-host A is going to do a bitwise AND of its netmask and own IP address and compare the result of same operation done between its netmask and destination address.
-if the result is the same which it is if they are on same subnet then it is gonna search for a L2 mapping corresponding to host B IP address
To do so it first looks into its arp cache and if there is no entry for this IP then it is going to emit a broadcast ARP request
-the ARP request which is a L2 broadcast is flooded by the switch attached to host A to all ports which means to link between switches and the second switch does the same so finally it is hear by host B
-Host B sends an unicast arp reply and the switch connected to host B learns the src MAC of host B and puts an entry in its CAM table then as it has still no entry for dst MAC of host A it will flood the unknown unicast frame which finally arrives on Host A and at the same time it puts an entry in its CAM table for the src MAC of host B
Now the same happens on the other switch when it receives the reply and finally there are entries in the CAM tables of both switches for the MAC addresses of host A and B
Host B depending of implementations when seeing the arp request either fills its arp cache with the src MAC of host A and its IP or when replying to host A at L3 will also initiate an arp request.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...