First page Back Continue Last page Image

Spanning Tree Protocol Attacks

Network attackers can manipulate the Spanning Tree Protocol (STP) to conduct an attack by spoofing the root bridge and changing the topology of a network

To mitigate STP attacks, use PortFast and Bridge Protocol Data Unit (BPDU) Guard