Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

How to check network for rogue hubs or switches

Posted on 2006-03-29
3
Medium Priority
?
393 Views
Last Modified: 2012-06-21
Is there a way to check whether someone has secretly plugged in a hub or switch somewhere on my network without  my knowlege?
0
Comment
Question by:deshi777
  • 2
3 Comments
 
LVL 9

Expert Comment

by:kfullarton
ID: 16322319
Implement port security on your access switches and have it learn mac addresses for each port.  Set the maximum number of macs and if the limit is exceeded, set the port to be shutdown.  What type of access switch are you using?
0
 
LVL 1

Author Comment

by:deshi777
ID: 16322501
Cisco 6509 core and 2948/2924 perimeter switches.  I understand your advice but I'm not very savvy with configuration (short of changing vlans and so forth).  Thanks.
0
 
LVL 9

Accepted Solution

by:
kfullarton earned 2000 total points
ID: 16322648
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Unable to change the program that handles the scan event from a network attached Canon/Brother printer/scanner. This means you'll always have to choose which program handles this action, e.g. ControlCenter4 (in the case of a Brother).
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question