
       
      Logical         Vlan                   TAG   MAC    MAC+IP STP         Logical          Tagging
      interface       members                      limit  limit  state       interface flags
      et-0/0/0.0                                   294912 0                  DN               untagged
                      default                1     294912 0      Discarding                   untagged

      In this output, you note that the et-0/0/0.0 interface is in blocked state because it has received BPDUs from the end device.

    • Run the show spanning-tree interfaces operational mode command to ensure that the et-0/0/0.0 interface is blocked:

      content_copy zoom_out_map
      user@switch> show spanning-tree interface et-0/0/0
      Spanning tree interface parameters for instance 0
       
      Interface                  Port ID    Designated         Designated         Port    State  Role
                                             port ID           bridge ID          Cost
      et-0/0/0                    128:58       128:58  32768.605f7e0507de           50    BLK    DIS (Bpdu-Incon)
    • Run the show interfaces interface-name operational mode command to verify that the interface is disabled:

      content_copy zoom_out_map
      user@switch> show interfaces et-0/0/0
      Physical interface: et-0/0/0, Enabled, Physical link is Down
        Interface index: 1036, SNMP ifIndex: 521
        Link-level type: Ethernet, MTU: 1518, LAN-PHY mode, Speed: 400Gbps, BPDU Error: Detected, Loop Detect PDU Error: None, Ethernet-Switching Error: None, MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled,
        Flow control: Disabled, Auto-negotiation: Disabled, Media type: Fiber
        Device flags   : Present Running Down
        Interface flags: Down SNMP-Traps Internal: 0x20
        CoS queues     : 8 supported, 8 maximum usable queues
        Current address: 60:5f:7e:05:00:28, Hardware address: 60:5f:7e:05:00:28
        Last flapped   : 2023-01-19 11:46:36 IST (00:02:03 ago)
        Input rate     : 248 bps (0 pps)
        Output rate    : 0 bps (0 pps)
        Active alarms  : None
        Active defects : None
        PCS statistics                      Seconds
          Bit errors                             0
          Errored blocks                         0
        PRBS Mode : Disabled
        Interface transmit statistics: Disabled
        Link Degrade :
          Link Monitoring                   :  Disable
       
        Logical interface et-0/0/0.0 (Index 1005) (SNMP ifIndex 533)
          Flags: Device-Down SNMP-Traps Encapsulation: Ethernet-Bridge DF
          Input packets : 36590
          Output packets: 0
          Protocol ethernet-switching, MTU: 1518
            Flags: Trunk-Mode

    The physical link is down and BPDU error is detected.

Example: Blocking BPDUs on an Interface for 600 Seconds

The following example, when used with a full bridge configuration with aggregated Ethernet, blocks BPDUs on interface ae0 for 10 minutes (600 seconds) before enabling the interface again:

content_copy zoom_out_map
[edit protocols layer2-control]
bpdu-block {
    interface ae0;
    disable-timeout 600;
}

Example: Configuring BPDU Protection on Interfaces

Note:

This example uses Junos OS for EX Series switches without support for the Enhanced Layer 2 Software (ELS) configuration style. For ELS details, see Using the Enhanced Layer 2 Software CLI.

When BPDU protection is enabled, an interface shuts down or drops BPDU packets when any incompatible BPDU is encountered, thereby preventing the BPDUs generated by spanning-tree protocols from reaching the switch. When an interface is configured to drop BPDU packets, all traffic except the incompatible BPDUs can pass through the interface.

Note:

The BPDU drop feature can be specified only on interfaces on which no spanning-tree protocol is configured.

This example configures BPDU protection on STP switch downstream interfaces that connect to two PCs:

Requirements

This example uses the following hardware and software components:

  • One EX Series switch in an RSTP topology

  • One EX Series switch that is not in any spanning-tree topology

  • Junos OS Release 9.1 or later for EX Series switches

Before you configure the interfaces on Switch 2 for BPDU protection, be sure you have:

  • Ensured that RSTP is operating on Switch 1.

  • Disabled or enabled RSTP on Switch 2 (depending on the configuration that you plan to implement.)

    If you want to enable the BPDU shutdown feature, then it is optional to disable spanning-tree protocols on the interface.

Note:

By default, RSTP is enabled on all EX Series switches.

Overview and Topology

This example explains how to configure BPDU protection on an interface.

Figure 1 shows the topology for this example. Switch 1 and Switch 2 are connected through a trunk interface. Switch 1 is configured for RSTP while Switch 2 has a spanning-tree protocol configured on it for the first scenario, and does not have a spanning-tree protocol configured on it for the second scenario.

In the first scenario, this example configures downstream BPDU protection on Switch 2 interfaces ge-0/0/5.0 and ge-0/0/6.0 when the default spanning-tree protocol (RSTP) is not disabled on these interfaces. When BPDU protection is enabled, the shutdown statement is enabled by default, and the switch interfaces will shut down if BPDUs generated by the laptops attempt to access Switch 2.

In the second scenario, this example configures downstream BPDU protection on Switch 2 interfaces ge-0/0/5.0 and ge-0/0/6.0 when there is no spanning-tree protocol configured on these interfaces. When BPDU protection is enabled with the drop statement, the switch interfaces drop only the BPDUs while allowing remaining traffic to pass through and retaining their status as up if BPDUs generated by the laptops attempt to access Switch 2.

CAUTION:

When configuring BPDU protection on an interface without spanning trees connected to a switch with spanning trees, be careful that you do not configure BPDU protection on all interfaces. Doing so could prevent BPDUs being received on switch interfaces (such as a trunk interface) that you intended to have receive BPDUs from a switch with spanning trees.

Topology

Figure 1: BPDU Protection Topology BPDU Protection Topology

Table 1 shows the components that will be configured for BPDU protection.

Table 1: Components of the Topology for Configuring BPDU Protection on EX Series Switches

Property

Settings

Switch 1 (Distribution Layer)

Switch 1 is connected to Switch 2 through a trunk interface. Switch 1 is configured for RSTP.

Switch 2 (Access Layer)

Switch 2 has two downstream access ports connected to laptops:

  • ge-0/0/5.0

  • ge-0/0/6.0

Configuration

To configure BPDU protection on the interfaces:

Procedure

CLI Quick Configuration

This is the first scenario that explains configuration for the default BPDU block (action: shutdown). To quickly configure BPDU protection on Switch 2, copy the following commands and paste them into the switch terminal window:

content_copy zoom_out_map
[edit]

user@switch# set protocols layer2-control bpdu-block interface ge-0/0/5
[edit]

user@switch# set protocols layer2-control bpdu-block interface ge-0/0/6
Step-by-Step Procedure

To configure BPDU protection for the shutdown statement:

  1. Configure the BPDU block (action: shutdown) on the downstream interface ge-0/0/5 on Switch 2:

    content_copy zoom_out_map
     [edit protocols]
    user@switch# set layer2-control bpdu-block interface ge-0/0/5
  2. Configure the BPDU block (action: shutdown) on the downstream interface ge-0/0/6 on Switch 2:

    content_copy zoom_out_map
     [edit protocols]
    user@switch# set layer2-control bpdu-block interface ge-0/0/6
Results

Check the results of the configuration:

content_copy zoom_out_map
user@switch> show protocols layer2-control                     
bpdu-block {
    interface ge-0/0/5;
    interface ge-0/0/6;
}

Procedure

CLI Quick Configuration

This is the second scenario that explains configuration for the drop statement. To quickly configure BPDU protection on Switch 2 for the drop statement, copy the following commands and paste them into the switch terminal window:

content_copy zoom_out_map
[edit]


user@switch# set protocols layer2-control bpdu-block interface ge-0/0/5 drop
user@switch# set protocols layer2-control bpdu-block interface ge-0/0/6 drop                  
Note:

If xSTP is enabled on the interface, you must disable it before configuring BPDU drop action: block. You can disable RSTP globally by using the delete protocols rstp, the set protocols rstp disable, or the set protocols rstp interface all disable command.

Step-by-Step Procedure

To configure BPDU protection for the drop statement:

  1. Configure the BPDU drop statement on the downstream interface ge-0/0/5 on Switch 2:

    content_copy zoom_out_map
     [edit protocols layer2-control]
    user@switch# set bpdu-block interface ge-0/0/50 drop
  2. Configure the BPDU drop statement on the downstream interface ge-0/0/6 on Switch 2:

    content_copy zoom_out_map
     [edit protocols layer2-control]
    user@switch# set bpdu-block interface ge-0/0/6 drop
Results

Check the results of the configuration:

content_copy zoom_out_map
user@switch> show configuration protocols layer2-control
bpdu-block {
    interface ge-0/0/5;
    interface ge-0/0/6;
}
footer-navigation