AFAIK, nmap and wireshark won't tell you as much as you need to know about arp flooding, vlan hopping and suchlike. Well, wireshark might, but you'll need to monitor it pretty much continuously, and that's probably a full time job.
For assurance, initially you'll need a pen-test and/or an full audit by someone who knows what they're doing, then put in place good IDS/IPS systems that are tuned for your environment. I don't pretend to have experience with anything in the previous sentence, and the better the physical separation I can achieve, the safer I feel - at least until I get a bunch more education/experience under my belt. Kurt On Wed, Jun 9, 2010 at 14:29, Jason Gauthier <jgauth...@lastar.com> wrote: > You should provide specifics, instead of ambiguity. > Ambiguity helps no one, last I checked. > > > -----Original Message----- > From: Kurt Buff [mailto:kurt.b...@gmail.com] > Sent: Wednesday, June 09, 2010 4:50 PM > To: NT System Admin Issues > Subject: Re: OTish: Wireless network configuration > > And more than that will be needed, as well. > > On Wed, Jun 9, 2010 at 13:44, Phil Brutsche <p...@optimumdata.com> wrote: >> Or use Wireshark to make sure you don't see traffic you shouldn't. >> >> On 6/9/2010 3:41 PM, Jason Gauthier wrote: >>> You use NMAP to do network scans to determine what is accessible and what >>> isn't. >> >> -- >> >> Phil Brutsche >> p...@optimumdata.com >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ >> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~