AFAIK, nmap and wireshark won't tell you as much as you need to know
about arp flooding, vlan hopping and suchlike. Well, wireshark might,
but you'll need to monitor it pretty much continuously, and that's
probably a full time job.

For assurance, initially you'll need a pen-test and/or an full audit
by someone who knows what they're doing, then put in place good
IDS/IPS systems that are tuned for your environment.

I don't pretend to have experience with anything in the previous
sentence, and the better the physical separation I can achieve, the
safer I feel - at least until I get a bunch more education/experience
under my belt.

Kurt


On Wed, Jun 9, 2010 at 14:29, Jason Gauthier <jgauth...@lastar.com> wrote:
> You should provide specifics, instead of ambiguity.
> Ambiguity helps no one, last I checked.
>
>
> -----Original Message-----
> From: Kurt Buff [mailto:kurt.b...@gmail.com]
> Sent: Wednesday, June 09, 2010 4:50 PM
> To: NT System Admin Issues
> Subject: Re: OTish: Wireless network configuration
>
> And more than that will be needed, as well.
>
> On Wed, Jun 9, 2010 at 13:44, Phil Brutsche <p...@optimumdata.com> wrote:
>> Or use Wireshark to make sure you don't see traffic you shouldn't.
>>
>> On 6/9/2010 3:41 PM, Jason Gauthier wrote:
>>> You use NMAP to do network scans to determine what is accessible and what 
>>> isn't.
>>
>> --
>>
>> Phil Brutsche
>> p...@optimumdata.com
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
>> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to