If security is paramount then you would want to setup your switching fabric to perform MAC based restrictions by port. This is one of the best ways of making sure you know what's hooked up. Anyone just trying to hook up to a port will get nowhere.
Of course, this doesn't prevent someone from going up to a machine that's already allowed on the 'net and doing what ever they please. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Lim Ming Wei Sent: Saturday, September 09, 2006 5:08 AM To: [EMAIL PROTECTED]; [email protected] Subject: RE: Scan for "outsider" Pcs on network I come across a program call air-snare that is able to detect that. But you will need to have a list of all your systems mac address. It is like an IDS program. I believe that most of the IDS program is able to do that. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Friday, March 03, 2006 7:48 AM To: [email protected] Subject: Scan for "outsider" Pcs on network Is there a way to setup a scan and be notified of an intruding pc that is physically plugged into the network? When you have an enviroment with a large amount of network jacks, it's hard to make sure the ones no longer in use are turned off, and that no "visitors" have sat down to use your network connections, esp. if you have a large amount of contractors in and out. It got me to searching the net, and so far I have found one cemmercial product that can do it, but nothing else. Any suggestions? ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. ------------------------------------------------------------------------ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=in tro_sfw to learn more. ------------------------------------------------------------------------ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
