Configuring mac address table, Overview, How a mac address table entry is created – H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Page 42: Mac address learning, Manually configuring mac address entries, Types of mac address table entries
32
Configuring MAC address table
Overview
An Ethernet device uses a MAC address table for forwarding frames through unicast instead of
broadcast. This table describes from which port a MAC address (or host) can be reached. When
forwarding a frame, the device first looks up the MAC address of the frame in the MAC address table for
a match. If an entry is found, the device forwards the frame out of the outgoing port in the entry. If no
entry is found, the device broadcasts the frame out of all but the incoming port.
How a MAC address table entry is created
The entries in the MAC address table come from two sources: automatically learned by the device and
manually added by the administrator.
MAC address learning
The device can automatically populate its MAC address table by learning the source MAC addresses of
incoming frames on each port.
When a frame arrives at a port, Port A for example, the device performs the following tasks:
1.
Checks the source MAC address (MAC-SOURCE for example) of the frame.
2.
Looks up the MAC address in the MAC address table.
3.
If an entry is found, updates the entry. If no entry is found, adds an entry for MAC-SOURCE and
Port A.
The device performs the learning process each time it receives a frame from an unknown source MAC
address, until the MAC address table is fully populated.
After learning the source MAC address of a frame, the device looks up the destination MAC address in
the MAC address table. If an entry is found for the MAC address, the device forwards the frame out of
the specific outgoing port, Port A in this example.
Manually configuring MAC address entries
With dynamic MAC address learning, a device does not distinguish between illegitimate and legitimate
frames, which can invite security hazards. For example, when a hacker sends frames with a forged
source MAC address to a port different from the one where the real MAC address is connected to, the
device creates an entry for the forged MAC address, and forwards frames destined for the legal user to
the hacker instead.
To enhance the security of a port, you can manually add MAC address entries to the MAC address table
of the device to bind specific user devices to the port. Because manually configured entries have higher
priority than dynamically learned ones, you can prevent hackers from stealing data using forged MAC
addresses.
Types of MAC address table entries
A MAC address table can contain the following types of entries:
•
Static entries—Manually added and never age out.
- H3C WX5500E Series Access Controllers H3C WX3500E Series Access Controllers H3C WX2500E Series Access Controllers H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C LSWM1WCM10 Access Controller Module H3C LSUM3WCMD0 Access Controller Module H3C LSUM1WCME0 Access Controller Module H3C LSWM1WCM20 Access Controller Module H3C LSQM1WCMB0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module H3C LSBM1WCM2A0 Access Controller Module H3C WA3600 Series Access Points H3C WA2600 Series WLAN Access Points