First page Back Continue Last page Image
Spanning Tree Protocol Attacks
Network attackers can manipulate the Spanning Tree Protocol (STP) to conduct an attack by spoofing the root bridge and changing the topology of a network
To mitigate STP attacks, use PortFast and Bridge Protocol Data Unit (BPDU) Guard