You don't have access to this class

Keep learning! Join and start boosting your career

Aprovecha el precio especial y haz tu profesión a prueba de IA

Antes: $249

Currency
$209
Suscríbete

Termina en:

2 Días
6 Hrs
0 Min
19 Seg
Curso de Seguridad de Redes On-Premise

Curso de Seguridad de Redes On-Premise

Donny Alexander Rodríguez Cáceres

Donny Alexander Rodríguez Cáceres

Spanning Tree Protocol

7/12
Resources

What is Spanning Tree Protocol?

Spanning Tree Protocol (STP) is a fundamental protocol that runs at layer 2 of the OSI model and is used in switches. Its main purpose is to guarantee the stability of networks by preventing the occurrence of loops, which can cause a drop in the availability of devices. By using STP, redundant connections in a network are protected against loops, ensuring that failures in the primary links adequately activate the secondary links without interrupting service.

Why is preventing loops crucial for the network?

A loop is generated when, by mistake, a closed circuit is formed in the network, for example, when connecting the same cable from port 1 to port 2 of a switch. These loops can saturate the network with unnecessary traffic, known as broadcast storms, which reduce efficiency and can render the network useless.

  • Secure redundancy: With STP, redundant links, which act as a backup in the event of a failure, are effectively managed avoiding these loops.
  • Outage avoidance: Enabling protocols such as STP can ensure service continuity even in the face of main connection failures.

How to optimize your network security with STP

STP not only prevents loops, but, in combination with good practices, improves overall network security.

How to reduce port vulnerability

  1. Disable inactive ports: Turning off all network ports that are not in use prevents unauthorized connections, either accidentally by ill-informed personnel or intentionally by outsiders.
  2. Broadcast traffic management: Limiting broadcast traffic prevents excessive bandwidth usage and reduces the risk of broadcast storms, ensuring optimal network performance.

What else should you keep in mind?

  • Consistent use of STP: Ensure that this protocol is active on all switches involved in critical configurations where redundant links are required.
  • Network monitoring: Stay informed about the behavior and status of STP and links in your network through appropriate monitoring tools.

Share and learn more about other protocols

Spanning Tree Protocol is just one piece of the puzzle when it comes to network security at layer 2 of the OSI model. If you know of other protocols that also improve security at this layer, please share your experiences and information. Together, we can continue to increase the level of security and availability of our networks - let's keep learning!

Contributions 4

Questions 0

Sort by:

Want to see more contributions, questions and answers from the community?

El Spanning Tree Protocol (STP) es un protocolo esencial en el mundo de las redes, diseñado para prevenir bucles de red en entornos de Ethernet que utilizan topologías en malla o redundantes. Desarrollado originalmente por Radia Perlman en 1985, STP ha sido fundamental para mantener la estabilidad y la fiabilidad de las redes de datos al asegurar que solo haya un camino activo entre dos puntos de la red en cualquier momento, eliminando así los bucles que pueden causar colapsos o inundaciones de tráfico. ### **Funcionamiento Básico de STP** STP utiliza un algoritmo que identifica la topología de la red y desactiva los enlaces redundantes de manera dinámica para prevenir bucles, permitiendo que estos enlaces redundantes actúen como respaldo en caso de fallo en el enlace principal. Selecciona un switch como el "Root Bridge" (Puente Raíz) de la red, que actúa como punto de referencia central para todas las decisiones de ruta en la red. Luego, para cada segmento de red (denominado "LAN virtual" o VLAN), se elige un "Puente Designado" que tiene el mejor camino hacia el Root Bridge. Todos los demás enlaces se ponen en estado de bloqueo para prevenir bucles.
Que genial es aprender sobre **Spanning Tree Protocol** en esta clase 👩‍💻
Cuando se tienen conexiones redundantes para garantizar conectividad, es necesario usar el protocolo Spanning Tree ya que este evita que se generen loops en la red al haber mas de una conexion a un mismo switch Nota: esto es posible solo en Switch administrables
El protocolo CDP