CCNP ENCOR // Layer 2 Forwarding (LAB) // ENCOR 350-401 Complete Course
3 min read
2 hours ago
Published on Oct 12, 2024
This response is partially generated with the help of AI. It may contain inaccuracies.
Table of Contents
Introduction
This tutorial provides a step-by-step guide to Layer 2 Forwarding as part of the CCNP ENCOR 350-401 course. It covers practical lab configurations, including packet capture and MAC address management, enabling you to gain hands-on experience with network traffic management and analysis.
Step 1: Configure the Linux Server
- Set Up the Server: Ensure your Linux server is properly configured to act as a packet capture tool.
- Install Necessary Tools: You may need tools like
tcpdump
orWireshark
for capturing network packets. - Network Interface Configuration: Make sure the network interfaces are configured correctly to capture the desired traffic.
Step 2: Start Packet Capture
- Open Terminal: Access the terminal on your Linux server.
- Run Capture Command: Use the following command to start capturing packets on the appropriate interface:
Replacesudo tcpdump -i [interface_name] -w capture.pcap
[interface_name]
with your actual network interface name. - Verify Capture: Ensure that the capture is running by checking the output in the terminal.
Step 3: Generate Traffic on R1
- Access Router R1: Log into your router R1 via console or SSH.
- Create Traffic: Use the following command to generate traffic:
Replaceping [destination_IP]
[destination_IP]
with the IP of the target device. - Monitor Capture: Check your packet capture tool to see if the ping traffic is being recorded.
Step 4: Generate Unknown Unicast Traffic
- Identify Unknown Unicast: Configure a device to send packets to a MAC address that is not in the MAC address table.
- Testing: Use a tool or script to send unknown unicast packets.
- Capture Verification: Verify that the unknown unicast traffic is being captured in your packet capture file.
Step 5: Examine Packet Capture
- Open Capture File: Use Wireshark or a similar tool to open the
capture.pcap
file. - Analyze Traffic: Look for specific patterns in the packets, such as source and destination MAC addresses.
- Filters: Apply filters to isolate the unknown unicast traffic for better analysis.
Step 6: Disable MAC Aging
- Access Switch Configuration: Connect to your switch.
- Disable MAC Aging: Enter the following commands in the configuration mode:
Replaceinterface [interface_name] no mac-address-table aging-time
[interface_name]
with your switch interface. - Verify Changes: Check the MAC address table to confirm that aging is disabled.
Step 7: Configure Static MAC Addresses
- Enter Configuration Mode: Access your switch's configuration mode.
- Add Static MAC Address: Use the following command to add a static MAC address:
Replacemac-address-table static [mac_address] vlan [vlan_id] interface [interface_name]
[mac_address]
,[vlan_id]
, and[interface_name]
with your specific values. - Verification: Check the MAC address table to ensure that the static entry is present.
Conclusion
In this tutorial, you learned how to configure a Linux server for packet capture, generate various types of traffic, and manage MAC addresses on a switch. These skills are essential for understanding Layer 2 forwarding in network environments. For further practice, consider exploring additional scenarios and configurations related to Layer 2 protocols and traffic analysis.