The answer is a bit of yes to all the above. Because of the independence of
the locations, an invasive scan cannot be done and we cannot "cross" into
their LAN per se. But the goal is to obtain information about the
environment and associated unauthorized connwction to go back to these
groups and get consensus to corect thw issues...it is highly political.
On Feb 28, 2013 8:00 AM, "Ron Gula" <[email protected]> wrote:

>  Are you concerned with connectivity and routing or do you
> care about access control? There are tones of great net
> mapping products out there like Lumeta, but if you really
> need to see which ports are open between enclaves, you
> either need to scan or sniff the connection, like with our
> Tenable solution (distributed Nessus and Passive Vulnerability
> Scanners), or model the firewall rules with something
> like RedSeal.
>
>  If they are a Tenable customer, feel free to ping me offline.
> This sort of data is collected passively and is pretty easy to
> report on which enclaves have access to other enclaves
> based on scan results or sniffed traffic.
>
>  Ron
>
>   From: Lester Nichols <[email protected]>
> Reply-To: PaulDotCom List <[email protected]>
> Date: Wednesday, February 27, 2013 9:05 AM
> To: PaulDotCom List <[email protected]>
> Subject: [Pauldotcom] Network Mapping Software
>
>    All,
>
>  Trying to get recommendation on a network mapping software that could
> help identify unauthorized bridged networks. Ideally this would be
> something capable to identify divergent LANs across the WAN…
>
>  Back Story:
>
>  The unnamed federal agency has 600+ locations with public and private
> LANs, but each local LAN is not accountable to the other or to other
> Executive Branch mandates…as such there is a concern that there are
> unauthorized bridged connection to the local LAN. The need is to be able to
> identify those potential connection in a non-intrusive way.
>
>  Any ideas?
>
>  v/r
>
>  ----------
> *Lester E. Nichols III, MSIA, CISSP, GCED,  GCFW, GSEC,*
>  *MCSA, CompTIA Security+*
> [email protected]
>
> *cuiusvis hominis est erare, nulius nisi insipientis in errore
> perseverare.*
>
> http://www.linkedin.com/in/lnichols
>
> Information Systems Security Association - General Member
> Information Systems Audit and Control Association - Member
> A proud member of the Federal Bureau of Investigation’s InfraGard
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to