and you will have all interfaces in bridge mode and my guess is that if this doesn't work there is not another way to do it unless you flood the cam talbe until it reaches it maximun memmory and the switch will start working as a hub.
mac-address-table aging-time 1000000 ! and start sending traffic with tons of different source mac addresses
I think adding all the interfaces to the same bridge-group would turn the switch into something hub-like, *if* you also create an individual SVI for each of the switchports.
That way, there is a separate MAC address table for each port, with no MAC addresses in them for any devices on other ports, so all traffic ends up being "broadcasted" out of each SVI onto the bridge-group, thus being received by all other SVIs and hence physical ports.
I do not think that the bridge-group access is a viable approach at all, because of several reasons:
Between multiple member ports in a bridge-group, the traffic is switched, not flooded.
Ports in different bridge-groups can not communicate at all.
SVIs (i.e. interface Vlan) are not related to bridge-groups in general; BVIs (i.e. interface BVI) do not need to be created for a bridge-group, and even if they are, they handle Layer3 functions and do not influence the bridging
With particular respect to Catalyst switches and bridge-groups, the SVIs are relevant because the bridge-group functionality on Catalysts can be configured only over Layer3 routed ports and SVIs. However, this feature is called Fallback Bridging, applies only to non-IP traffic, and operates based on switching, not flooding (see the first two points).
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...