Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 8. Securing the Data Plane on Ca... > Spanning Tree Protocol Attacks

Spanning Tree Protocol Attacks

Image
Protecting Spanning Tree Protocol (STP) with BPDU Guard

Redundant Layer 2 topologies eliminate single points of failure, but they are more susceptible to broadcast storms, multiple frame copies, and MAC address table instability problems.

Spanning Tree Protocol (STP) is a Layer 2 protocol that provides a loop-free redundant network topology by placing certain ports in the blocking state. A hacker could manipulate STP to conduct an attack by changing the topology of a network (for example, by connecting a rogue switch in an attempt to take over as the root and have all traffic for the immediate switched domain flow through it).


Note

Configure the STP enhancement features PortFast, BPDU guard, and root guard features to mitigate STP manipulation attacks.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint