Guarding Against Rogue STP Root Bridges
Root guard configuration commands
The following commands can be used to configure and verify root guard shown in Figures
and
.