Can anyone explain the STP Security features. Just like BPDU
guard, Root Guard.

Hi JITENDERA, i m specially looking for u?????

Answers were Sorted based on User's Feedback



Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i ..

Answer / jitendera kumar sinha

Spanning Tree Protocol Features
1 Bridge Protocol Data Unit (BPDU) Guard
2 Root Guard
3 EtherChannel Guard
4 Loop Guard

these 4 are major spaing tree feature

for understand that at first we must understand the spaing
tree term
root bridge-it is the bridge with the best bridge id.it is
the focal point of the network and which point is block and
which point is in forwading mode is are made from the root
bridge.
here comes bpdu gurd
slection cretirea of root bridge depend upon BPdu default
vale 2 sec.
each bpdu conatin
1 mac address
2 bridge priorty(32768 default)
3 bridge identy
so
BPDU contains management and control data information that
is used to determine the root bridge and establish the port
roles—for example: root, designated, or blocked port.

2 root port-.the root port is alway link directly conected
to root bridge.if there is more then one link then port
cost is detirmine if port cost is smae then bridge identy
comes in account
here comes root gurd
in a shairesd swiched envorment where there is many
conection betwen switches it is important to identify the
correct placement of the root bridge.With the Root Guard
feature, a Layer 2 interface is set as the designated port,
and if any device through this port becomes the root
bridge, the interface is placed into the blocked stae
this is all about root gurd

i will expalin two parametar tomorrow because i have some
work
thanks
jitendera kumar sinha

Is This Answer Correct ?    1 Yes 0 No

Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i ..

Answer / jitendera kumar sinha

here is 3rd answer
ehternet gurd is also known as port securty
let undersatnd what is that

UnderstandingHow PortSecurity Works:
You can use port security to block input to an Ethernet,
Fast Ethernet, or Gigabit Ethernet
port when the MAC address of the station attempting to
access the port is different from
any of the MAC addresses specified for that port.
Alternatively, you can use port security
to filter traffic destined to or received from a specific
host based on the host MAC
address.
When a secure port receives a packet, the source MAC
address of the packet is compared
to the list of secure source addresses that were manually
configured or autoconfigured
(learned) on the port. If a MAC address of a device
attached to the port differs from the
list of secure addresses, the port either shuts down
permanently (default mode), shuts
down for the time you have specified, or drops incoming
packets from the insecure host.
The port's behavior depends on how you configure it to
respond to a security violation.
If a security violation occurs, the Link LED for that port
turns orange, and a link-down
trap is sent to the Simple Network Management Protocol
(SNMP) manager. An SNMP
trap is not sent if you configure the port for restrictive
violation mode. A trap is sent only
if you configure the port to shut down during a security
violation

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

1-what is the diffrence between hdlc and ppp protocol 2- why frame realy technogy called NBMA

4 Answers   Brigade,


As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.

1 Answers  


Why is distributed processing useful?

0 Answers  


Tell us the name of algorithm of eigrp protocol?

0 Answers  


What are the advantages of lan switching?

0 Answers  






What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)

2 Answers  


Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay

1 Answers  


What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255

5 Answers  


Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?

3 Answers  


UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link

1 Answers  


Identify 2 reasons for disabling CDP? A.) If the router is not configured for RIP B.) Save bandwidth by eliminating overhead C.) If the router is configured for Appletalk D.) When connected to a non-Cisco router

1 Answers  


Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191

4 Answers  


Categories