1 00:00:00,210 --> 00:00:06,570 So I bet you're hoping to learn how to prevent Mack flying attacks and you've come to the right place 2 00:00:07,560 --> 00:00:13,080 to prevent the Mack flooding attacks, network operators usually rely on the presence of one or more 3 00:00:13,080 --> 00:00:14,910 features in their network equipment. 4 00:00:15,940 --> 00:00:23,050 With a feature often called Port Security by vendors, many advanced switches can be configured to limit 5 00:00:23,050 --> 00:00:27,880 the number of Mac addresses that can be learned on ports connected to end stations. 6 00:00:29,040 --> 00:00:34,680 Many vendors allow discovered Mac addresses to be authenticated against an authentication authorization 7 00:00:34,680 --> 00:00:38,760 and accounting or AAA server and subsequently filtered. 8 00:00:40,010 --> 00:00:48,350 Implementations of I Tripoli eight to one 1x suites often allow packet filtering rules to be installed 9 00:00:48,350 --> 00:00:55,490 explicitly by a Tripoli server based on dynamically learned information about clients, including the 10 00:00:55,490 --> 00:00:56,120 Mac address. 11 00:00:57,550 --> 00:01:05,050 Security features to prevent art spoofing or IP address spoofing in some cases may also perform additional 12 00:01:05,140 --> 00:01:08,080 MAC address filtering on unicast packets. 13 00:01:08,710 --> 00:01:11,650 However, this is an implementation dependent side effect.