To protect a switch or network against MAC address attacks, configure MAC addresses of untrusted users as blackhole MAC addresses. After blackhole MAC address entries are configured, the switch discards packets whose source or destination MAC addresses match these entries.