Cisco 2950G 24 Software Configuration Guide - Page 211
Adding and Removing Secure Addresses
UPC - 746320687711
View all Cisco 2950G 24 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 211 highlights
Chapter 7 Administering the Switch Managing the MAC Address Table Beginning in privileged EXEC mode, follow these steps to add a static address: Step 1 Step 2 Command configure terminal mac address-table static mac-addr vlan vlan-id interface interface-id Step 3 Step 4 Step 5 end show mac address-table static copy running-config startup-config Purpose Enter global configuration mode. Add a static address to the MAC address table. • For mac-addr, specify the destination MAC address (unicast or multicast) to add to the address table. Packets with this destination address received in the specified VLAN are forwarded to the specified interface. • For vlan-id, specify the VLAN for which the packet with the specified MAC address is received. Valid VLAN IDs are 1 to 4094 when the EI is installed and 1 to 1005 when the SI is installed; do not enter leading zeros. • For interface-id..., specify the interface to which the received packet is forwarded. Valid interfaces include physical ports. Return to privileged EXEC mode. Verify your entries. (Optional) Save your entries in the configuration file. To remove static entries from the address table, use the no mac address-table static mac-addr vlan vlan-id interface interface-id global configuration command. This example shows how to add the static address c2f3.220a.12f4 to the MAC address table. When a packet is received in VLAN 4 with this MAC address as its destination address, the packets is forwarded to the specified interface: Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 interface gigabitethernet0/1 Adding and Removing Secure Addresses A secure address is a manually entered unicast address or dynamically learned address that is forwarded to only one port per VLAN. If you enter a static address that is already assigned to another port, the request will be rejected. Secure addresses can be learned dynamically if the configured secure addresses do not reach the maximum limit of the port. You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. When sticky learning is enabled, the interface converts all the dynamic secure MAC addresses, including those that were learned dynamically before sticky learning is enabled, to sticky secure MAC addresses. It adds all the sticky secure MAC addresses to the running configuration. For more information, see the "Secure MAC Addresses" section on page 18-5. 78-14982-01 Catalyst 2950 Desktop Switch Software Configuration Guide 7-59