beautypg.com

Configuration example, Network requirements, Configuration procedure – H3C Technologies H3C WX5500E Series Access Controllers User Manual

Page 101: Configuring protection functions, Enabling bpdu guard

background image

90

Configuration example

Network requirements

As shown in

Figure 23

, Device A connects to a third-party device that has a different spanning tree

implementation. Both devices are in the same region. The third-party device (Device B) is the regional

root bridge, and Device A is the downstream device.

Figure 23 Network diagram

Configuration procedure

# Enable no agreement check on GigabitEthernet 1/0/1 of Device A.

system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] stp no-agreement-check

Configuring protection functions

A spanning tree device supports the following protection functions:

BPDU guard

Root guard

Loop guard

TC-BPDU guard

BPDU drop

Enabling BPDU guard

For access layer devices, access ports can directly connect to user terminals (such as PCs) or file servers.

Access ports are configured as edge ports to allow rapid transition. When these ports receive

configuration BPDUs, the system automatically sets the ports as non-edge ports and starts a new

spanning tree calculation process. This causes a change of network topology. Under normal conditions,
these ports should not receive configuration BPDUs. However, if someone forges configuration BPDUs

maliciously to attack the devices, the network will become unstable.
The spanning tree protocol provides the BPDU guard function to protect the system against such attacks.

With the BPDU guard function enabled on devices, when edge ports receive configuration BPDUs, the
system closes these ports and notifies the NMS that they have been closed by the spanning tree protocol.

The device will reactivate closed ports after the port status detection timer expires. For more information

about the port status detection timer, see Fundamentals Configuration Guide.