Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Intrusion Detection System

Posted on 2004-08-05
1
Medium Priority
?
202 Views
Last Modified: 2010-04-12
I currently use cisco 6000 switches & 2600 routers. I also have 'real secure' IDS but it's not yet implemented.

There are contractors working on our compound who require network access. We supply them with PCs however we recently discovered that they also plug in their personal laptops onto our lan ports.

Is there any system available that can detect & prevent such an occurence? Is this a feature available in the switches or do I require software
0
Comment
Question by:isltt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 1000 total points
ID: 11726459
The most straight-forward way to do this is to record all the MAC addresses in use at your site (you can get them from the router arp caches), load them into the switches, and then shunt any unknown MAC's to a dead-end VLAN.

This not only keeps contractors/vendors from plugging in their own PC's, but also keeps employees from purchasing new systems that haven't gone through the "official" setup/purchasing process.

The other option is to implement something like Cisco's just-recently-released NAC product, which can do things like check whether machines have appropriate patches and anti-virus signatures, enforce that they are domain members, etc., etc.
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question