The mac-spoofing-defend enable command configures an interface as a trusted interface.
The undo mac-spoofing-defend enable command restores an interface to an untrusted interface.
By default, an interface is untrusted.
S5720-EI, S5720-HI, S5730-HI, S5731-H, S5731-S, S5731S-H, S5731S-S, S5732-H, S6720-EI, S6720-HI, S6720S-EI, S6730-H, S6730S-H, S6730-S, and S6730S-S do not support this command.
GE interface view, Ethernet interface view, XGE interface view, 40GE interface view, MultiGE interface view, Eth-Trunk interface view, port group view
Usage Scenario
User behaviors are uncontrollable; therefore, a user device may send bogus packets with the server MAC address to prevent other users from accessing the real server. To prevent such attacks, you can use the mac-spoofing-defend enable command to configure the network-side interface connected to the server as a trusted interface. The MAC address learned by the interface will not be learned by other interfaces. This prevents the attacks of bogus packets with the server MAC address.
Prerequisites
The MAC spoofing defense function has been enabled by using the mac-spoofing-defend enable command in the system view.
Precautions