7.2 Flashcards
So how does STP select an in for switching pass on a network. Consider the following
Select a route bridge
STP examines the possible pass between all other bridges and the route bridge
STP disables links that are not part of the shortest path
——stipulates that each bridge can have only one route port which is the Bridgeport that is closest to and Ford frames to the route bridge
STP
Blocks BPDu use on any port surveying network hosts such as workstations and servers and thereby ensuring these devices are you aren’t considered a possible path.
BPDU guard
This also enhance security by preventing a row switch or computer connected to one of these porch from hijacking the networks STP paths
BPDU guard
This disables STP on specific porch
BPDU filter
This prevent switch is beyond reconfigured port from becoming the root bridge
Root guard
FTP information is transmitted between switches via – – – –
BPDUs
Netwerk developers have repeatedly modified STP to improve and customize it’s functioning the original STP is considered – – – – – – – – for today’s networks
Too slow
This is defined in IEEE 802.1 W standard, and MSCP protocol originally defined by 802.1 S standard
RSTP rapid spanning tree protocol
Is a multipass link state protocol developed by B
TRILL Transparent interconnection of lots of links
Protocols designed to replace STP such as SPB operate at layer ——- instead of or in addition to layer to making them more compatible with various types of technologies like the connection protocols used on storage networkf
Layer three
Switches are designed to offer lots of porch through which devices can access network by sending and receiving – –
Messages
The first layer defense on your special on virtual porch on switches another network devices should be – – – – until needed
Disable
Another Cisco command to secure switch access ports is – – – – – – this essentially a Mac filtering function that also protects against Mac flooding which makes it a good type of flood guard
Switchport Port security
Once the MAC address tables for a security violation occurs if another device attempt to connect to the port. By default the switch will ———— The port or it can be configured to restrict data from the road device
Shut down