You have been tasked with ensuring that the switches used in your organization are secured and there is trusted access to the entire network. To maintain this security standard, you plan on enabling a MAC filtering function that will protect the Arista devices against MAC flooding. Which command will you use to bring your plan to action?