Users Guide

Table Of Contents
aging-time (Optional) Displays MAC address table aging-time information.
count (Optional) Displays the number of dynamic and static MAC address entries.
dynamic (Optional) Displays dynamic MAC address table entries only.
interface Set the interface type:
ethernet node/slot/port[:subport] Displays MAC address table information for a
physical interface.
port-channel channel-number Displays MAC address table information for a port-
channel interface, from 1 to 128.
static (Optional) Displays static MAC address table entries only.
vlan vlan-id (Optional) Displays VLAN information only, from 1 to 4093.
Default Not configured
Command Mode EXEC
Usage
Information
The network device maintains static MAC address entries saved in the startup configuration file, and
reboots and deletes dynamic entries.
Example
(Address)
OS10# show mac address-table address 90:b1:1c:f4:a6:8f
VlanId Mac Address Type Interface
1 90:b1:1c:f4:a6:8f dynamic ethernet1/1/3
Example (Aging
Time)
OS10# show mac address-table aging-time
Global Mac-address-table aging time : 1800
Example (Count)
OS10# show mac address-table count
MAC Entries for all vlans :
Dynamic Address Count : 5
Static Address (User-defined) Count : 0
Total MAC Addresses in Use: 5
Example
(Dynamic)
OS10# show mac address-table dynamic
VlanId Mac Address Type Interface
1 90:b1:1c:f4:a6:8f dynamic ethernet1/1/3
Example
(Ethernet)
OS10# show mac address-table interface ethernet 1/1/3
VlanId Mac Address Type Interface
1 66:38:3a:62:31:3a dynamic ethernet1/1/3
Supported
Releases
10.2.0E or later
Spanning-tree protocol
This section describes how spanning-tree features work and also about the different variants of STP.
Introduction to STP
The spanning-tree protocol is a Layer 2 network protocol that prevents loops in a network topology. Spanning-tree is useful
when more than one network path exists and devices in the network are either competing for or sharing these paths.
By eliminating loops, the protocol improves scalability in a large network and allows you to implement redundant paths, which
can be activated when the active paths fail.
Layer 2 loops occur in a network due to poor network design and without enabling xSTP protocols, can cause high switch CPU
utilization and memory consumption.
Layer 2
463