
161616
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Catalyst CAM Tables
¥ Catalyst switches use hash to place MAC in CAM table
1
2
3
.
.
16,000
1
2
3
.
.
16,000
A
A
B
B
C
C
D
D
E
E
F
F
G
G
L
L
M
M
N
N
O
O
P
P
Q
Q
R
R
S
S
H
H
I
I
J
J
K
K
¥ 63 bits of source (MAC, VLAN, misc) creates a 17 bit hash value
If the value is the same there are 8 buckets to place CAM entries, if all 8 are
filled the packet is flooded
T
Flooded!
T
Flooded!
Komentarze do niniejszej Instrukcji