5.2.1.7 Lab - Viewing the Switch MAC Address Table

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to all in this video we are going to discuss this lab activity viewing the switch macros table before coming to this a lab activity furnace if you are watching our channel first time or if you like to get these type of technical videos in future consider subscribing also don't forget to enable that bell icon and near to the subscribe button so that you will get notification message whenever we upload a new video right coming back to our lab activity here we can see the topology with the two switches and two pieces we will design this topology into this a cisco packet tracer also here we can see the addressing table here we will go through these objectives in part 1 build and configure the network in party to examine the switch MAC address table also we will go through the scenario given here the purpose of a layer tool and such is to deliver Ethernet frames to house devices on the local network the suit aura quartz has two MAC addresses that are visible on the network and maps those MAC addresses to its own Ethernet switch ports this process is called building the MAC address table when the switcher receives a frame from a PC it examines the frames source and destination MAC addresses the source MAC address is recurrent and mapped to the switch port from which arrived then the destination MAC addresses I looked up in the MAC address table if the destination MAC address is a known address then the frame is forwarded out of the corresponding switch port associated with that MAC address if the MAC address is unknown and the frame is broadcasted out of all switch ports except the one from which it came it is important to observe and understand the function of a switch and how it delivers data on the network the way is switch operates has implications for network administrator's whose job it is to ensure secure and consistent network communication yes it's correct sutures are used to interconnect and deliver information to computers on local area networks so just deliver Ethernet frames to host devices identified by network interface card anchor trusses in part one we will build a multi switch topology with eight wrangling the two switches in party to be be lapping various devices and observe how the two sutures build their mega trust tables we will go through the north given here the sutures used are a Cisco Catalyst to name six zeros with the Cisco IOS release 15.0 other switches and cisco iOS version can be used depending on the model and cisco iOS version the commands available and output produced might vary from what is shown in the labs okay right so make sure that the switches have been erased and how no startup configurations if you are unsure contact your instructor okay anyway so for this lab activity we are using cisco packet tracer here we can see the regular resources we have to use two switches Cisco tune n60 series and we required two pcs or so console cables to configure the cisco iOS device via the console ports anyway we are using simulation ethernet cables as shown in the topology again and not here the faster third interfaces on cisco tuna and six zero switches are or poe sensing and an eternity straight through cable may be used between switches s1 and s2 if using another model cisco switch it may be necessary to use an Ethernet crossover cable yes so even we can use a third straight through cable that is called mdi-x anyway so we will design this topology in our cisco packet tracer okay we will get to sutures to m60 series this is s1 and here is s2 now we will have two pieces this is a PC - a and here is a PC - be coming to the connectivity copper straight through from s 1 FA 0 / 6 to this PC - a from s to FA 0 / 18 to PC - B now we will select a copper crossover to connect to this s 1 and s 2 from FA 0 / 1 to FA 0 / 1 on s 2 all right it's ready coming to the documentation in part 1 build and configure the network step 1 cable the network according to the topology with an that coming - step to configure a PC house so here we can see our addressing table now we will configure this PC - a and the PC - be coming to our addressing table here we can see the IP address of PC - a we will copy this address and here we can see the IP address or PC - B it's 1 or 2 and here we can see something to mask the default is certain to mask okay so we'll go to PC - a now we will go to desktop IP configuration and here is the IP address and the subnet mask now we will go to PC - be the stop IP configuration IP address is 1.2 we can verify it here correct and the something to mask coming to the next step step 3 initialize and reload the switches as necessary ok coming to step 4 configure basic settings for each switch so configure device name as shown in the topology configure IP address as listed in a dressing table as in Cisco as the console and the vty passwords as in class as the privileged exit passwords ok we can do that first of all we will do it on the sushi s1 CLI enable configure terminal we will set the hostname as s1 now we will get the IP address of this which s1 for the interface vlan1 sure we can see that we will copy this address so 192.168.1.1 and here we can see the default something to mask coming to s1 we will go to the interface vlan1 and we will set the IP address it's here on the mask 255 dot 255 dot 255 dot 0 and we will give you a short command now we will set a line passwords we will exit and we will go to line console 0 and we'll set the password a Cisco login exit and we'll go to line vty 0 to 15 we will set for all the lines password Cisco also we will enable secret as class copy running-config startup-config now we will do the basic configuration on this switch s2 coming to us to CLI enable configure terminal we will set the hostname as s2 coming to a trussing table device as - for the interface vlan1 we have to set this IP address 192.168.1.1 you go to the interface vlan1 IP address it's here then be something to mask now we will give an ocean on command now we will set line passwords exit we will go to line console 0 password a Cisco login also will go to line vty 0 to 15 that means all the lines you will set the password at Cisco we will exit and we will set enable secret as class copy running-config startup config now we will go to the next step coming to party to examine the SOOC makaras table Suchi learns MAC addresses and bills the maket receipt table as network devices initiate communication on the network coming to step one record network device MAC addresses open a command prompt on PC - a and PC - B and a type ipconfig space forward slash or what are the a third adapter physical addresses so here we have to give a PC - a MAC addresses and a PC - be matches that can be done okay so first of all we'll go to PC - a the stop command prom - here we can give ipconfig/all and here we can see faster third zero connection default port also we can see bluetooth connection right so here we can see a physical address so we will copy this MAC address and we'll paste it here now we will go to PC - be the stop command prompt ipconfig/all and here we can see physical address you will copy this address now we will go to be console into sushi s1 and s2 and it type the show interface fastethernet 0/1 command on each switch on the second line of command output what is the hardware addresses or burned-in address okay will verify that first of all we will do it on the sushi s1 CLI ok control shift to 6 sure we can give show interface fastethernet 0/1 and here we can see a truss is we will copy these errors and we will paste it here now we will go two years to CLI show interfaces facet are 0/1 and here we can see mega tress will copy this address now we will come to a step to display the switch MAC address table consoling to switch s2 and view the MAC address table both before and after running network communication test with ping establish a console connection to s 2 and enter privileged x ik mode in privileged x ik mode type the show MAC address table command and press Enter we have to enter this show a command show Mac space atrás - table even though there has been no network communication initiated across the network that is no use of thing it is possible that the switch has a Lane MAC addresses from its connection to the PC and the other such are there any mac addresses or recorder in the MAC address table we will verify that using this show command so we will go to yes to CLI show Mac - no it's a Mac space address table ok and here we can see it's updated here we can see some MAC addresses are recorded so here our answer is yes we will see what is next what MAC addresses are recorded in the table to which switch ports are they're mapped and to which devices do they belong ignore MAC addresses that are mapped to the CPU right we will come back to our sutures too and here we can see the details - MAC address so your 0 5 0 0 fo just will verify with our previous recording we cannot see 0 0 5 0 anywhere and here we can see the second a MAC address the 0 0 9 0 ok here we can see that double e 0 1 ok it's here yes one faster third 0 / 1 MAC address so this MAC address entry they are in this MAC address set table and here we can see a port FA 0 / 1 this is the port in this a suti s 2 FA 0 / 1 right next is if you had not previously recorded my consciousness of network device in step one how could you tell which devices the MAC addresses belongs to using only the output from the show MAC address a table command does it work in all scenarios yeah here we can go to that specific device and we can verify the MAC address now we will come to step 3 clear the is to megathrust table and display the MAC address table again in privileged exec mode type the clear MAC address table dynamic command and press Enter clear Mac space atrás - table dynamic and then quickly type the show MAC address table command again does the MAC address table how any addresses in it for VLAN 1 are there other MAC addresses listed ok we will verify that again we will go to yes to password is Cisco enable password is class here we are going to give a clear MAC address table dynamic and now we will give a show a MAC address table and here we can see a one entry previously we have seen a two and three now here we can see only one entry now wait 10 seconds type the show MAC address table command again and press Enter are there new addresses in the Mac across a table we will verify that coming back to our s2 Cisco enable passwords class show MAC address table and she'll here we can see only one entry okay right now we will go to step four from PC - be ping the devices on the network and observe the switch America trusts table from PC - be open a command prompt and type a RP - a not including multicast or broadcast actress how many device IP - mega trust players how been learned by ARP okay we will verify that we will go through PC - be the stop command prompt and Tucker we will give a RP - a and here we can see no ARP entries found right now we will come to be from the PC - be command prompt ping PC - a yes 1 and s2 it all devices how successful replies if not check your cabling and IP configurations ok we will check that we will go to PC - be the stop command prompt first of all will ping - PC - a you will get the IP address it's here bring to PC - a it's working no we will lap into the switches I think it's a 10 and 11 no it's 11 and toll okay 11 we are waiting for the replies it's working now we will up into 12 it's working now coming to see from my console connection to s to enter the show MAC address table command has the switch added additional MAC addresses to the MAC address table if so which addresses and devices ok we will verify that we will go - yes - and here we will give a show make a truss a table and here we can see the entries we will come to our MAC address details okay and the here we can see here we can see the second MAC address 0 0 6 0 3 w 7 e d 6 4 this is the MAC address so for a PC - a here we can see that and it's a port FS 0 / 1 in s 2 here we can see 0 0 9 0 0 C 8 - 9 8 D 9 and here we can see the port FA 0 / 18 then here we can see 0 0 9 0 2 1 0 7 e e 0 1 ok here we can see that yes one faster R 0 / 1 MAC address yes these are the entries are here in this s 2 now from PC - be open a command prompt and re-type ARP space - a does the PC - be ARP cache a have additional entries for all Network devices that were a send a ping ok we will verify that we will go to PC - be the stop a command prompt here again we are going to write type this command ARP space - a and here we can see the entries petrels here we can see physical address and it's type we pin to all these devices I mean we ping to all these IP addresses who can write so a friend so that's all in this Scilab activity that is viewing the suture macros our table dear friends if you have any doubt any suggestions please comment below and if you like our videos give a thumb and share with all your friends subscribe stay tuned and we will meet again with the next video thank you
Info
Channel: Tech Acad
Views: 19,884
Rating: undefined out of 5
Keywords: CCNA, CISCO, MAC, Switch, MAC Adress Table, CISCO Switch, CISCO Certification, Packet Tracer, Routing and Switching, ICND1, CCENT, Networking, Media Access Control
Id: V7yJmnoNuvo
Channel Id: undefined
Length: 24min 3sec (1443 seconds)
Published: Thu Sep 26 2019
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.