Unit 1: Network Infrastructure
This will allow you to demonstrate your networking skills, knowledge, and abilities, with a focus on enterprise-level switching, routing, and multicast components that support cross-platform (inter)operability and integration with the most recent software-defined technologies.
Anyhow, your switch will learn MAC addresses on its own and fill its MAC address table (CAM table) by checking the source MAC address of arriving frames and flooding frames if it doesn’t know where to send the frame.
Layer 2 MAC address spoofing attacks can happen on this process. This is when an attacker fakes a certain MAC address to change records in the MAC address table. Adding items to the MAC address table by hand is an easy way to fix this problem. Dynamic entries can never be more important than basic entries. You can instruct the switch to drop the data or name the interface where the MAC address is.
Here’s an example for you to see!
These are the only two devices that are required to demonstrate this. The router is responsible for generating some traffic, and the switch is used to examine (and configure) the MAC address table. Take a look at the configuration:
R1(config)#interface fastEthernet 0/0
R1(config-if)#no shutdown
R1(config-if)#ip address 10.10.20.1 255.255.255.0
SW1(config)#interface vlan 1
SW1(config-if)#no shutdown
SW1(config-if)#ip address 10.10.20.2 255.255.255.0
In order for SW1 to discover the mac address of R1’s FastEthernet 0/0 interface, we will quickly ping to generate some traffic:
Membership Required
This Course and partial content under every lesson is restricted for Members Only. You must be a member to fully access this Course / Lesson content. You can still preview partially visible text content by using "Preview" tab for Every Lesson.