![]() In this lab you will configure and observe various ways of bending the logical spanning tree topology to meet your requirements, as well as the different topology protection mechanism that are available. In addition, spanning tree “out of the box” is vulnerable to several different scenarios where the root bridge status could be taken over, or a loop could be introduced in the network. Part 3: Implement and Observe Various Topology Protection Mechanisms Background / ScenarioĪlthough spanning tree works “out of the box”, the default values used in the decisions it makes may lead to logical topologies that, although loop-free, do not align to what you need for your network. Part 2: Implement and Observe Various Topology Tuning Methods Part 1: Build the Network and Configure Basic Device Settings and Interface Addressing ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |