CCNP ENCOR // Layer 2 Forwarding (LAB) // ENCOR 350-401 Complete Course
3 min read
10 months ago
Published on Oct 12, 2024
This response is partially generated with the help of AI. It may contain inaccuracies.
Table of Contents
Introduction
This tutorial provides a step-by-step guide to Layer 2 Forwarding as part of the CCNP ENCOR 350-401 course. It covers practical lab configurations, including packet capture and MAC address management, enabling you to gain hands-on experience with network traffic management and analysis.
Step 1: Configure the Linux Server
- Set Up the Server: Ensure your Linux server is properly configured to act as a packet capture tool.
- Install Necessary Tools: You may need tools like
tcpdump
orWireshark
for capturing network packets. - Network Interface Configuration: Make sure the network interfaces are configured correctly to capture the desired traffic.
Step 2: Start Packet Capture
- Open Terminal: Access the terminal on your Linux server.
- Run Capture Command: Use the following command to start capturing packets on the appropriate interface:
Replacesudo tcpdump -i [interface_name] -w capture.pcap
[interface_name]
with your actual network interface name. - Verify Capture: Ensure that the capture is running by checking the output in the terminal.
Step 3: Generate Traffic on R1
- Access Router R1: Log into your router R1 via console or SSH.
- Create Traffic: Use the following command to generate traffic:
Replaceping [destination_IP]
[destination_IP]
with the IP of the target device. - Monitor Capture: Check your packet capture tool to see if the ping traffic is being recorded.
Step 4: Generate Unknown Unicast Traffic
- Identify Unknown Unicast: Configure a device to send packets to a MAC address that is not in the MAC address table.
- Testing: Use a tool or script to send unknown unicast packets.
- Capture Verification: Verify that the unknown unicast traffic is being captured in your packet capture file.
Step 5: Examine Packet Capture
- Open Capture File: Use Wireshark or a similar tool to open the
capture.pcap
file. - Analyze Traffic: Look for specific patterns in the packets, such as source and destination MAC addresses.
- Filters: Apply filters to isolate the unknown unicast traffic for better analysis.
Step 6: Disable MAC Aging
- Access Switch Configuration: Connect to your switch.
- Disable MAC Aging: Enter the following commands in the configuration mode:
Replaceinterface [interface_name] no mac-address-table aging-time
[interface_name]
with your switch interface. - Verify Changes: Check the MAC address table to confirm that aging is disabled.
Step 7: Configure Static MAC Addresses
- Enter Configuration Mode: Access your switch's configuration mode.
- Add Static MAC Address: Use the following command to add a static MAC address:
Replacemac-address-table static [mac_address] vlan [vlan_id] interface [interface_name]
[mac_address]
,[vlan_id]
, and[interface_name]
with your specific values. - Verification: Check the MAC address table to ensure that the static entry is present.
Conclusion
In this tutorial, you learned how to configure a Linux server for packet capture, generate various types of traffic, and manage MAC addresses on a switch. These skills are essential for understanding Layer 2 forwarding in network environments. For further practice, consider exploring additional scenarios and configurations related to Layer 2 protocols and traffic analysis.