Configuring MAC Address Tables

Similar documents
Configuring MAC Address Tables

Configuring MAC Address Tables

Configuring MAC Address Tables

Configuring the MAC Address Table

Configuring Layer 2 Switching

Configuring Layer 2 Switching

On the Cisco Nexus 5548 Switch, Fibre Channel ports and VSAN ports cannot be configured as ingress source ports in a SPAN session.

Configuring Rapid PVST+

Configuring Port Channels

vpc Layer 3 Backup Routing with F1 and Peer Gateway

Configuring SPAN. Configuring SPAN. SPAN Sources. This chapter includes the following sections: Configuring SPAN, page 1

vpc Configuration Synchronization

Configuring Q-in-Q VLAN Tunnels

The document assumes a working knowledge of the Nexus 7000 architecture

Configuring DHCP Snooping

Configuring IGMP Snooping

Configuring Private VLANs Using NX-OS

Configuring Traffic Storm Control

Configuring Traffic Storm Control

Configuring Access and Trunk Interfaces

Configuring DHCP. About DHCP Snooping, page 2 About the DHCPv6 Relay Agent, page 8

Configuration Examples for DHCP, on page 37 Configuration Examples for DHCP Client, on page 38 Additional References for DHCP, on page 38

Configuring DHCP. Finding Feature Information

Nexus 7000: Configuring OTV VLAN Mapping using VLAN Translation on a Trunk Port

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring Q-in-Q VLAN Tunnels

Finding Feature Information, page 2 Information About DHCP Snooping, page 2 Information About the DHCPv6 Relay Agent, page 8

Configuring VM-FEX. Information About VM-FEX. VM-FEX Overview. VM-FEX Components. This chapter contains the following sections:

Configuring EtherChannels

Configuring EtherChannels

Configuring Local SPAN and ERSPAN

Storm Control over EVC

Configuring Queuing and Flow Control

Configuring VXLAN EVPN Multi-Site

Configuring Virtual Port Channels

Configuring Enhanced Virtual Port Channels

Configuring Virtual Port Channels

Configuring Port-Based Traffic Control

Configuring VXLAN EVPN Multi-Site

Contents. Introduction. Prerequisites. Requirements. Components Used

Configuring Policy-Based Routing

IGMP Snooping for IPv4 Multicast Traffic

Configuring Tap Aggregation and MPLS Stripping

Configuring TAP Aggregation and MPLS Stripping

Configuring Layer 3 Interfaces

Configuring Virtual Port Channels

Configuring VXLAN EVPN Multi-Site

Configuring Basic Interface Parameters

Configuring Rapid PVST+ Using NX-OS

Configuring Virtual Port Channels

Configuring MLD Snooping

Configuring Rate Limits

Configuring Q-in-Q VLAN Tunnels

Configuring Port Channels

Implementing the ERSPAN Analytics Feature on Cisco Nexus 6000 Series and 5600 Platform Switches

Nexus 7000 Peer Switch Configuration (Hybrid Setup)

With 802.1X port-based authentication, the devices in the network have specific roles.

Configuring PTP. Information About PTP. This chapter contains the following sections:

Configuring TAP Aggregation and MPLS Stripping

Configuring Layer 3 Interfaces

Network-Level High Availability

Configuring Policy-Based Routing

Configuring 802.1X. Finding Feature Information. Information About 802.1X

Configuring EtherChannels

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch

Configuring Session Manager

Configuring MPLS Label Imposition

With 802.1X port-based authentication, the devices in the network have specific roles.

Configuring Private VLANs

Configuring STP Extensions

Configuring DHCP Features

Configuring IPv6 First-Hop Security

Cisco FabricPath Technology and Design

VXLAN Overview: Cisco Nexus 9000 Series Switches

Basic Port Configuration

Configuring MST Using Cisco NX-OS

Cisco Nexus 3000 Series Switch NX-OS Verified Scalability Guide, Release 7.x

OTV Loopback Join Interface

VXLAN Deployment Use Cases and Best Practices

Configuring IGMP Snooping for IPv4 Multicast Traffic

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

Monitor Commands. monitor session source, page 2 monitor session destination, page 4

Configuring Private VLANs

Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide

Configuring SPAN. Finding Feature Information. About SPAN. SPAN Sources

Configuring PIM. Information About PIM. Send document comments to CHAPTER

Configuring Port-Based Traffic Control

Configuring Unicast RPF

Configuring MLD Snooping

Understanding and Configuring Private VLANs

Configuring PIM Snooping

Cisco IOS Commands for the Catalyst 4500 Series Switches

Configuring IGMP Snooping and Filtering

Cisco IOS Commands for the Catalyst 4500 Series Switches

Deploy Application Load Balancers with Source Network Address Translation in Cisco DFA

Configuring ARP. Prerequisites for Configuring ARP. Restrictions for Configuring ARP

Command Manual MAC Address Table Management H3C S5500-EI Series Ethernet Switches. Table of Contents

Configuring DHCP Snooping

Configuring Private VLANs

Transcription:

This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 2 Verifying the MAC Address Configuration, page 4 Verifying RMAC Learning Feature, page 5 Information About MAC Addresses To switch frames between LAN ports, the switch maintains an address table. When the switch receives a frame, it associates the media access control (MAC) address of the sending network device with the LAN port on which it was received. The switch dynamically builds the address table by using the MAC source address of the frames received. When the switch receives a frame for a MAC destination address not listed in its address table, it floods the frame to all LAN ports of the same VLAN except the port that received the frame. When the destination station replies, the switch adds its relevant MAC source address and port ID to the address table. The switch then forwards subsequent frames to a single LAN port without flooding all LAN ports. You can also enter a MAC address, which is termed a static MAC address, into the table. These static MAC entries are retained across a reboot of the switch. RMAC Learning Starting with Cisco NX-OS Release 7.2(0)N1(1), the RMAC Learning feature is supported on Cisco Nexus 5600 and 6000 series switches. This feature allows the default MAC address (RMAC) of a VLAN interface to be dynamically learned on another VLAN over a bridged interface on the switch. For example, consider two VLANs VLAN X and VLAN Y bridged over an external device. If a customer has a VLAN interface configured on VLAN Y, the MAC address of the interface will be dynamically learned on VLAN X. OL-27929-03 1

Configuring MAC Addresses Configuring MAC Addresses Configuring Static MAC Addresses You can configure static MAC addresses for the switch. These addresses can be configured in interface configuration mode or in VLAN configuration mode. Step 3 switch(config) # mac address-table static mac_address vlan vlan-id {drop interface {type slot/port} port-channel number} [auto-learn] switch(config)# no mac address-table static mac_address vlan vlan-id Specifies a static address to add to the MAC address table. If you enable the auto-learn option, the switch will update the entry if the same MAC address is seen on a different port. If this is a 10G breakout port, the slot/port syntax is slot/qsfp-module/port. (Optional) Deletes the static entry from the MAC address table. Use the mac address-table static command to assign a static MAC address to a virtual interface. This example shows how to put a static entry in the MAC address table: switch(config) # mac address-table static 12ab.47dd.ff89 vlan 3 interface ethernet 1/4 switch(config) # Configuring the Aging Time for the MAC Table You can configure the amount of time that an entry (the packet source MAC address and port that packet ingresses) remains in the MAC table. MAC aging time can be configured in either interface configuration mode or in VLAN configuration mode. switch(config)# mac address-table aging-time seconds [vlan vlan_id] Specifies the time before an entry ages out and is discarded from the MAC address table. 2 OL-27929-03

Configuring MAC Move Loop Detection The seconds range is from 0 to 1000000. The default is 300 seconds for Cisco NX-OS 5500 and 1800 for Cisco NX-OS 5600 and 6000 series. Entering the value 0 disables the MAC aging. If a VLAN is not specified, the aging specification applies to all VLANs. This example shows how to set the aging time for entries in the MAC address table to 300 seconds: switch(config) # mac address-table aging-time 300 switch(config) # Configuring MAC Move Loop Detection When the number of MAC address moves between two ports exceeds a threshold, it forms a loop. From Cisco NX-OS release 6.0(2)N2(1), you can configure the action of bringing down the port with the lower interface index when such a loop is detected by using the mac address-table loop-detect port-down command. To revert to the default action of disabling MAC learning, use the no form of this command. If only the loop-detect port-down configuration is enabled, the last port on which MAC loop is detected is err-disabled. switch(config)# [no] mac address-table loop-detect port-down Specifies the port-down action for MAC move loop detection. The no form of this command reverts to the default action of disabling MAC learning for 180 seconds. Step 3 switch(config)# mac address-table loop-detect port-down edge-port Enables the err-disabled detection for the edge-port on the MAC move loop detection. This example shows how to configure port-down as the action for MAC move loop detection. switch(config)# mac address-table loop-detect port-down This example shows how to enable the err-disabled detection for the edge-port on the MAC move loop detection. switch(config)# mac address-table loop-detect port-down edge-port OL-27929-03 3

Clearing Dynamic Addresses from the MAC Table Clearing Dynamic Addresses from the MAC Table switch(config)# clear mac address-table dynamic {address mac-addr} {interface [type slot/port port-channel number} {vlan vlan-id} Clears the dynamic address entries from the MAC address table. If this is a 10G breakout port, the slot/port syntax is slot/qsfp-module/port. Enabling RMAC Learning Feature switch(config)# [no] mac address-table router-mac learn-enable Enables/disables the RMAC learning feature. You can use the clear mac address-table dynamic command to clear the learned MAC addresses. Verifying the MAC Address Configuration Use one of the following commands to verify the configuration: Table 1: MAC Address Configuration Verification Commands Command show mac address-table aging-time show mac address-table Displays the MAC address aging time for all VLANs defined in the switch. Displays the contents of the MAC address table. IGMP snooping learned MAC addresses are not displayed. 4 OL-27929-03

Verifying RMAC Learning Feature Command show mac address-table loop-detect Displays the currently configured action. This example shows how to display the MAC address table: switch# show mac address-table VLAN MAC Address Type Age Port ---------+-----------------+-------+---------+------------------------------ 1 0018.b967.3cd0 dynamic 10 Eth1/3 1 001c.b05a.5380 dynamic 200 Eth1/3 Total MAC Addresses: 2 This example shows how to display the current aging time: switch# show mac address-table aging-time Vlan Aging Time ----- ---------- 1 300 13 300 42 300 This example shows how to display the currently configured action: switch(config)# show mac address-table loop-detect Port Down Action Mac Loop Detect : enabled switch(config)# no mac address-table loop-detect port-down switch(config)# show mac address-table loop-detect Port Down Action Mac Loop Detect : disabled Verifying RMAC Learning Feature Use the show mac address-table interface type slot/port vlan vlan_id command to display the information about the MAC address table. In the sample output given below, RMAC is learned on Ethernet 1/33. switch# show mac address-table interface ethernet 1/33 vlan 2 Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vpc Peer-Link VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID ---------+-----------------+--------+---------+------+----+------------------ * 2 002a.6aca.b6bc dynamic 20 F F Eth1/33 OL-27929-03 5

Verifying RMAC Learning Feature 6 OL-27929-03