Hidding a computer,

Suppose you had this configuration.
Server A : 192.168.0.1
Client B : 192.168.0.2
Client C : 192.168.0.3
Anonymous Computer : 192.168.0.4

I set the firewall in anonymous computer to block all the connection that coming in and out to the server.
1) Do you think this can separate the anonymous computer being known by all computers in the network?

2) Suppose you modify the firewall setting in "Anonymous computer" by opening some connection to Client B and Client C only, by doing this do you think the server know that Anonymous computer exists in the network?

What happened if I add another computer called Client D and set the IP address to 192.168.0.4 (same as anonymous computer) I believe that the Server A will doing fine because it won't know anonymous computer or other 192.168.0.4 exists in the network, but how client B seen the conflict between IP?
kecoakAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Keith AlabasterEnterprise ArchitectCommented:
Can you explain the rationale please? I'm not sure if I feel comfortable with this question.

Thanks
Keith
0
jabiiiCommented:
I'm with keith, we can not and will not help with anything that is illegal.

Provide us more info and we'll see if we can help.
0
lrmooreCommented:
1. Your computer is connected to the Network
2. Your computer has a network card
3. Your network card has a unique MAC address and IP address
4. You cannot hide on the local network
5. Any system administrator worth his job will be able to find you no matter how many firewall rules you put up..
6. The server can be running any number of applications that actively scan the landscape for systems trying to hide in the weeds.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

lrmooreCommented:
> add another computer called Client D and set the IP address to 192.168.0.4 (same as anonymous computer)
You cannot have two systems with the same IP address on the LAN. If they are both running Windows, one of them will be shut down automatically as soon as it sees the other one.
0
kecoakAuthor Commented:
>5. Any system administrator worth his job will be able to find you no matter how many firewall rules you put up..
>6. The server can be running any number of applications that actively scan the landscape for systems trying to hide in >the weeds.

but how can you identify for a host if they do not reply your "ping" or ICMP?
0
jabiiiCommented:
one reason is arp and network equipment.
firewall logs, etc
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.