James Carlson wrote:
>
> The very same issue occurs with aggregations, doesn't it?  You need to
> be able to treat the aggregation as a single sender for the network
> layer clients, which means sending from the "wrong" MAC address on at
> least some of the links.

Link aggregation is IEEE 802.3AD i.e. defined only for IEEE 802.3.
I don't know how aggr currently checks that it is only talking to 802.3, 
but I'm assuming there is such a check.

Since bridging is an IEEE 802.1 standard in principle it applies to 
802.11 etc.

> I think it gets outside the bounds of this case, but I agree that if
> we have those sorts of drivers, we'll need the same logic to prevent
> misconfiguration in both cases.  I'll follow up on the supported
> drivers.

Good (but the logic check might be slightly different due to the above 
difference.)

> It may ... after having blindly forwarded for long enough to melt the
> network.
> 
> Or you can get into root-guard and BPDU-guard; more about that below.
> The more I think about Cisco-like 'portfast', the less I'm sure we
> want to support it in the first release.

But providing a way to disable stp completely is then even more 
dangerous thus I'd propose not to offer that in the first release either.

> If simply allowing an STP per-port disable seems too hazardous, then
> I'd suggest we go with something like BPDU-guard.  We can still
> disable STP, but if a BPDU is seen arriving on such a port, then we
> disable the port as apparently broken (changing state to 'disabled')
> and log a message.  The administrator must explicitly reenable the
> link by removing it from the bridge and adding it back or otherwise
> making the link signal go down and back up.  Seeing a BPDU on such a
> port is good evidence that the topology is just plain wrong, and
> saving the network at the expense of a port sounds like the right
> result to me.

That works for me.

    Erik

Reply via email to