After MAC flapping-based loop detection is configured on a Bridge-Domain (BD), the devices can detect loops on AC-side interfaces, and block interfaces or report alarms.
After MAC flapping-based loop detection is configured on a device and the device receives packets with fake source MAC addresses from attackers, the device may mistakenly conclude that a loop has occurred and block an interface based on the configured blocking policy. Therefore, key user traffic may be blocked. It is recommended that you disable MAC flapping-based loop detection on properly running devices. If you have to use MAC flapping-based loop detection to detect whether links operate properly during site deployment, be sure to disable this function after this stage.
Before configuring MAC flapping-based loop detection on a BD network, configure BD on the PE. For details about BD configuration, see EVC Configuration in NetEngine 8000 F Configuration Guide - LAN Access and MAN Access.