A method and program for checking for misconfigurations and inefficiencies
in the configuration of devices and links on a network. Information
relating to the configuration of components on the network is stored in a
database. The configuration information is accessed for each device, and
interrogated for each port and its associated link and connected remote
port. The interrogation determines whether the ports and links have
matched configuration and whether they are running at optimum capability,
such as at full duplex (both ends permitting), at maximum speed or with
maximum numbers of ports assigned to a trunk.