Configuring protection functions, Configuration prerequisites, Enabling bpdu guard – H3C Technologies H3C SecPath F1000-E User Manual

Page 126

Advertising
background image

101

Figure 56 Network diagram

2.

Configuration procedure
# Enable No Agreement Check on Ethernet 1/1 of Device A.

<DeviceA> system-view

[DeviceA] interface ethernet 1/1

[DeviceA-Ethernet1/1] stp no-agreement-check

Configuring protection functions

A spanning tree device supports the following protection functions:

BPDU guard

Root guard

Loop guard

TC-BPDU guard

Configuration prerequisites

The spanning tree feature has been correctly configured on the device.

Enabling BPDU guard

For access layer devices, the access ports can directly connect to the user terminals (such as PCs) or file

servers. The access ports are configured as edge ports to allow rapid transition. When these ports

receive configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new
spanning tree calculation process. This causes a change of network topology. Under normal conditions,

these ports should not receive configuration BPDUs. However, if someone forges configuration BPDUs

maliciously to attack the devices, the network will become instable.
The spanning tree protocol provides the BPDU guard function to protect the system against such attacks.
With the BPDU guard function enabled on the devices, when edge ports receive configuration BPDUs,

the system will close these ports and notify the NMS that these ports have been closed by the spanning

tree protocol. Ports disabled in this way will be re-activated by the device after a detection interval. For

more information about this detection interval, see Getting Started Guide.
Configure BPDU guard on a device with edge ports configured.
To enable BPDU guard:

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enable the BPDU guard
function for the device.

stp bpdu-protection

Disabled by default.

Advertising