Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Robert VanOrmer
o-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Scott Granados Sent: Friday, October 30, 2009 2:09 PM To: cisco-nsp@puck.nether.net Subject: [c-nsp] Good way of finding unauthorized network elements/ Hi all I have a general question. I have a network con

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Dodd, Steven
@puck.nether.net Subject: Re: [c-nsp] Good way of finding unauthorized network elements/ inline comments On Friday, October 30, 2009, Marcelo Zilio wrote: > > A third option (if your switches support it) is enable port security and > maximum mac address numbers on each switchport. > dep

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Ryan West
Sent: Friday, October 30, 2009 2:09 PM To: cisco-nsp@puck.nether.net Subject: [c-nsp] Good way of finding unauthorized network elements/ Hi all I have a general question. I have a network consisting of about 20 access switches and 2 core switches. We have 3 access points that we manage but think

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Marcelo Zilio
inline On Fri, Oct 30, 2009 at 5:37 PM, quinn snyder wrote: > inline comments > > On Friday, October 30, 2009, Marcelo Zilio wrote: > > > > A third option (if your switches support it) is enable port security and > > maximum mac address numbers on each switchport. > > > > depending on if the de

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread quinn snyder
inline comments On Friday, October 30, 2009, Marcelo Zilio wrote: > > A third option (if your switches support it) is enable port security and > maximum mac address numbers on each switchport. > depending on if the device is being used as layer3 and how his topology is set up, a single mac addre

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Craig Allen
Have a look at switchmap: http://sourceforge.net/projects/switchmap/ -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Scott Granados Sent: 30 October 2009 18:09 To: cisco-nsp@puck.nether.net Subject: [c-nsp] Good way of

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Scott Granados
nds like a good way to go. Thanks for the pointers! - Original Message - From: "Mike" To: "Scott Granados" Cc: Sent: Friday, October 30, 2009 12:07 PM Subject: Re: [c-nsp] Good way of finding unauthorized network elements/ Hi Scott, Well, teaching use

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Seth Mattinen
Scott Granados wrote: > Hi all > I have a general question. I have a network consisting of about 20 > access switches and 2 core switches. We have 3 access points that we > manage but think someone might have brought in a linksys or DLink > consumer device and plugged in. (users, can't live with

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Marcelo Zilio
Hi Scott, I think Wireless LAN Controllers are the best tool to do that. A cheaper option is use Netstumbler. I don't have it right now but as long I recall it finds manufacturer ID. A third option (if your switches support it) is enable port security and maximum mac address numbers on each swit

Re: [c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread NMaio
Try Netdisco. http://netdisco.org/ Nick -Original Message- From: cisco-nsp-boun...@puck.nether.net [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of Scott Granados Sent: Friday, October 30, 2009 2:09 PM To: cisco-nsp@puck.nether.net Subject: [c-nsp] Good way of finding

[c-nsp] Good way of finding unauthorized network elements/

2009-10-30 Thread Scott Granados
Hi all I have a general question. I have a network consisting of about 20 access switches and 2 core switches. We have 3 access points that we manage but think someone might have brought in a linksys or DLink consumer device and plugged in. (users, can't live with em, can't shoot em) Is ther