Solved

ethernet switch and spi

Posted on 2003-10-22
3
266 Views
Last Modified: 2010-05-18
I am using spi, a program to load register values into an
ethernet switch, to do things like
setting a vlan etc.
 
there is a particular command on spi called ddtab
which shows the dynamic address table.
that shows the mac address of any machine connected on the ports of the switch.

what i want to know is if it is possible to retrieve the
ip addresses (rather than mac addresses) --i mean
at this level, not at programming level, wherein, a tcp packet can be checked and all tht.

this is because there is an embedded controller that
would be used ultimately to program this switch , and what i want it to do is to use a legal list of ip addresses
that only should connect to the NW and nothing else.
mac addresses, is not a good way, i beleive
0
Comment
Question by:vikasgkutty
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 43

Accepted Solution

by:
JFrederick29 earned 250 total points
ID: 9616801
You would need a layer 3 switch to accomplish this.  If you have a layer 2 only switch you would need to add a router to your network and handle security at the router.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question