(Single choice) The following statement about defending MAC Spoofing is wrong:
A.
MAC Anti-MAC-Spoofing features are mutually exclusive with WMAC, SC, PPPoE-SMAC features at the VLAN level
B.
After the Anti-MAC-Spoofing function is enabled, the system automatically implements dynamic binding of the MAC address to the service flow
C.
After enabling the Anti-MAC-Spoofing function, for IPoE users using fixed IP, the user needs to be statically configured
D.
Turning off the Anti-MAC-Spoofing function can only remove the fixed table items, which does not affect the user’s service application, but the service forwarding plane will be interrupted
The Answer Is:
D
This question includes an explanation.
Explanation:
Huawei Anti-MAC-Spoofing binds the source MAC to the service flow/port to prevent address forgery. It is functionally exclusive with certain per-VLAN MAC check features (e.g., WMAC, SC, PPPoe-SMAC) to avoid conflicting validation logic. For IPoE users with fixed IP, operators typically configure static bindings/entries so that address and access policies remain consistent.
Option D is wrong: disabling Anti-MAC-Spoofing and removing fixed entries can affect service behavior; if forwarding is interrupted, that does impact user service—so the statement is self-contradictory and incorrect.