7.2.7 Computer Netwoks
7.2.7 Computer Netwoks
ID: 20B030193
Lab - View Network Device MAC Addresses
Topology
Addressing Table
Device Interface IP Address Subnet Mask
Objectives
Part 1: Configure Devices and Verify Connectivity
Part 2: Display, Describe, and Analyze Ethernet MAC Addresses
Background / Scenario
Every device on an Ethernet LAN is identified by a Layer 2 MAC address. This address is assigned by the manufacturer
and stored in the firmware of the NIC. This lab will explore and analyze the components that make up a MAC address,
and how you can find this information on a switch and a PC.
You will cable the equipment as shown in the topology. You will configure the switch and PC to match the addressing
table. You will verify your configurations by testing for network connectivity.
After the devices have been configured and network connectivity has been verified, you will use various commands to
retrieve information from the devices to answer questions about your network equipment.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.2(2) (lanbasek9 image). Other switches
and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and the
output produced might vary from what is shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure, ask your
instructor.
Required Resources
1 Switch (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
1 PC (Windows with a terminal emulation program, such as Tera Term)
Console cable to configure the Cisco switch via the console ports
Ethernet cables as shown in the topology
2013 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 5 www.netacad.com
Lab - View Network Device MAC Addresses
Instructions
Part 1: Configure Devices and Verify Connectivity
In this part, you will set up the network topology and configure basic settings, such as the interface IP addresses and
device name. For device name and address information, refer to the Topology and Addressing Table.
Switch> enable
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#
b. Assign a hostname to the switch based on the Addressing Table.
Switch(config)# hostname S1
c. Disable DNS lookup.
S1(config)# no ip domain-lookup
d. Configure and enable the SVI interface for VLAN 1.
S1(config)# interface vlan 1
S1(config-if)# ip address 192.168.1.2 255.255.255.0
S1(config-if)# no shutdown
S1(config-if)# end
*Mar 1 00:07:59.048: %SYS-5-CONFIG_I: Configured from console by console
Close a configuration window
What is the OUI portion of the MAC address for this device?
Answer: 74-12-B3
What is the serial number portion of the MAC address for this device?
Answer: C3-CF-49
Using the example above, find the name of the vendor that manufactured this NIC.
Answer: Dell Inc
b. From the command prompt on PC-A, issue the ipconfig /all command and identify the OUI portion of the MAC
address for the NIC of PC-A. Answer:5C-23-0A
Identify the serial number portion of the MAC address for the NIC of PC-A.
Lab - View Network Device MAC Addresses
Answer: 24-CF-49
b. Another way to display the MAC address on the switch is to use the show arp command. Use the show arp command
to display MAC address information. This command maps the Layer 2 address to its corresponding Layer 3 address.
A sample is shown below. Use output generated by your switch to answer the questions.
S1# show arp
Protocol Address Age (min) Hardware Addr Type Interface
Internet 192.168.1.2 - 001b.0c6d.8f40 ARPA Vlan1
Internet 192.168.1.3 0 5c26.0a24.2a60 ARPA Vlan1 What Layer 2 addresses are displayed
on S1?
Type your answers here.
What Layer 3 addresses are displayed on S1?
Type your answers he.
Reflection Questions
1. Can you have broadcasts at the Layer 2 level? If so, what would the MAC address be?
Answer: Yes, we can. Address is FF.FF.FF.FF.FF.FF.
2. Why would you need to know the MAC address of a device?
Answer: In a large network, it may be easier to find the location and identification of a device by its
MAC address rather than by its IP address. Security measures can be applied at layer 2, so it is
necessary to know the valid MAC addresses.