We use our syslog looking for the stolen MAC address when it is assigned an address by our DHCP servers - if your NAC logs send info to a syslog server then it should be just as simple.
Thanks Chris ___________________________________ Chris Healey Capital University Office of Information Technology 1 College and Main Columbus, OH 43209-2394 614-236-6964 Email: [email protected] ___________________________________ "We are what we repeatedly do. Excellence, then, is not an act, but a habit." -Aristotle ___________________________________ From: Cisco Clean Access Users and Administrators [mailto:[email protected]] On Behalf Of Jeremy Shoemaker Sent: Friday, December 04, 2009 4:38 PM To: [email protected] Subject: Tracking stolen assets Does anyone know of a good way to track stolen assets using CCA. We are currently running IB and will soon be running OOB. We would like to know when and where a stolen asset is hitting the network if it is. Thanks in advance for any help. Thanks, Jeremy L. Shoemaker Systems Administrator Dakota Wesleyan University 605-995-2147 [email protected] <mailto:[email protected]> Strategic - WOO - Maximizer - Achiever - Learner
