Guarding Against Rogue STP Root Bridges
Root guard configuration commands

The following commands can be used to configure and verify root guard shown in Figures  and .