Solved

Block Mac address from network

Posted on 2008-10-01
5
321 Views
Last Modified: 2010-04-21
Hello,
We have a device on our network which we don't recognize.  I can ping the device (it is using 2 IP addresses) and I have the MAC address of the device.  What I can't figure out is how to find out where, or what this device is.  I'd like to be able to shut it down from accessing the network because then most likely someone will squak and we'll know where this device is.  Any suggestions how I can disable this device to find out where/what it is?

Thanks, in advance.
0
Comment
Question by:turtletrax
  • 2
  • 2
5 Comments
 
LVL 5

Expert Comment

by:ccns
ID: 22619290
have you had a look on your server/dns for the address usually it would show the name of the device in the DNS console. could be a starting point.
0
 
LVL 39

Expert Comment

by:BrandonGalderisi
ID: 22619306
or if it's a windows box, ping -a IP Address should respond with a name.
0
 

Author Comment

by:turtletrax
ID: 22619311
I have the name of the device but it is not a name that we use in our network, and the name of it is also what prompts me to want to shut it down.  We are having DHCP issues with our scopes filling up with "bad addresses" and the name of this device is xxx_dhcp.domain.
0
 
LVL 5

Accepted Solution

by:
ccns earned 500 total points
ID: 22619336
do you have a managed switch conrolling the network? if you do logon to the managed switch and check what Ip address you have and track it via the port numbers on the patch panel, that corrospond to the wall outlets.
0
 

Author Closing Comment

by:turtletrax
ID: 31502181
Yes, turns out I was able to find the MAC address on the switch and trace it down.  Thanks!
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
win2k service packs 5 649
VSS on host & VM 10 405
Windows Server 2000 NIC on a 2008 R2 Hyper-V won't start 4 1,106
How to install Windows 2000 network drivers 4 109
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now