Information
This sequence describes configuring Spanning Tree's BPDU Protect feature
Various security mechanisms are in place to protect spanning true configurations from interference and rogue devices or unwarranted changes to the network. BPDU protection secures the active topology by preventing spoofed BPDU packets from entering the network. Typically, BPDU protection is applied on edge ports connected to end user devices that do not run STP. If STP BPDU packets are received on a protected port, BPDU guard disables the port and an alert is sent.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
switch(config)# interface 1/1/20
switch(config-if)# no shutdown
switch(config-if)# no routing
switch(config-if)# vlan access 10
switch(config-if)# spanning-tree bpdu-guard
switch(config-if)# exit
Impact:
While BPDU protect will prevent spoofed BPDU traffic from entering the network, there are potential impacts to the network including: When a BPDU packet is received the receiving port enters an error state and shuts down, resulting in loss of connectivity of connected devices If BPDU protect is mis-configuired and enabled on a port connected to another switch actively participating in the spanning tree, a loop can occur, leading to broadcast storms and network instability.