Loop guard
TC-BPDU attack guard
Among loop guard, root guard and edge port settings, only one function can take effect on the same
port at the same time.
Configuration prerequisites
MSTP has been correctly configured on the device.
Enabling BPDU Guard
We recommend that you enable BPDU guard if your device supports this function.
For access layer devices, the access ports generally connect directly with user terminals (such as PCs)
or file servers. In this case, the access ports are configured as edge ports to allow rapid transition. When
these ports receive configuration BPDUs, the system will automatically set these ports as non-edge
ports and start a new spanning tree calculation process. This will cause a change of network topology.
Under normal conditions, these ports should not receive configuration BPDUs. However, if someone
forges configuration BPDUs maliciously to attack the devices, network instability will occur.
MSTP provides the BPDU guard function to protect the system against such attacks. With the BPDU
guard function enabled on the devices, when edge ports receive configuration BPDUs, MSTP will close
these ports and notify the NMS that these ports have been closed by MSTP. Those ports closed thereby
can be restored only by the network administers.
Follow these steps to enable BPDU guard:
To do...
Enter system view
Enable the BPDU guard
function for the device
BPDU Guard does not take effect on loopback test-enabled ports. For information about loopback test,
refer to Ethernet Interface Configuration in the Access Volume.
Use the command...
system-view
stp bpdu-protection
1-37
Remarks
—
Required
Disabled by default