We use our syslog looking for the stolen MAC address when it is assigned
an address by our DHCP servers - if your NAC logs send info to a syslog
server then it should be just as simple.

 

 

 

Thanks

 

 

 

Chris 
___________________________________ 
 
Chris Healey 
Capital University 
Office of Information Technology 
1 College and Main 
Columbus, OH 43209-2394 
614-236-6964 
Email:  [email protected] 
___________________________________

 

"We are what we repeatedly do. Excellence,
then, is not an act, but a habit." 
-Aristotle 
___________________________________

 

 

From: Cisco Clean Access Users and Administrators
[mailto:[email protected]] On Behalf Of Jeremy Shoemaker
Sent: Friday, December 04, 2009 4:38 PM
To: [email protected]
Subject: Tracking stolen assets

 

Does anyone know of a good way to track stolen assets using CCA. We are
currently running IB and will soon be running OOB. We would like to know
when and where a stolen asset is hitting the network if it is.

 

Thanks in advance for any help.

 

Thanks,

Jeremy L. Shoemaker
Systems Administrator
Dakota Wesleyan University
605-995-2147

[email protected] <mailto:[email protected]> 

Strategic - WOO - Maximizer - Achiever - Learner

 

Reply via email to