Showing results for 
Search instead for 
Did you mean: 
Create Post

Connecting the Dots…IP Address to Endpoint Device and User

Level 9

Suspicious devices on your network? How can you track them down? You basically have two options: the easy way (my personal favorite) or the hard way.

Option 1: The Hard Way

The hard way involves pings, traceroutes, and ARP tables before you can actually locate and disconnect the device/user. It can be a very frustrating game of cat and mouse--with the mouse trying every last bit of your patience! If you’ve done this before, then you know how time-consuming and painstaking it can be. And, by the time you finally track down the suspicious device, the damage could already be done.

Option 2: The Easy Way

The easy way involves leveraging the integrated power of SolarWinds IP Address manager (IPAM) User Device Tracker (UDT). With this dynamic duo, you can you track down a device and user in a flash! Simply use the integrated view to see IP address information along with the corresponding switch port details and user information—all within the same window. You get both current and past connection details. You can even shutdown the compromised port directly through the SolarWinds Web UI with the click-of-a-button. All this right from your desk!

The only thing left to do is figure out how you’re going to spend all that time you saved by doing things the easy way.

For more on IPAM and UDT check out these videos…..

IPAM Overview Video

UDT Overview Video

1 Comment
Level 15

I can see the benefits to this.  How does it handle wireless clients?