Sniffing MAC adddress of connected switches

I have a couple of manageable switches plugged into a routerboard, routeros 4.12. I want to telnet to the switches by MAC address in order to configure them. I don’t know what they are - is there anyway to ‘sniff’ the MACs?

MAC telnet is a proprietary mikrotik protocol, so unfortunately it won’t work for other networking equipment.

Hi,

As CCDKP said, you shall not be able to reach them via MAC telnet.
What you could do, if they have picked up an IP addess from a DHCP server and you do not know what that is, run the following CLI command from a terminal window (I find running this from the terminal give better/faster results than Winbox) -

/tools ip-scan

I think you can also specify which port to use. This shall give you the MAC addresses available/viewable on all ports (or port, if specific port selected) and also the IP addresses, if any. Then you can telnet via the IP address.

Rgds,
Mark.

It’s proprietary, understood.

So say the Mikrotik is manageable via 209.85.229.130/28 and the switches are:

ether1: 209.85.229.131
ether 2: 209.85.229.132

Is there any way I can get to the web management pages of these devices without having to give them internal IPs? I want to gain control of them remotely.

Use dst-nat to “port forward” to them. Basically they have a private IP on your LAN, set up a NAT rule that will forward connections coming into 209.85.229.130 on lets say port 40001 to a private IP of 10.0.0.1 on port 80. Giving them direct public IP addresses is really not a good idea, it allows people to try and directly access your equipment without you being able to set up filters.

They are not private IPs though, they’re public, but plugged into the ether ports.