If you have the program working on other model switches, you could take a crack at creating a custom scraper from the skeletonscraper.pl script for this device. It should not be difficult, but unfortunately I’m backed up at the moment and will be out of town for the next week starting tomorrow.
If you run into trouble, I’ll see if I can help when I get back. This looks fairly strait-forward though.
Is it possible for NetBD to scrape the MAC addresses from Zyxel XGS-4728F switch?
An example output of show mac-address-table looks like this
show mac address-table all
Port VLAN ID MAC Address Type
24 70 00:00:5e:00:01:04 Static
24 70 28:93:fe:35:0e:08 Dynamic
24 70 3e:eb:8f:79:73:80 Dynamic
CPU 70 50:67:f0:74:87:81 Static
CPU 155 50:67:f0:74:87:81 Static
24 70 6a:de:cd:46:a4:51 Dynamic
24 70 8a:e1:e4:13:83:56 Dynamic
24 70 9e:f9:ee:e1:28:9c Dynamic
24 70 a8:b1:d4:2a:83:9c Dynamic
24 70 b6:42:31:d1:c0:96 Dynamic
24 70 c4:12:f5:32:f9:02 Dynamic
24 70 e2:00:a0:2b:d1:f0 Dynamic
24 70 fa:88:41:14:b3:1e Dynamic
t was caught from a device
Current ZyNOS version: V4.00(BBC.0) | 04/08/2011
Do you think there is a way to read the arp entrys from this device in future releases with the information above?
Marat,
If you have the program working on other model switches, you could take a crack at creating a custom scraper from the skeletonscraper.pl script for this device. It should not be difficult, but unfortunately I’m backed up at the moment and will be out of town for the next week starting tomorrow.
If you run into trouble, I’ll see if I can help when I get back. This looks fairly strait-forward though.
Jonathan