Solved

What IP addresses are in use on network?

Posted on 2011-02-25
5
479 Views
Last Modified: 2012-05-11
 Is there a  way in Server 2008 to know what IP addresses are in use?  I currently use DHCP and some reservations etc.  However, what if someone with a laptop just plugged into the network and gave itself a STATIC IP.  Is there a way in R2, I can check a list of all IP's in use?  Then if I saw some device using an address outside my defined DHCP range I could question what this computer was and take action from there.

 thanks
0
Comment
Question by:paulterack2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 24

Accepted Solution

by:
rfc1180 earned 500 total points
ID: 34984877
you can scan the network and then check the local ARP table of the server (Assuming the hosts are on the same local subnet).

arp -a

Billy
0
 
LVL 9

Expert Comment

by:rawinnlnx9
ID: 34984883
0
 
LVL 96

Expert Comment

by:Lee W, MVP
ID: 34984903
Windows does not track and really has no management facility to track static IPs.  You would need network monitoring software which could potentially be very expensive.

Ideally, you wouldn't permit someone to just come along and setup a computer with a static IP and get it on your network.  You would use a BUSINESS CLASS managed switch and disable all ports not officially in use.  Then your wireless would require a key to gain access to the network.  In doing this, there would be no need for this.

You can MANUALLY do some analysis... maintain a list of static addresses so you know what should be on and what shouldn't and then you can use a script to ping them periodically (when I want to know what systems are on on the network, I run the following command (assuming the subnet in question is 192.168.10.x)

for /l %a in (1,1,254) do @ping -n 1 -w 100 192.168.1.%a | find /i "reply"

That command then lists all systems responding to a ping.  But it's imperfect since a machine with a firewall enabled blocking ICMP ECHO requests won't reply but will still be on and using an IP.

Another imperfect way of finding things is to check DNS (assuming you allow dynamic updates for everything and not just domain joined systems - NOT ADVISABLE), you may get a list of IPs and hostnames in use, but again, you don't know when they were initially registered, where they are, or if they still exist (depending on your scavaging period).
0
 
LVL 17

Expert Comment

by:OriNetworks
ID: 34985401
Server 2008 brings a new feature called network access protection. I believe you will find this useful in preventing unauthorized users from connecting to your network.
0
 
LVL 3

Expert Comment

by:JAMcDo
ID: 34985919
To discover network devices that have a IP address, I use a little free utility called Advanced IP Scanner.  It is found at:

http://www.radmin.com/products/ipscanner/

John
0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Blocking Microsoft Edge From Running? 14 119
Determine what is creating a pagefile.sys file? 33 72
CentOS 7 wireless 2 75
robocopy fails- error 53 - network path not found 5 87
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question