Configuring Mac Address Tables; Overview; How A Mac Address Table Entry Is Created - HP 1910 User Manual

Hide thumbs Also See for 1910:
Table of Contents

Advertisement

Configuring MAC address tables

NOTE:
MAC address configurations related to interfaces apply only to Layer 2 Ethernet interfaces.
This document covers only the management of static, dynamic, and blackhole MAC address entries, not
multicast MAC address entries.

Overview

To reduce single-destination packet floodings in a switched LAN, an Ethernet device uses a MAC
address table for forwarding frames. This table describes from which port a MAC address (or host) can
be reached. When forwarding a single-destination frame, the device first looks up the destination MAC
address of the frame in the MAC address table for a match. If the device finds an entry, it forwards the
frame out of the outgoing port in the entry. If the device does not find an entry, it floods the frame out of
all but the incoming port.

How a MAC address table entry is created

The device automatically learns entries in the MAC address table, or you can add them manually.
MAC address learning
The device can automatically populate its MAC address table by learning the source MAC addresses of
incoming frames on each port.
When a frame arrives at a port, Port A, for example, the device performs the following tasks:
Verifies the source MAC address (for example, MAC-SOURCE) of the frame.
1.
Looks up the source MAC address in the MAC address table.
2.
Updates an entry if it finds one. If the device does not find an entry, it adds an entry for
3.
MAC-SOURCE and Port A.
The device performs this learning process each time it receives a frame from an unknown source MAC
address, until the MAC address table is fully populated.
After learning a source MAC address, when the device receives a frame destined for MAC-SOURCE, the
device finds the MAC-SOURCE entry in the MAC address table and forwards the frame out Port A.
Manually configuring MAC address entries
With dynamic MAC address learning, a device does not distinguish between illegitimate and legitimate
frames. For example, when a hacker sends frames with a forged source MAC address to a port different
from the one to which the real MAC address is connected, the device creates an entry for the forged
MAC address, and forwards frames destined for the legal user to the hacker instead.
To improve port security, you can bind specific user devices to the port by manually adding MAC address
entries to the MAC address table of the device.
138

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents