>The goal is to know about any rogue devices that may come into the environment. This comment makes me think you should be looking at using 802.1x if it is that important. This will stop rogue devices from plugging in. I would do this using Meraki switches. https://documentation.meraki.com/MS/Access_Control/MS_Switch_Access_Policies_(802.1X)
... View more