Solved

CAM table - utility to easily track switch/port a device is connected to

Posted on 2007-11-18
1
1,092 Views
Last Modified: 2008-02-01
I'm after a utility which will automate tracking down the switch & port a device/IP address is connected to on the LAN - in a Cisco environment.
0
Comment
Question by:ajosephson
1 Comment
 
LVL 8

Accepted Solution

by:
yasirirfan earned 500 total points
ID: 20310660
You have plenty of options

First of all you can use Cisco works campus manager to track the users and which pc connected to which particular port,
http://www.cisco.com/en/US/customer/products/sw/cscowork/ps563/index.html

also you can use optiview from Fluke
http://www.flukenetworks.com/fnet/en-us/products/OptiView+Series+III+Integrated+Network+Analyzer/Overview.htm

Swicth Inspector
http://www.batchconverter.com/SwitchInspector-download-19152.shtml

Manage Engine Switch port mapper
http://manageengine.adventnet.com/products/oputils/network-monitoring-tools.html

Cheers

Yasir
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Looking for good easy switch for lab at home. 13 115
Internet Protocol Security question 3 94
CCNA lab 6 42
2960 not recognizing subinterface configuraton of 5510 11 29
Article by: rfc1180
The Maximum Segment size (MSS) is an important consideration when troubleshooting connectivity via the Internet/Intranet. As the packets are routed via the Internet/Intranet, the packets must traverse through multiple routers in the path between two…
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question