Home/Guides/How to Audit EOL Hardware

How to Audit EOL Hardware

Find it before an auditor or an attacker does.

Last reviewed

An EOL audit answers one question: which devices on my network are running past their vendor's support date? The process is straightforward — pull inventory, match against lifecycle data, flag what's expired or expiring. The hard part is doing it across mixed-vendor environments where every manufacturer uses different terminology, different bulletin formats, and different support timelines.

Step 1: Extract your inventory

Pull model numbers from your devices. On Cisco, show inventory and show version. On Juniper, show chassis hardware. On Palo Alto, show system info. If you have an NMS or CMDB, export the hardware model field.

What you need is the product ID or SKU — the vendor's part number for the hardware. Not the hostname, not the serial number, not the firmware version. The lifecycle data is keyed to the product SKU.

Step 2: Match against lifecycle data

Each vendor publishes end-of-life bulletins listing affected SKUs and their milestone dates. Checking them manually works for a handful of devices. For anything larger, you need a lookup tool.

This site's bulk lookup accepts a list of product IDs (or raw CLI output) and matches them against the database using fuzzy matching. Paste in your show inventory output and it will identify the SKUs, pull their lifecycle status, and flag anything that's expired or expiring.

Step 3: Prioritize

Not all EOL hardware carries the same risk. Prioritize by:

Step 4: Build the replacement plan

See the replacement planning guide for how to sequence a refresh. The short version: start with what's expiring soonest and what's most exposed, group by vendor for volume pricing, and budget 12–18 months lead time for procurement and deployment.

↑ Top