Solved

ethernet switch and spi

Posted on 2003-10-22
3
260 Views
Last Modified: 2010-05-18
I am using spi, a program to load register values into an
ethernet switch, to do things like
setting a vlan etc.
 
there is a particular command on spi called ddtab
which shows the dynamic address table.
that shows the mac address of any machine connected on the ports of the switch.

what i want to know is if it is possible to retrieve the
ip addresses (rather than mac addresses) --i mean
at this level, not at programming level, wherein, a tcp packet can be checked and all tht.

this is because there is an embedded controller that
would be used ultimately to program this switch , and what i want it to do is to use a legal list of ip addresses
that only should connect to the NW and nothing else.
mac addresses, is not a good way, i beleive
0
Comment
Question by:vikasgkutty
3 Comments
 
LVL 43

Accepted Solution

by:
JFrederick29 earned 250 total points
ID: 9616801
You would need a layer 3 switch to accomplish this.  If you have a layer 2 only switch you would need to add a router to your network and handle security at the router.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Classlful vs Classless subneting 18 66
Difference bet. 3G v 4G RAM on Win7 32-bit 5 87
Display on external monitor 8 24
Guidelines for building a gaming PC 17 31
this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

806 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question