19.10.2021 Views

Deploying an Identity Aware Network

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Extreme Networks Application Note

4.2.6. Tracking Identities of VoIP Phones

Recollect that the case study network topology used can simulate three VoIP phones (with MAC addresses

00:00:00:FE:ED:01, 00:00:00:FE:ED:02, and 00:04:96:28:01:8D), and the setup allows for MAC-based authentication. The

identity for VoIP phone with MAC address 00:04:96:28:01:8D contains the LLDP capable attribute.

4.2.6.1. Information Available at the Edge Switch

Refer to Sections “4.2.5.1.1 show identity-management entries” and “4.2.5.1.2 show identity-management entries detail” which

display information gathered about VoIP phones with MAC addresses – 00:00:00:FE:ED:01, and 00:00:00:FE:ED:02. The command

below retrieves information gathered about the VoIP phone with MAC address 00:04:96:28:01:8D.

X250e-24p.4 # show identity-management entries mac 00:04:96:28:01:8D

ID Name/ Flags Port MAC/ VLAN

Domain Name

IP

------------------------------------------------------------------

00049628018d lm-- 23 00:04:96:28:01:8d corpvoice(1)

-- NA --

------------------------------------------------------------------

Flags:

k - Kerberos Snooping, l - LLDP Device,

m - NetLogin MAC-Based, w - NetLogin Web-Based,

x - NetLogin 802.1X

Legend: > - VLAN name or ID Name or Domain Name truncated to column width

(#) - Total # of associated VLANs/IPs

-- NA --- No IP or VLAN associated

4.2.6.2. Information Available in EPICenter

© 2010 Extreme Networks, Inc. All rights reserved. Identity Aware Network—Page 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!