#Extreme switch show mac address table mac
Switch port mapping displays all the MAC addresses connected to the port like computers, IP phones. ifPhysAddress) is a column in a table of interfaces and you dont know. Systems do not have MAC addresses network interfaces do, and a system may have zero, one, two or more network interfaces.
#Extreme switch show mac address table software
You can't get around that, except by talking to the person who created the software and asking whether it is configurable prepare for the answer to be "no". Switch port management software uses a Multi-vendor switch support like CISCO, HP, 3com, Nortel,etc. There is no such thing as 'system MAC address'. So, the SNMP Agent you're polling/querying (you didn't say which) is either hardcoded or configured not to provide this information. What does this mean for you? Well, the remote system must have a network interface otherwise you wouldn't be able to talk to it. And many of the RFC1213 packet/status counters in snmp were deliberately made obsolete when a "safe" subset was adopted into RFC1907. I created an SNMP Agent recently and its support for "standard" objects doesn't go anywhere near listing network interfaces. Why does anyone need access to know your system's MAC address? They probably don't. Nowadays, implementations tend to be far more conservative in the information they disclose, because every piece of information you disclose is potentially another way to attack your system. But next we have to consider that times have changed since the SNMP and SMI RFCs were written, well before the dot-com boom and back when the internet was a relatively pleasant and happy place. ifPhysAddress) is a column in a table of interfaces and you don't know in advance how many conceptual rows you'll get back (and what unique numerical index each row will use as its key).
(ETA: What if you can't get to the Console port? How do you get the IP address of the switch in order to SSH or (if you must) Telnet in?)Ĭouldn't you just use CDP? #show cdp nei detail will show you the ip of the connected devices.There is no such thing as "system MAC address". The amazing thing to me is, this far into the 21st Century, this is still the only way I could find to get this information - i.e. Also, 'sh ip arp | i 0/24' will show just the MAC address(es) on that port.) If you're all Cisco, 'show cdp neighbor' (or 'sh cdp nei') will get you to the next switch. (Small tip: When you see a large number of MAC addresses showing up on a single port, there's a switch on that port into which those MAC addresses are connected. It helps to Ping the subnet's broadcast address (e.g.
:^D After beating Google to death over it, hoping for some useful tool, I ended up using exactly the same process (plus the online MAC address lookup to ID the device manufacturer), so I can affirm this works perfectly, if you work it.Īs you can see, the 'sh arp' or 'sh ip arp' commands also give you the MAC addresses, so essentially the 'sh mac add' is only to get the port in which the device is connected.
Yesterday I needed to block a MAC address on an Extreme Networks switch (XOS) sure, I could write an ACL for this but there is a better way: To block a MAC address: create fdbentry aa:bb:cc:dd:ee:ff vlanIf the resulting port is a link to another switch, log on to that switch and run the command again. Will show you the port that a given MAC address was last seen on.
Thanks for posting this *after* I finished a "What's Connected Where" jihad on our network. Mini Howto for a simple way to block a MAC address on Extreme Network switches. show mac-address-table address