?
Solved

MAC address mapping in 2960 switch ports

Posted on 2013-06-19
1
Medium Priority
?
703 Views
Last Modified: 2013-06-19
Hi all,
My office users are all laptop users. The laptop has been provided by the company, but we have found users bringing their personal laptop and connect to the LAN. To avoid this the management has asked to tag the MAC address(offical) to the switch ports , so that other MAC address laptop should not be connected.
This mapping will avoid.
1) Users relocating themselves apart from assigned workstations.
2) Other than official laptop other laptops should not be used.

H/w
I have 48 port 2960 Cisco switch
Mac address of all the laptops , with hostname is ready by the exposrting the dump of DHCP leases.

Kindly help
0
Comment
Question by:Inisai
1 Comment
 
LVL 4

Accepted Solution

by:
Sandeep Udgirkar earned 2000 total points
ID: 39261529
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question