I was attempting to count the number of devices that were connected to a Cisco 6509/Cisco 4000 switch infrastructure without going through and checking each port. (without Ciscoworks). I was considering using the CAM table from the core Cisco 6509 but was concerned I would get a lot of entries from the Cisco 4006s that were in fact system entries and not end-user devices. So I guess my question is
1) Has anyone done this before and can provide any insights.
2) Can anyone provide a link or something that will help me filter the none cisco devices out of the list.
If you're handy with scripting, or if you have a lot of time on your hands, you can manipulate the CAM table from your 6500 switch in a text or spreadsheet program and remove/flag all entries whose first 3 bytes match one of the Cisco-registered OUIs at the link above. There are well over 150 OUIs in the list (I stopped counting at around 150), so scripting might be your best bet. Once all the MAC addresses that are definitely Cisco devices are filtered out, you should have a good idea how many non-Cisco devices you have in your network. However, if you want to know how many devices are connected directly to your 6500, you can get a good idea by counting the number of ports in the CAM table that only have one MAC address associated with them. Ports that have multiple MAC addresses will be switches or hubs.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...