Description |
This article describes the steps to take when an inter-switch link shows STP discarding, but the expected behavior is the link should be in a 'forwarding state'. |
Scope | FortiGate and Managed FortiSwitches version 7.x and above. |
Solution |
Refer to the diagram below where port53 of Core3 FSW shows STP discarding however port54 of Core3 should be in a discarding state because it is expected the Core1 and Core2 MCLAG-ICL pairs to act as Root Bridge, hence Core3 port53 should be the root port and forwarding.
In such cases, collect the output of the 'diag stp instance list' on core1, core2, core3, and Third FortiSwitches to verify which FortiSwitch is acting as the root bridge. In the below example, the Third FortiSwitch is acting as the root Bridge which is incorrect.
Third # diagnose stp instance list MST Instance Information, primary-Channel: Instance ID 0 (CST) Root MAC 04dxxxxxad8, Priority 16384, Path Cost 0, Remaining Hops 20 Regional Root MAC 04dxxxxxad8, Priority 16384, Path Cost 0
Instance ID 15 Refer to the below KB article and configure lower & same STP priority on both Core1 and Core2 to make sure Core1 and Core2 act as STP root bridges. Technical Tip: Configure STP priority using 'custom-command 'on FortiGate |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.