From the course: Cisco Network Security: Secure Routing and Switching

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

STP attacks

STP attacks

From the course: Cisco Network Security: Secure Routing and Switching

Start my 1-month free trial

STP attacks

- [Narrator] Spanning Tree Protocol prunes redundant links. It uses Bridge Protocol Data Units that hold information about corps, switches, corp priority and addresses. When up and operational, the Spanning Tree Protocol maintains a loop-free network. I'm in Packet Tracer and I've created a little activity. This is Spanning Tree and we'll watch as the network converges. When you take a look at the network, you're going to see that the interface lights are orange. They slowly become green, and what is happening at that moment is that the Spanning Tree is determining the topology and the state of the interfaces. And now you can see the network is slowly becoming converged. If you want to check the status of the Spanning Tree, we have a command. I'll go into switch zero and I've labeled the interfaces on switch zero so you can see what I'm going to refer to. I'm in switch zero and we'll use show spanning tree to check the status of the Spanning Tree. Once you say show spanning tree, we…

Contents