Lab – Using IOS CLI with Switch MAC Address Tables Lab – Viewing the Switch MAC Address Table TopologyAddressing TableDeviceInterfaceIP

Lab – Using IOS CLI with Switch MAC Address Tables

Lab – Viewing the Switch MAC Address Table

Topology

Addressing Table

Device

Interface

IP Address

Subnet Mask

Default Gateway

S1

VLAN 1

192.168.1.11

255.255.255.0

N/A

S2

VLAN 1

192.168.1.12

255.255.255.0

N/A

PC-A

NIC

192.168.1.3

255.255.255.0

N/A

PC-B

NIC

192.168.1.2

255.255.255.0

N/A

Objectives

Part 1: Build and Configure the Network

Part 2: Examine the Switch MAC Address Table

Background / Scenario

The purpose of a Layer 2 LAN switch is to deliver Ethernet frames to host devices on the local network. The switch records host MAC addresses that are visible on the network, and maps those MAC addresses to its own Ethernet switch ports. This process is called building the MAC address table. When a switch receives a frame from a PC, it examines the frame’s source and destination MAC addresses. The source MAC address is recorded and mapped to the switch port from which it arrived. Then the destination MAC address is looked up in the MAC address table. If the destination MAC address is a known address, then the frame is forwarded out of the corresponding switch port associated with that MAC address. If the MAC address is unknown, then the frame is broadcasted out of all switch ports, except the one from which it came. It is important to observe and understand the function of a switch and how it delivers data on the network. The way a switch operates has implications for network administrators whose job it is to ensure secure and consistent network communication.

Switches are used to interconnect and deliver information to computers on local area networks. Switches deliver Ethernet frames to host devices identified by network interface card MAC addresses.

In Part 1, you will build a multi-switch topology with a trunk linking the two switches. In Part 2, you will ping various devices and observe how the two switches build their MAC address tables.

Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs.

Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure contact your instructor.

Required Resources

2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)

2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)

Console cables to configure the Cisco IOS devices via the console ports

Ethernet cables as shown in the topology

Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an Ethernet straight-through cable may be used between switches S1 and S2. If using another model Cisco switch, it may be necessary to use an Ethernet crossover cable.

Build and Configure the Network

Cable the network according to the topology.

Configure PC hosts.

Initialize and reload switches as necessary.

Configure basic settings for each switch.

Configure device name as shown in the topology.

Configure IP address as listed in Addressing Table.

Assign
cisco as the console and vty passwords.

Assign
class as the privileged EXEC password.

Examine the Switch MAC Address Table

A switch learns MAC addresses and builds the MAC address table, as network devices initiate communication on the network.

Record network device MAC addresses.

Open a command prompt on PC-A and PC-B and type
ipconfig /all. What are the Ethernet adapter physical addresses?

PC-A MAC Address: ___________________________________________________________________

PC-B MAC Address: ___________________________________________________________________

Console into switch S1 and S2 and type the
show interface F0/1 command on each switch. On the second line of command output, what is the hardware addresses (or burned-in address [bia])?

S1 Fast Ethernet 0/1 MAC Address: ______________________________________________________

S2 Fast Ethernet 0/1 MAC Address: ______________________________________________________

Display the switch MAC address table.

Console into switch S2 and view the MAC address table, both before and after running network communication tests with ping.

Establish a console connection to S2 and enter privileged EXEC mode.

In privileged EXEC mode, type the
show mac address-table command and press Enter.

S2#
show mac address-table

Even though there has been no network communication initiated across the network (i.e., no use of ping), it is possible that the switch has learned MAC addresses from its connection to the PC and the other switch.

Are there any MAC addresses recorded in the MAC address table?

____________________________________________________________________________________

What MAC addresses are recorded in the table? To which switch ports are they mapped and to which devices do they belong? Ignore MAC addresses that are mapped to the CPU.

____________________________________________________________________________________

____________________________________________________________________________________

____________________________________________________________________________________

If you had not previously recorded MAC addresses of network devices in Step 1, how could you tell which devices the MAC addresses belong to, using only the output from the
show mac address-table command? Does it work in all scenarios?

____________________________________________________________________________________

____________________________________________________________________________________

____________________________________________________________________________________

____________________________________________________________________________________

Clear the S2 MAC address table and display the MAC address table again.

In privileged EXEC mode, type the
clear mac address-table dynamic command and press
Enter.

S2#
clear mac address-table dynamic

Quickly type the
show mac address-table command again. Does the MAC address table have any addresses in it for VLAN 1? Are there other MAC addresses listed?

Wait 10 seconds, type the
show mac address-table command, and press Enter. Are there new addresses in the MAC address table? __________________

From PC-B, ping the devices on the network and observe the switch MAC address table.

From PC-B, open a command prompt and type
arp -a. Not including multicast or broadcast addresses, how many device IP-to-MAC address pairs have been learned by ARP?

____________________________________________________________________________________

From the PC-B command prompt, ping PC-A, S1, and S2. Did all devices have successful replies? If not, check your cabling and IP configurations.

____________________________________________________________________________________

____________________________________________________________________________________

From a console connection to S2, enter the
show mac address-table command. Has the switch added additional MAC addresses to the MAC address table? If so, which addresses and devices?

____________________________________________________________________________________

____________________________________________________________________________________

From PC-B, open a command prompt and retype
arp -a. Does the PC-B ARP cache have additional entries for all network devices that were sent pings?

____________________________________________________________________________________

Reflection

On Ethernet networks, data is delivered to devices by their MAC addresses. For this to happen, switches and PCs dynamically build ARP caches and MAC address tables. With only a few computers on the network this process seems fairly easy. What might be some of the challenges on larger networks?

_______________________________________________________________________________________

© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page
1 of
1

© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page
2 of
4

image1.png

image2.jpeg

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Assignment 1 Conduct research on an event of your choice, either

Assignment 1 Conduct research on an event of your choice, either online or by attending a local event. Prepare a report of approximately of 700-1000 words related to this event. Make sure to describe the three aspects of event management presented in this Module.   Event Objective (10 points)  

The best kind of customer is the one you have

The best kind of customer is the one you have before you build or buy anything.Explore different kinds of promotional avenues, like the ones in this link: https://rafflepress.com/ecommerce-promotion-ideas/Then, accept the following challenge: 1) Explore, isolate, and explain an industry or business that would take an investment to start and might

Identifying what is at stake.

Week 7: Analysis Paper DUE: Jan 19, 2020 11:55 PM Grade Details GradeN/A Gradebook CommentsNone Assignment Details Open DateDec 2, 2019 12:05 AMGraded?YesPoints Possible100.0Resubmissions Allowed?NoAttachments checked for originality?Yes Assignment Instructions Instructions: Be sure to read the required reading for this week as it will help guide you through the process of

RTI is a systematic prereferral assessment process employed by school staff to ensure universal targeted and intensive individualized interventions are

RTI is a systematic pre-referral assessment process employed by school staff to ensure universal, targeted, and intensive individualized interventions are implemented prior to initiating the formal special education referral process. RTI requires collaboration with colleagues to select and develop RTI interventions and assessments to be administered to students. Teachers should

In the human body, there are many mechanisms of defense.

  In the human body, there are many mechanisms of defense. Mechanisms that maintain homeostasis at large and actions that mainly protect the body at the cellular level. In the scenario presented, the 16-year-old boy is diagnosed with strep throat and prescribed the expected treatment course, amoxicillin 500 mg PO

In a minimum of 300 words, discuss the ongoing challenges

  In a minimum of 300 words, discuss the ongoing challenges of recruitment trends concerning women and minorities in law enforcement. Your assignment must reflect at least five reference sources: your textbook and other scholarly materials (i.e., journal articles, magazines, newspaper articles, webpage, dictionaries, thesauruses, or encyclopedias.), APA formatted paragraphs

Select a public program that has recently undergone a significant

  Select a public program that has recently undergone a significant budgetary change. As an example, suppose a state cut funding for a domestic violence program. It’s important to investigate the possible changes in public policy and the political process that could have led to this decision. Was it cut

Describe the measurable outcomes

The collection of evidence is an activity that occurs with an endgame in mind. For example, law enforcement professionals collect evidence to support a decision to charge those accused of criminal activity. Similarly, evidence-based healthcare practitioners collect evidence to support decisions in pursuit of specific healthcare outcomes. In this Assignment,

1, How many total offers from the Sharks are presented?

1, How many total offers from the Sharks are presented? 2. The mother is asking the Sharks for US$250,000 for a 10% share in the company; how much is the total company worth? 3. As a Shark Tank investor, would you lend the mother the money or say NO? Before

As discussed in our reading this week, suppliers consider the

As discussed in our reading this week, suppliers consider the market that they and their customers operate in when setting prices.  Perfect Competition company AK Steel Research and locate one company that operates in your assigned market structure. You may not use one of the companies already mentioned in this

current prospectus Psychological effects of a death penalty in the

current prospectus Psychological effects of a death penalty in the state of Texas Reflect on how well your research problem meets the “Litmus Test.” At this point, you recognize that this is a work in progress, so identify what could be done to better reveal a research gap. Summarize the

Prepare: Prior to beginning work on this assignment, please read

Prepare: Prior to beginning work on this assignment, please read the A Model of Global Citizenship: Antecedents and Outcomes article. See attached.  Reflect: Please take some time to reflect on how the concept of global citizenship has shaped your identity and think about how being a global citizen has made

DOCUMENT #1 Read the instruction in the Alternative Debate file,

DOCUMENT #1 Read the instruction in the Alternative Debate file, be sure to read Perucci 2017 Ruptural Performance reading.  Follow the instruction and finish the assignment. BE SURE TO MEET ALL THE REQUIREMENT LISTED IN THE FILE. DOCUMENT #2 IN ADDITION provide: 1.what is the action you chose. Does it

– 3 key points from the article – 2 quotes

– 3 key points from the article – 2 quotes that speak to you with an analysis of why they are significant to development  – 1 Question (with an answer to your own question): You may question the findings, analyses, method, and conclusions. You may offer ideas for future research