A technique for managing loops between network devices such as customer
and carrier edge devices involves monitoring the MAC moves that occur at
a device to detect the existence of a loop and initiating a loop
protection action if the MAC moves indicate that a loop exists. The
number of MAC moves that indicates the existence of a loop is user
programmable and pre-established in the device configuration. The number
of MAC moves can be expressed as a MAC move threshold, which is defined
in terms of, for example, a MAC move rate or a number of MAC moves.
Typically, the loop protection action that is initiated in response to a
detected loop involves blocking the flow of the looping packets at the
corresponding device.