Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

A device stole my gateway address

Posted on 2006-11-29
5
Medium Priority
?
412 Views
Last Modified: 2010-08-05
A device on my network stole the ip address used for my pix 515 192.168.1.1

How do I find it?
0
Comment
Question by:darovitz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 

Author Comment

by:darovitz
ID: 18041251
It looks as if it is a wireless access point by Linksys.
0
 
LVL 43

Accepted Solution

by:
Steve Knight earned 2000 total points
ID: 18041389
Turn your gateway off then from a device on the same subnet .... telnet to it, ping it, nbtstat -A 192.168.1.1, http://192.168.1.1 it... to see what it is then look in your switch tables for the mac address reported in your arp tables (ARP -A) and nuke it!

Altenative of course if send an email around "The person who has just plugged unauthorised equipment into the LAN has 5 minutes to remove it or be fired!"... if only!
0
 
LVL 43

Expert Comment

by:Steve Knight
ID: 18041395
Sorry didn't come out so clear, I mean

PING 192.168.1.1
arp -a
Get the mac address, look in your switch tables for that mac.

Steve
0
 

Author Comment

by:darovitz
ID: 18042321
Someone plugged in a router to share their connection with someone else in their office.  Thanks so much.
0
 
LVL 43

Expert Comment

by:Steve Knight
ID: 18042382
no problem, hope it helped.  Don't suppose they  let you sack the person, oh well :-)
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question