H3C LS-3100-52P-OVS-H3 Operation Manual - page 273
1-37
z
Loop guard
z
TC-BPDU attack guard
Among loop guard, root guard and edge port settings, only one function can take effect on the same
port at the same time.
Configuration prerequisites
MSTP has been correctly configured on the device.
Enabling BPDU Guard
We recommend that you enable BPDU guard if your device supports this function.
For access layer devices, the access ports generally connect directly with user terminals (such as PCs)
or file servers. In this case, the access ports are configured as edge ports to allow rapid transition. When
these ports receive configuration BPDUs, the system will automatically set these ports as non-edge
ports and start a new spanning tree calculation process. This will cause a change of network topology.
Under normal conditions, these ports should not receive configuration BPDUs. However, if someone
forges configuration BPDUs maliciously to attack the devices, network instability will occur.
MSTP provides the BPDU guard function to protect the system against such attacks. With the BPDU
guard function enabled on the devices, when edge ports receive configuration BPDUs, MSTP will close
these ports and notify the NMS that these ports have been closed by MSTP. Those ports closed thereby
can be restored only by the network administers.
Follow these steps to enable BPDU guard:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Enable the BPDU guard
function for the device
stp bpdu-protection
Required
Disabled by default
BPDU Guard does not take effect on loopback test-enabled ports. For information about loopback test,
refer to Ethernet Interface Configuration in the Access Volume.