[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now


Cisco DHCP, MAC Address,  Username Tracking

Posted on 2004-10-24
Medium Priority
Last Modified: 2013-11-16
How do we get Cisco to see the DHCP, MAC Address, and Username relationships for tracking purposes? Perhaps we can use PDM.
Question by:SilvaJohnA
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
LVL 79

Accepted Solution

lrmoore earned 1000 total points
ID: 12393939
I'm not sure what you are really asking, but assuming you are talking about PIX, the short answer - you can't.
There is no mechanism within the pix to associate a username with any internal system.
There is no mechanism within the pix to know whether an IP address is assigned by DHCP or not, unless the pix itself is the DHCP server - then it keeps a binding record of MAC address to IP address. Else, it only has an arp cache to maintain the MAC address to IP address.

Assisted Solution

MaxQ earned 1000 total points
ID: 12411895
This isn't really firewall-related, but the Campus Manager module of CiscoWorks can do what you describe with a feature called User Tracking:


For this to work CiscoWorks needs to have access to all of the switches where your users might be plugged in, and to associate usernames with IPs you also have to install a small script on your domain controller (assuming you're using Windows...there are ways to do it in Novell and Unix also).
LVL 79

Expert Comment

ID: 12487783
Are you still working on this? Do you need more information?

LVL 79

Expert Comment

ID: 13703168
How's it going? Have you found a solution? Do you need more information?
Can you close this question?


Thanks for attending to this long-forgotten question.


Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question