

The operator with the opportunity of “snapshot” collections in the network, IP Accounting (Layer 3) maintains two accountingĭatabases: an active database and a checkpoint database. IP Accounting (Layerģ) collects individual IP address details, so it can be used to identify specific users for usage-based billing. Generated by the router or traffic terminating in the router is not included in the accounting statistics. Only transit traffic that enters and leaves the router is measured, and only on an outbound basis. IP Accounting (Layer 3) collects the number of bytes and packets processed by the network element on a source and destination

To the questions raised in Chapter 2, “Data Collection Methodology”: It concludes by comparing the IP Accounting features First, the fundamentals are explained,įollowed by an overview of CLI operations, and then SNMP operations. This chapter discusses in detail each flavor of IP Accounting, using a basic structure. The command-line interface (CLI) commands as titles, except for “IP Accounting Access Control List,” where the related CLI command is ip accounting access-violations. Note that Cisco documentation is not always consistent for the different IP Accounting features. IP Accounting Access Control List (ACL).Basic IP Accounting, which this book calls “IP Accounting (Layer 3)”.Refer to coverage of NetFlow Layer 2 and the Security Monitoring Exports feature in Chapter 7, “NetFlow.” Note that NetFlow recently added the export of the MAC addressĪs a new information element. Furthermore, access-list accountingĬurrently cannot be solved with the NetFlow implementation. However, compared to NetFlow, IP Accounting offers some advantages that make it an interestingįeature to investigate: easy results retrieval via a MIB and limited resource consumption. The fact that Cisco has considered replacing IP Accounting by adding new features to NetFlow potentially turns IP Accounting

(ETA: What if you can't get to the Console port? How do you get the IP address of the switch in order to SSH or (if you must) Telnet in?)Ĭouldn't you just use CDP? #show cdp nei detail will show you the ip of the connected devices.IP Accounting is a very useful accounting feature in Cisco IOS, but it’s not as well known as other features, such as NetFlow. The amazing thing to me is, this far into the 21st Century, this is still the only way I could find to get this information - i.e. Also, 'sh ip arp | i 0/24' will show just the MAC address(es) on that port.) If you're all Cisco, 'show cdp neighbor' (or 'sh cdp nei') will get you to the next switch. (Small tip: When you see a large number of MAC addresses showing up on a single port, there's a switch on that port into which those MAC addresses are connected. It helps to Ping the subnet's broadcast address (e.g.

:^D After beating Google to death over it, hoping for some useful tool, I ended up using exactly the same process (plus the online MAC address lookup to ID the device manufacturer), so I can affirm this works perfectly, if you work it.Īs you can see, the 'sh arp' or 'sh ip arp' commands also give you the MAC addresses, so essentially the 'sh mac add' is only to get the port in which the device is connected. Thanks for posting this *after* I finished a "What's Connected Where" jihad on our network.
