![HP Compaq Presario,Presario 1910 Скачать руководство пользователя страница 198](http://html.mh-extra.com/html/hp/compaq-presario-presario-1910/compaq-presario-presario-1910_user-manual_161851198.webp)
185
Configuring MAC address tables
MAC address configurations related to interfaces apply only to Layer 2 Ethernet interfaces.
This document covers only the management of unicast MAC address entries, including static, dynamic,
and blackhole MAC address entries.
Overview
To reduce single-destination packet floodings in a switched LAN, an Ethernet device uses a MAC
address table to forward frames. This table describes from which port a MAC address (or host) can be
reached. Upon receiving a frame, the device uses the destination MAC address of the frame to look for
a match in the MAC address table. If a match is found, the device forwards the frame out of the outgoing
interface in the matching entry. If no match is found, the device floods the frame out of all but the
incoming port.
How a MAC address table entry is created
The device automatically learns entries in the MAC address table, or you can add them manually.
MAC address learning
The device can automatically populate its MAC address table by learning the source MAC addresses of
incoming frames on each port.
When a frame arrives at a port (for example, Port A), the device performs the following tasks:
1.
Verifies the source MAC address (for example, MAC-SOURCE) of the frame.
2.
Looks up the source MAC address in the MAC address table.
{
If an entry is found, the device updates the entry.
{
If no entry is found, the device adds an entry for MAC-SOURCE and Port A.
3.
When the device receives a frame destined for MAC-SOURCE after learning this source MAC
address, the device finds the MAC-SOURCE entry in the MAC address table and forwards the
frame out of Port A.
The device performs this learning process each time it receives a frame from an unknown source MAC
address, until the MAC address table is fully populated.
Manually configuring MAC address entries
With dynamic MAC address learning, a device does not distinguish between illegitimate and legitimate
frames. For example, when a hacker sends frames with a forged source MAC address to a port different
from the one with which the real MAC address is associated, the device creates an entry for the forged
MAC address, and forwards frames destined for the legal user to the hacker instead.
To improve port security, you can manually add MAC address entries to the MAC address table of the
device to bind specific user devices to the port.
Содержание Compaq Presario,Presario 1910
Страница 35: ...22 Figure 16 Sort display based on MAC address in the ascending order ...
Страница 54: ...41 Figure 27 Configuration finishes ...
Страница 70: ...57 Figure 42 Configuring idle timeout period 3 Set the idle timeout period for logged in users 4 Click Apply ...
Страница 98: ...85 Figure 67 Displaying the rate settings of ports ...
Страница 114: ...101 Figure 82 Port traffic statistics NOTE When the bandwidth utilization is lower than 1 1 is displayed ...
Страница 158: ...145 Field Description OutErrors Number of invalid packets sent through the interface ...
Страница 202: ...189 Figure 177 Creating a static MAC address entry ...
Страница 230: ...217 Figure 193 Configuring MSTP globally on Switch D ...
Страница 359: ...346 5 View the operation result in the Summary area Figure 316 IPv6 traceroute operation result ...