• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 269
  • Last Modified:

Identifying a rogue device

I have inherited a network with multiple unmanaged switches that are uplinked in various parts of the building. I have experienced several issues with rogue student devices on the network causing a serious slow down and at times causing the firewall to become uncontactable.
Am I correct in thinking managed switches are the way to go or would they help me identify the rogue machine. At times its been a case of unplug everything while running a ping to the firewall and then one by one plug the cables back in!
3 Solutions
"Am I correct in thinking managed switches are the way to go..."  I would say yes. They give you much more options.

For example:

You can use port security to prevent rouge devices from connecting in the first place. Or you can disable ports that are not in use.

Logging is also better for managed switches showing what is connected to what port.

Just some stuff to consider.
I would endorse pony10us' comments. However, as with most things, the more features you want, the more you will pay to get them.

As you appear to be in an academic environment, a very useful feature for your situation would be bandwidth control, so that persistent offenders can be restrained from swamping the network with their insatiable demands for "stuff" they think the organisation's infrastructure is morally obliged to provide.

I suspect that the proliferation of unmanaged devices has been driven by considerations of cost rather than fitness for purpose, and as educational institutions are often notoriously (and necessarily) tight-fisted, you might have to assemble any case for funding with exceeding care in order to obtain the kit needed to address this and similar student-based problems proactively; the alternative is to remain reactive, and you've already discovered that there's no fun to be had there...
Fred MarshallPrincipalCommented:
Yes, you would benefit a lot from managed switches.  Watch out for switches that are "smart" and have a GUI interface but don't provide any SNMP.  (I have some small Cisco SG200 switches and haven't been able to find SNMP on them.  Maybe that's just my having missed it but ... I'm looking into it).

You might consider this if you're going to add managed switches:
If you have the ability to add (or put into service unused) cables, then you might want to assign a mirror port on the managed switch AND run a cable from that port to a central location where you can access it with a workstation NIC and, thus, remotely.  Otherwise you will have to be at the switch with a laptop if you want to sniff switch ports.
If you have adequate port margin (i.e. extra ports) then dedicating a port to mirroring (and thus losing it from the LAN or VLAN) this is a very good idea.
A hint in doing this:
Most switches will come up with a default "TO" port / i.e. the mirror port.  Often this is E1 or G1, etc.  So, I recommend using this default as the mirror port.  This way you won't accidentally assign a mirror role to an active port and disable something that should be connected.
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!


According to Cisco the Sx200 switch series does not support SNMP.  They had a release document that talked about it but appears to no longer be available.  


They added SNMP to the 300 series. See this release notes document:


I know I ran into the same thing here.  We put in two Sg200's
Sid_FAuthor Commented:
Excellent replies. I'm confident managed switches are the way to go. This site is connected via a site to site VPN. The ideal scenario would be to connect to one of the servers and be able to view all the switches from one interface (although if this means alot of added cost then connecting to each one individuall is fine)

I want to be able to view which port is showing the highest traffic (I imagine this will be a monitor situation as oppose to restricting bandwidth on ports at this point) I would like ports with high bandwidth usage to be as easy to identify as poosible for the local admin. Text based output that requires in depth networking knowledge may not be the best fit.

Hopefully you would be good enough to suggest what switches would allow for this. Thanks
Some software suggestions:

1. Solarwinds Real Time Bandwidth Monitor    http://www.solarwinds.com/products/freetools/real-time-bandwidth-monitor.aspx
2. Sourceforge Nagios     http://nagios.sourceforge.net/docs/3_0/monitoring-routers.html

We use Nagios however I have used Solarwinds in the past so both are good products. Solarwinds is probably easier to set up.

As for switches, we are strictly a Cisco shop so I can't speak to other brands. We have had a couple of non-managed Dell switches but they have been replaced with managed Cisco ones.
Fred MarshallPrincipalCommented:
I prefer PRTG for monitoring.

The information I found on the SG200 switches is that the SG200-08 does not have SNMP but implies that larger units do have it.  I can't confirm the latter.

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now