You'd be able to see the packets only if you had compromised the switch and monitored the entire VLAN to a sniffer. Otherwise, switches forward unicast packets only to the ports in their CAM tables and update appropriately.
The key in the wording wasn't so much that someone couldn't put in a sniffer. The idea being that if host devices were running OSPF, they wouldn't receive the multicast and magically start peering with R4/R5. HTH, Scott Morris, CCIE4 (R&S/ISP-Dial/Security/Service Provider) #4713, JNCIE-M #153, JNCIS-ER, CISSP, et al. CCSI/JNCI-M/JNCI-ER VP - Technical Training - IPexpert, Inc. IPexpert Sr. Technical Instructor [EMAIL PROTECTED] Telephone: +1.810.326.1444 Fax: +1.810.454.0130 http://www.ipexpert.com -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Louis S Sent: Tuesday, May 13, 2008 8:50 PM To: osl Subject: [OSL | CCIE_RS] OSPF and interception task? "configure area 45 on vlan 45 between r4 and r5. ensure that host devices running ospf on this segment cannot intercept the ospf communication between r4 and r5" the solution was do change the ospf network type to non-broadcast and set up neighbor statements in ospf. my first thought here was just to do authentication, do you think that would of satisfied the requirement? one question is, if i was a pc on that subnet couldn't i still intercept the packets via sniffer? since the two routers would be in the same broadcast domain? i understand the packets would be sent unicast between the two routers but would you be able to see the conversation if you had a sniffer on the vlan?
