8. Device/MAC Address Tracking

ntopng is able to detect devices (identified with MAC addresses) that connect to a network. On closed networks, only certain devices can connect, and a whenever a MAC address other than those authorized explicitly is considered a threat. This in particular holds on networks such as a datacenterr or industrial IoT.

The Unexpected Device Connected/Disconnected alert (check here for additional information) triggers and alert whenever an unknown MAC is detected.

Note

This feature is available with at least Enterprise M License.

As described below in this page (left sidebar menu: Hosts -> Device/MAC Address Tracking), you can add a list of MAC addresses that are authorized on your network, and instruct ntopng to trigger alerts whenever:

  • An unknown MAC (i.e. a device) connects to the network
  • (Optionally) A MAC (i.e. a device) disconnects from the network
Devices Exclusion

Devices Exclusion

In this page, users can handle authorized and unauthorized MAC addresses. Whenever an unauthorized (or not accounted in the list) MAC address appears in the Interface, the corresponding alert is going to be triggered; instead it’s going to not be triggered (or released) when an authorized MAC address is going to appear.

Devices Exclusion Alert

Devices Exclusion Alert

Moreover, it is possible to configure the ability to trigger an alert when an authorized MAC address disappears from the Interface by editing the specific entry or when adding the MAC address, by enabling the Trigger Disconnection Alert option.

Devices Exclusion Add Modal

Devices Exclusion Add Modal

Other then that, when adding a new authorized MAC address, it is possible to add a list of MAC addresses (one per row) and if an already seen MAC address is added, then, that device, is going to be set to authorized.

Note

All newly added MAC addresses, using the modal, are going to be set automatically to authorized. When a MAC address not added before, using the modal, is connecting to the interface, it will be set automatically to unauthorized.