After MAC flapping-based loop detection is configured on a virtual private LAN service (VPLS) network, the devices can detect loops on AC-side interfaces or pseudo wires (PWs), and block interfaces or PWs or report alarms.
MAC flapping-based loop detection can also detect PW-side loops. The principles of blocking PWs are similar to those of blocking AC-side interfaces.
After MAC flapping-based loop detection is configured on a device and the device receives packets with fake source MAC addresses from attackers, the device may mistakenly conclude that a loop has occurred and block an interface based on the configured blocking policy. Therefore, key user traffic may be blocked. It is recommended that you disable MAC flapping-based loop detection on properly running devices. If you have to use MAC flapping-based loop detection to detect whether links operate properly during site deployment, be sure to disable this function after this stage.
Before configuring MAC flapping-based loop detection on a PE on a VPLS network, configure VPLS on the PE. For details about VPLS configuration, see VPLS Configuration in NetEngine 8000 F Configuration Guide - VPN.