–
Run the
port-security enable
command on the interface to enable port security
or run the
mac-limit
command to set the maximum number of MAC addresses
that the interface can learn to 1.
–
If the interface is connected to a hub, perform either of the following operations:
–
Configure port mirroring or other tools to observe packets received by the
interface. Analyze the packet types to locate the attacking computer. Disconnect
the computer after obtaining permission from the administrator. When the attack
stops, connect the computer to the hub again.
–
Disconnect computers connected to the hub one by one after obtaining
permission from the administrator. If the fault is rectified after a computer is
disconnected, the computer is the attacker. After it stops the attack, connect it to
the hub again.
–
If the number of MAC addresses on the interface is equal to or smaller than the number
of devices connected to the interface, the number of devices connected to the industrial
switch router has exceeded the maximum supported by the industrial switch router.
Adjust network deployment.
----End
1.9 Reference
This section describes references of MAC address table.
The following table lists the references of this document.
Document
Description
Remarks
IEEE 802.1D
Standard for Information technology--
Telecommunications and information
exchange between systems--IEEE
standard for local and metropolitan area
networks--Common specifications--
Media access control (MAC) Bridges
-
IEEE 802.1Q
IEEE standard for Local and
Metropolitan Area Networks: Virtual
Bridged Local Area Networks
-
Huawei AR530&AR550 Series Industrial Switch Routers
Configuration Guide - Ethernet Switching
1 MAC Address Table Configuration
Issue 01 (2014-11-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
29