A router to generate some traffic and a switch to look at (and configure) the MAC address table. To demonstrate this we only require two devices. You can either specify the interface where the MAC address is located or tell the switch to drop the traffic. A really simple method to deal with this issue is to manually configure entries in the MAC address table, a static entry will always overrule dynamic entries. This process is vulnerable to layer 2 MAC address spoofing attacks where an attacker spoofs a certain MAC address to change entries in the MAC address table. Normally your switch will automatically learn MAC addresses and fill its MAC address table (CAM table) by looking at the source MAC address of incoming frames and flooding frames if it doesn’t know where to forward the frame.
0 Comments
Leave a Reply. |