Typically the limit is setup to prevent users from adding another switch to an access end user port and a large number of devices. Or using the port for a mac flood attack.
↧
Typically the limit is setup to prevent users from adding another switch to an access end user port and a large number of devices. Or using the port for a mac flood attack.