MAC flooding is an attacking method that is used to compromise the security of the network switches. These switches maintain a table structure called a MAC table that consists of each MAC address of the host computer on the networks which are connected to the ports of the switch.
To prevent MAC flooding, use the following methods:
- Authentication with the AAA server
- Port security
- Implement IEEE 802.1x suites
- Employ security measures to prevent IP spoofing or ARP spoofing