
snooping: indicates a static MAC address entry generated based on the dynamic DHCP snooping binding table. mux: indicates a MAC address entry learned by a MUX VLAN enabled interface. sticky: indicates a MAC address entry that an interface learns after the sticky MAC function is enabled. sec-config: indicates a static secure MAC address entry configured by using the port-security mac-address command. security: indicates a MAC address entry that an interface learns after port security is enabled.
OAM-PO: indicates a MAC address entry configured by using the mac-populate command. OAM-PU: indicates a MAC address entry configured by using the mac-purge command. dynamic: indicates a MAC address entry learned by the switch, which will be aged out when the aging time expires. blackhole: indicates a blackhole MAC address entry, which is manually configured and will not be aged out, configured by using the mac-address blackhole command. static: indicates a static MAC address entry, which is manually configured and will not be aged out, configured by using the mac-address static vlan, mac-address static vlanif, mac-address static bridge-domain, mac-address static bridge-domain vni, or mac-address static vsi command. If you're new here, you may want to subscribe to my RSS feed. There you go you found the device switchport that you tried to trace!!! Hardware is C6k 1000Mb 802.3, address is (bia ) GigabitEthernet1/24 is up, line protocol is up (connected) Now do a "show interface" command to show the port details. Now, log onto the Access switch and do a "show mac-adddress-table" command for the MAC address and that should show the interface to which it is connectedĪccess1# show mac-address-table 0000.1111.1111Īs you can see which port the device is connected and on which switch. That tells you, it is the Access switch 1 that is connected to Te1/1 and not the device itself. S – Switch, H – Host, I – IGMP, r – Repeater, P – Phoneĭevice ID Local Intrfce Holdtme Capability Platform Port IDĪccess1 Ten 1/1 129 R S I WS-C6509 Ten 1/1 Now, do a "show cdp neighbors" to show the directly connected devices.Ĭapability Codes: R – Router, T – Trans Bridge, B – Source Route Bridge This shows the ports Te1/1 or Te2/1 as a source through which the address is learnt.
U – in use f – failed to allocate aggregator So do a "show etherchannel" command to find the phsycial ports that are paired.įlags: D – down P – bundled in port-channel This indicates that there is a etherchannelis being setup. Sometimes, the output might show as follows Looking at this, it is very likely that this is a uplink (TenGigabit Ethernet link) to another Distribution or Access switch. This indicates that the device is either connected to the port or though another switch which is connected to the interface. This will show the interface to which it is connected or through which it is learned.Ĭore1# sh mac-address-table address 0000.1111.1111 Now, do a show mac-address command on the core switch or router. Internet 192.168.1.15 22 0000.1111.1111 ARPA Vlan1įrom the above you know the MAC Address of for the device: Protocol Address Age (min) Hardware Addr Type Interface If yes, then simply logon to one of your core switches or routers and do a simple sh ip arp If you have an IP address on hand quickly ping and check if the device is pingable. This is not a difficult task but can certainly be time consuming.
#COMMAND TO FIND MAC ADDRESS ON CISCO SWITCH PC#
If you have a big network with multiple Access Switches connecting to the core switches or routers then tracing a device like a PC or a laptop for troubleshooting or security purposes is one of those tasks that you often end up doing.