beautypg.com

User guide, 4 stp security – Luxul XMS-1024P User Manual

Page 107

background image

107

User Guide

© 2014 Luxul. All Rights Reserved.

Other trademarks and registered trademarks are the property of their respective owners

Step Operation

Description

4

Configure the MST region

Create an MST Region and configure the role the
Switch plays in the MST Region on

Spanning

Tree>>MSTP Instance>>Region Config and Tree>>MSTP
Instance>>Instance Config
pages.

5

Configure the MSTP
Instance Ports parameters

If you are going to configure different Instances in the MST
Region you can configure MSTP parameters for Instance
Ports on

Spanning Tree>>MSTP Instance>>Instance Port

Config page.

7.4 STP Security

STP Security can protect devices from malicious attacks against STP features. The STP
Security function can be implemented on Port Protect and TC Protect pages.

Port Protect is used to protect devices from malicious attacks against STP features.

7.4.1 Port Protect
On this page you can configure the Loop Protect, Root Protect, TC Protect, BPDU
Protect and BPDU Filter features for each Port. We suggest enabling the corresponding
Protection feature for the corresponding Ports.

Loop Protect

In a stable Network topology a Switch maintains the Port states by receiving and
processing BPDU packets from the Upstream Switch. However, when link congestion
or link failures occur, the Downstream Switch does not receive BPDU packets, which
can result in Spanning Tree regeneration and the Roles of Ports changing. This can cause
Blocked Ports to change to a Forwarding state, causing loops to occur in the Network.

The Loop Protect function suppresses Loops. With this function Enabled, a Port, regard-
less of the role it plays in any Instances, is always set to Blocking state when the Port
does not receive BPDU packets from the Upstream Switch. This allows Spanning Trees
to be regenerated, and prevents Loops from occuring.