Tp-Link T1600G-52TS V1 [229/755] Stp security

Tp-Link T1600G-52TS V1 [229/755] Stp security
Configuration Guide 207
Configuring Spanning Tree Spanning Tree
CIST
The Common and Internal Spanning Tree, comprising IST and CST, is the spanning tree that
connects all the switches in the network.
1.3 STP Security
STP Security prevents the loops caused by wrong configurations or BPDU attacks. It contains
Loop Protect, Root Protect, BPDU Protect, BPDU Filter and TC Protect functions.
» Loop Protect
Loop Protect function is used to prevent loops caused by link congestions or link failures. It is
recommended to enable this function on root ports and alternate ports.
If the switch cannot receive BPDUs because of link congestions or link failures, the root port will
become a designated port and the alternate port will transit to forwarding status, so loops will
occur.
With Loop Protect function enabled, the port will temporarily transit to blocking state when the
port does not receive BPDUs. After the link restores to normal, the port will transit to its normal
state, so loops can be prevented.
» Root Protect
Root Protect function is used to ensure that the desired root bridge will not lose its position. It is
recommended to enable this function on the designated ports of the root bridge.
Generally, the root bridge will lose its position once receiving higher-priority BPDUs caused by
wrong configurations or malicious attacks. In this case, the spanning tree will be regenerated, and
traffic needed to be forwarded along high-speed links may be lead to low-speed links.
With root protect function enabled, when the port receives higher-priority BDPUs, it will
temporarily transit to blocking state. After two times of forward delay, if the port does not receive
any higher-priority BDPUs, it will transit to its normal state.
» BPDU Protect
BPDU Protect function is used to prevent the port from receiving BPUDs. It is recommended to
enable this function on edge ports.
Normally edge ports do not receive BPDUs, but if a user maliciously attacks the switch by sending
BPDUs, the system automatically configures these ports as non-edge ports and regenerates the
spanning tree.

Содержание

Похожие устройства

Скачать