186
C
HAPTER
13: MSTP C
ONFIGURATION
automatically shut it down and notifies the network administrator of the situation.
Only the administrator can restore edge ports that are shut down.
Root protection
A root bridge and its secondary root bridges must reside in the same region.
Particularly, a CIST and its secondary root bridges are usually located in the core
region, which is equipped with high bandwidth. But errors may exist in configurations
and malicious attacks may occur, making legal root bridges receive BPDUs of higher
priorities and give up their roles as root bridges, which means network topology
jitters. In this case, flows that should travel along high-speed links may be led to
low-speed links, and network congestions may occur.
You can avoid this problem by utilizing the root protection function. Ports with this
function enabled can retain their roles in all spanning tree instances. When such a
port receives BPDUs of higher priorities, its state is set to discarding and it stops
forwarding any packets as if the connected link were down. Only when it receives no
BPDUs of higher priorities in a specified period, does it resumes its normal state.
Loop prevention
A switch maintains the states of the root port and blocked ports by receiving and
processing BPDUs from the upstream switch. However, the switch may not receive the
BPDUs due to network congestions or unidirectional link failures. In this case, the
switch reelects a root port, sets the original root port to a designated port, and places
the blocked ports to the forwarding state, all of which may bring about loops in the
network.
The loop prevention function can suppress loops of this type. With this function
enabled, the root port does not give up its role and the blocked ports remain in the
discarding state, eliminating the possibilities of loops in the network.
TC-BPDU attack prevention
A switch removes MAC address entries and ARP entries upon receiving TC-BPDUs. If a
malicious user sends large amounts of TC-BPDUs to a switch in a short period, the
switch may be busy removing MAC address entries and ARP entries, which may
decrease the performance of the switch and introduce potential stability risks.
With the TC-BPDU attack prevention function enabled, a switch performs removing
operation only once in a specified period (10 seconds by default) after it receives a
TC-BPDU. The switch also checks to see if other TC-BPDUs arrive and performs
another removing operation in the next period if a TC-BPDU is received. Such a
mechanism prevents a switch from being busy removing address entries and ARP
entries.
Only one function among loop prevention, root protection, and edge port can be
valid at a time.
Prerequisites
Configure MSTP on the switch properly.
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...