How does the root in spanning tree protocol works?
I am studying spanning tree protocol attacks and I would like to understand a thing. The root is on the "top" of the tree, how can we exploit this to put in place an attack? We can, in some way, become the root, but what privileg… Continue reading How does the root in spanning tree protocol works?