Deploying an Identity Aware Network
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Extreme Networks Application Note
4.2.6. Tracking Identities of VoIP Phones
Recollect that the case study network topology used can simulate three VoIP phones (with MAC addresses
00:00:00:FE:ED:01, 00:00:00:FE:ED:02, and 00:04:96:28:01:8D), and the setup allows for MAC-based authentication. The
identity for VoIP phone with MAC address 00:04:96:28:01:8D contains the LLDP capable attribute.
4.2.6.1. Information Available at the Edge Switch
Refer to Sections “4.2.5.1.1 show identity-management entries” and “4.2.5.1.2 show identity-management entries detail” which
display information gathered about VoIP phones with MAC addresses – 00:00:00:FE:ED:01, and 00:00:00:FE:ED:02. The command
below retrieves information gathered about the VoIP phone with MAC address 00:04:96:28:01:8D.
X250e-24p.4 # show identity-management entries mac 00:04:96:28:01:8D
ID Name/ Flags Port MAC/ VLAN
Domain Name
IP
------------------------------------------------------------------
00049628018d lm-- 23 00:04:96:28:01:8d corpvoice(1)
-- NA --
------------------------------------------------------------------
Flags:
k - Kerberos Snooping, l - LLDP Device,
m - NetLogin MAC-Based, w - NetLogin Web-Based,
x - NetLogin 802.1X
Legend: > - VLAN name or ID Name or Domain Name truncated to column width
(#) - Total # of associated VLANs/IPs
-- NA --- No IP or VLAN associated
4.2.6.2. Information Available in EPICenter
© 2010 Extreme Networks, Inc. All rights reserved. Identity Aware Network—Page 37