Wondering if ethernet frames with destination MAC broadcast are used in the MAC learning procedure within a L2 switch. For example I have heard that ARP requests (having broadcast destination MAC) are not used to populate the table containg the MAC address associated to a given port. Is that true? Actually I have not found anything in IEEE 802.1 on this regard.
Something came up locally that completely surprised me. An ARP response is layer 3 concept, as in there is a mac-address in the payload that does not have to match the sending mac-address.
ARP was developed to support more than just IP, so the message contains a protocol field.
To more directly answer your question, switches only learn based on what source mac-address they see coming from what port. A destination of broadcast still has a source of the actual sender so the switch will learn from that frame.
A frame that contains an ARP will have a source address and the switch will learn that source mac, HOWEVER this can actually be different information than what is contained in the ARP reply. It's a little devious but it serves a purpose in some setups like GLBP.
The layer 2 switch learning process is very simple. If a switch generates a frame with any unknown unicast or even a broadcast address, the switch only keeps the source port and MAC address info in the switching table. Now try relating this logic with your statement about ARP and you will get your answer.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...