The port returns to service after a configured timeout duration. NOTE: If a port detects a loop, the system takes the port out of service to protect the overall network. You can also have the port check for a high rate of MAC address moves per second, which indicates a physical loop only when the rate exceeds the threshold for 6 consecutive seconds. If a broadcast packet is subsequently received by the sending port, a loop exists downstream.
Each port that has loop guard enabled will periodically broadcast loop guard data packets (LGDP) packets to its network. The loop guard feature is designed to work in concert with STP rather than as a replacement for STP. When loop guard is enabled on a switch port, the port monitors its subtending network for any downstream loops. Set description "first static MAC address"Ī loop in a layer-2 network results in broadcast storms that have far-reaching and unwanted effects.
When the packet generated from my PC traverses down the wire and hits my port on the switch, the switch’s MAC table is queried to see if it has a stored MAC address that matches the packet’s destination MAC address. I want to send your PC some type of data. We both have IP Addresses on the same subnet. My PC and your PC are plugged into our switch. If you have any experience with switches and switching theory, the Canopy Bridge Table is the exact same thing as a switch’s MAC table.Įxample - we have a 5-port switch. More specifically, the “Age” column in the table is the amount of time that has passed since the radio forwarded a packet or received a packet from that MAC address. The length of time these addresses will remain in the unit’s cache is a function of the “Bridge Table Timeout” parameter in the unit’s configuration. The MAC addresses in this list are stored addresses that the unit will forward packets to that match the Link-Layer (Layer-2) Destination MAC address in packets the unit receives. What you are seeing is the MAC address table of the particular device.