No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

S12700 V200R010C00 Configuration Guide - Ethernet Switching

This document describes the configuration of Ethernet services, including configuring link aggregation, VLANs, Voice VLAN, VLAN mapping, QinQ, GVRP, MAC table, STP/RSTP/MSTP, SEP, and so on.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring MAC Address Flapping Prevention to Block User Attacks

Configuring MAC Address Flapping Prevention to Block User Attacks

In Figure 2-9, users need to access the server connected to Port1 of the switch. If an unauthorized user sends packets using the server's MAC address as the source MAC address, the server's MAC address is learned on another interface of the switch. Then packets sent to the server are sent to the unauthorized user. As a result, users cannot access the server, and important data may be intercepted by the unauthorized user. To prevent this, set a higher MAC address learning priority for the interface connected to the server than other interfaces.

Figure 2-9  Networking diagram of MAC address flapping prevention
Translation
Download
Updated: 2019-08-21

Document ID: EDOC1000142081

Views: 254533

Downloads: 405

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next