Fortinet 5003A manual Switch fabric-channel stp settings, Delaytimeint

Models: 5003 5003A

1 128
Download 128 pages 9.19 Kb
Page 100
Image 100

config

FortiSwitch-5003A CLI reference

switch fabric-channel stp settings

Use this command to change MSTP spanning tree timers, specify an MSTP region name and use a revision number to track changes to the MSTP configuration. All of these MSTP settings should be the same on all of the devices in an MSTP region. These settings apply to all MSTP instances added to a FortiSwitch-5003A board.

Syntax

config switch fabric-channel stp settings set forward-time <delay_time_int> set hello-time <hello_time_int>

set max-age <age_time_int> set max-hops <hops_int> set name <name_str>

set revision <number_str> end

Variables

Description

Default

 

 

 

forward-time

The MSTP forward delay time in seconds. The forward delay time is

15

<delay_time_int>

the number of seconds that spanning tree spends in the listening and

 

 

learning state. The range is 4 to 30 seconds.

 

hello-time

Enter the time between sending bridge protocol data units (BPDUs).

2

<hello_time_int>

The range is 1 to 10 seconds.

 

max-age

The max age timer controls the maximum length of time in seconds

20

<age_time_int>

that passes before a device saves its configuration BPDU information.

 

 

The range is 6 to 40 seconds.

 

max-hops <hops_int>

The maximum number of hops in a MSTP region. The range is 1 to 40.

20

 

The root bridge sends BPDUs with the hop count set to this maximum

 

 

value. When a device receives a BPDU, it decrements the remaining

 

 

hop count by one and includes this lower hop count in its BPDUs.

 

 

When a device receives a BPDU with a hop count of zero, the device

 

 

discards the BPDU.

 

 

 

 

name <name_str>

Enter a region name for the spanning tree configuration. The name is

 

 

optional. All devices in the same MSTP region should have the same

 

 

name. The region name is added to BPDUs.

 

 

 

 

revision

Enter a revision number of up to 4 digits. All devices in an MSTP region

0

<number_str>

must have the same revision number. Change the revision number

 

 

manually whenever you change the MSTP configuration.

 

 

You can use the revision number to keep track of changes in the MSTP

 

 

configuration and to help confirm that the MSTP configurations of all of

 

 

the devices in a region are in sync.

 

 

 

 

Example

This example shows how to set the name of an MSTP region to "MSTP_test", set the revision to 1 and change the max-hopsvalue to 4.

config switch fabric-channel stp instance set name "MSTP_test"

set revision 1 set max-hops 4

end

Related topics

config switch fabric-channel interface

config switch fabric-channelphysical-port

config switch fabric-channel stp instance

config switch fabric-channel trunk

 

FortiSwitch-5003A and 5003 Fabric and Base Backplane Communications Guide

100

01-30000-85717-20081205

Page 100
Image 100
Fortinet 5003A manual Switch fabric-channel stp settings, Delaytimeint

5003, 5003A specifications

Fortinet's FortiGate 5003 and 5003A are high-capacity, next-generation firewalls designed for enterprises that require advanced security solutions with a strong focus on performance and scalability. These models are part of Fortinet's expansive line of FortiGate appliances, which leverage innovative technologies to provide robust protection against a variety of cyber threats while maintaining seamless network operations.

One of the standout features of the FortiGate 5003 and 5003A is their impressive throughput capabilities. With multiple high-speed network interfaces, these firewalls can handle substantial amounts of traffic, ensuring that data flows smoothly without creating bottlenecks. This makes them ideal for organizations that operate large-scale networks or have significant bandwidth demands.

The FortiGate 5003 series is equipped with Fortinet's proprietary FortiOS, an intuitive operating system that integrates firewall, VPN, antivirus, intrusion prevention, web filtering, and application control functionalities. This comprehensive approach to security allows organizations to protect their networks from an array of cyber threats while simplifying management and reducing operational costs.

Another key characteristic of these models is their use of Fortinet's purpose-built security processing units (SPUs). These hardware-accelerated security chips enable accelerated threat detection and prevention, allowing the 5003 and 5003A to deliver high performance even when advanced security features are enabled. The SPUs play a crucial role in ensuring that organizations can enforce security policies without compromising on speed or efficiency.

Furthermore, the FortiGate 5003 and 5003A support advanced networking features, including Virtual Routing and Forwarding (VRF), which allows for better traffic management and segmentation. This capability is essential in multi-tenant environments, enabling organizations to create isolated networks while maintaining centralized security management.

In addition to their performance and feature set, both models support centralized management through Fortinet's FortiManager platform, providing a unified view of network security across multiple devices. This simplifies configuration, updates, and policy compliance, significantly reducing administrative overhead.

Finally, the FortiGate 5003 and 5003A are designed with redundancy and high availability in mind. They include failover capabilities and support for clustering, ensuring that network operations remain uninterrupted even in the event of hardware failure. This level of reliability is vital for mission-critical applications where downtime can lead to significant operational disruption.

In summary, Fortinet's FortiGate 5003 and 5003A are powerful solutions that combine high performance, advanced security technologies, and robust management features to meet the needs of large enterprises. With their focus on scalability and reliability, these firewalls are poised to protect organizations against evolving cyber threats while ensuring optimal network performance.