Other Enterprise Security Services
Spanning tree

Spanning tree is only needed when using wireless bridges. It should remain disabled for access points and repeaters, unless special circumstances exist in the network. The spanning-tree algorithm is used to prevent bridging loops. The algorithm computes available network paths and closes redundant paths, so that there is only one path between any pair of LANs on the network.

Improper spanning tree settings can disable needed connections. From a security perspective, an attacker may be able to disable ports in a poorly configured network. Please review and understand spanning tree information when making configuration decisions.


Lab Activity

Lab Exercise: Configure VLANs on the AP

In this lab, students will learn to extend VLANs into a WLAN.