If the mDNS service is enabled on a host on a LAN, the host will multicast a message that contains its name and IP address to all the other hosts on the LAN. MDNS enables hosts on a LAN to discover and communicate with each other without the presence of a traditional DNS server.
HUAWEI MAC ADDRESS LIST SOFTWARE
Detailed device information, including device configurations and identification, can all be advertised using this protocol.Ĭisco Discovery Protocol (CDP) and LLDP can help obtain device information, including the device operating system, software version, and description, and then identify the terminal type based on such information. The Link Layer Discovery Protocol (LLDP) defines a standard method for Ethernet network devices, such as switches, routers, and WLAN access points (APs), to advertise their presence to neighboring devices and save discovery information about neighboring devices. Terminal types can be identified based on options carried in DHCP messages, such as:Ĭompared with other methods, terminal identification based on DHCP options is more accurate and ideal for identifying terminals that dynamically obtain IP addresses. During Portal authentication, the device reports the information to the NMS. Obtain the information from the device.During Portal authentication, the Portal server extracts the User-Agent information. Obtain the information from the Portal server.The following methods are available to obtain the User-Agent information: This method is well suited for identifying PCs and mobile terminals, because in most cases, the User-Agent field in HTTP packets sent by these terminals during website access through the browser contains comprehensive terminal information, including the terminal type, operating system, vendor, and browser type. Terminals can be identified based on the User-Agent field in HTTP packets because the contents in the User-Agent field vary according to the terminal type.
HUAWEI MAC ADDRESS LIST MAC
Therefore, in terminal identification, MAC OUI-based terminal identification is the last choice or should be used with other methods. Many terminals use a NIC chip provided by another vendor, so the vendor information collected based on the MAC OUI may not be the vendor information of the terminal. MAC information is related to NIC vendors. MAC OUI-based terminal identification is inaccurate. MAC OUIs are allocated to organizations by the Institute for Electrical and Electronic Engineers (IEEE). Terminal identification using the passive fingerprint collection methodĪ MAC OUI is the leftmost three bytes in a MAC address that uniquely identifies an organization. Terminal identification methods include passive fingerprint collection and proactive scanning. What Are the Terminal Identification Methods? For dumb terminals that typically use MAC address authentication such as IP phones, printers, and IP cameras on the campus network, automatic access based on terminal identification results can be implemented, reducing the configuration workload of administrators. Based on this information, refined management can be performed on the terminals, for example, access authorization by terminal type can be performed. On the NMS, you can view summary information about terminals on the entire campus network, including their terminal types and operating systems. This function offers diversified terminal identification methods. To solve these problems, the terminal identification function is introduced. Consequently, administrators need to manually configure different services and policies for each type of service terminals, complicating service deployment and operations. Different service configurations and policies need to be deployed for different types of terminals after they access the network.As a result, the NMS cannot provide more refined visualized management for network terminals. The network management system (NMS) can only display the IP and MAC addresses of access terminals, but cannot identify terminal types.Currently, terminal management on campus networks faces the following challenges: On a campus network, access terminals include smart terminals (such as PCs and mobile phones) and dumb terminals (such as IP phones, printers, and IP cameras). With the popularization and application of ICT technologies such as WLAN and IoT, the enterprise network scale is expanding rapidly, and access terminal types are becoming increasingly diversified and complex.