Cisco NM-8B-U User Guide - Page 117

Verifying Dynamic Addresses, show mac, address, table dynamic, clear mac-address-table secure

Page 117 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks Verifying Dynamic Addresses Step 1 Use the show mac-address-table dynamic command to verify configuration: Router# show mac-address-table dynamic Adding Secure Addresses The secure address table contains secure MAC addresses and their associated ports and VLANs. A secure address is a manually entered unicast address that is forwarded to only one port per VLAN. If you enter an address that is already assigned to another port, the switch reassigns the secure address to the new port. You can enter a secure port address even when the port does not yet belong to a VLAN. When the port is later assigned to a VLAN, packets destined for that address are forwarded to the port. To add a secure address, use the following commands beginning in privileged EXEC mode: Step 1 Step 2 Step 3 Command Router# configure terminal Router(config)# mac-address-table secure address hw-addr interface interface-id vlan vlan-id Router(config)# end Purpose Enters global configuration mode. Enters the MAC address, its associated port, and the VLAN ID. Returns to privileged EXEC mode. To remove a secure address, use the following commands beginning in privileged EXEC mode: Step 1 Step 2 Step 3 Command Router# configure terminal Router(config)# no mac-address-table secure hw-addr vlan vlan-id Router(config)# end Purpose Enters global configuration mode. Enters the secure MAC address, its associated port, and the VLAN ID to be removed. Returns to privileged EXEC mode. You can remove all secure addresses by using the clear mac-address-table secure command in privileged EXEC mode. Verifying Secure Addresses Step 1 Use the show mac-address-table secure command to verify configuration: Router# show mac-address-table secure Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 117

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
117
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Verifying Dynamic Addresses
Step 1
Use the
show mac
-
address
-
table dynamic
command to verify configuration:
Router#
show mac-address-table dynamic
Adding Secure Addresses
The secure address table contains secure MAC addresses and their associated ports and VLANs. A
secure address is a manually entered unicast address that is forwarded to only one port per VLAN. If you
enter an address that is already assigned to another port, the switch reassigns the secure address to the
new port.
You can enter a secure port address even when the port does not yet belong to a VLAN. When the port
is later assigned to a VLAN, packets destined for that address are forwarded to the port.
To add a secure address, use the following commands beginning in privileged EXEC mode:
To remove a secure address, use the following commands beginning in privileged EXEC mode:
You can remove all secure addresses by using the
clear mac-address-table secure
command in
privileged EXEC mode.
Verifying Secure Addresses
Step 1
Use the
show mac
-
address
-
table secure
command to verify configuration:
Router#
show mac-address-table secure
Command
Purpose
Step 1
Router#
configure terminal
Enters global configuration mode.
Step 2
Router(config)#
mac-address-table secure
address
hw-addr
interface
interface-id
vlan
vlan-id
Enters the MAC address, its associated port, and the
VLAN ID.
Step 3
Router(config)#
end
Returns to privileged EXEC mode.
Command
Purpose
Step 1
Router#
configure terminal
Enters global configuration mode.
Step 2
Router(config)#
no mac-address-table secure
hw-addr
vlan
vlan-id
Enters the secure MAC address, its associated port, and
the VLAN ID to be removed.
Step 3
Router(config)#
end
Returns to privileged EXEC mode.