First page Back Continue Last page Image
MAC Address Table Attack Mitigation
To mitigate MAC address table overflow attacks, network administrators must implement port security
Port security will only allow a specified number of source MAC addresses to be learned on the port