First page Back Continue Last page Image

MAC Address Table Attack Mitigation

To mitigate MAC address table overflow attacks, network administrators must implement port security

Port security will only allow a specified number of source MAC addresses to be learned on the port