No relevant resource is found in the selected language.
This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>
Your browser version is too early. Some functions of the website may be unavailable. To obtain better user experience, upgrade the browser to the latest version.
This document describes the configuration of Ethernet services, including configuring link aggregation, VLANs, Voice VLAN, VLAN mapping, QinQ, GVRP, MAC table, STP/RSTP/MSTP, SEP, and so on.
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document.
Note: Even the most advanced machine translation cannot match the quality of professional translators.
Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring MAC Address Flapping Prevention to Block User Attacks
Configuring MAC Address Flapping Prevention to Block User Attacks
In Figure 2-9, users need to access the server
connected to Port1 of the switch. If an unauthorized user sends packets
using the server's MAC address as the source MAC address, the server's
MAC address is learned on another interface of the switch. Then packets
sent to the server are sent to the unauthorized user. As a result,
users cannot access the server, and important data may
be intercepted by the unauthorized user. To prevent this, set a higher
MAC address learning priority for the interface connected to the server
than other interfaces.
Figure 2-9 Networking diagram of MAC address flapping prevention