Hi,

On Fri, Mar 25, 2005 at 02:07:49AM +0100, Per Engelbrecht wrote:
> So fare I've done all my "tapping" on the backbone's SPAN port.
> I do have SPAN ports on all the customer switches as well, but don't use 
> them right now - I'm building an NDIS master with sensors (hardware 
> clients) going into these ports .. all the way down. It's not production 
> ready yet, though.

Another approach (which is strongly recommended) would be to apply full
layer 3 separation.  Each customer gets a *routed* layer 3 VLAN, and all
IPs in there belong to him.

So even if the trojan "spoofs" addresses, it's still easy to backtrack, 
because all the /29 or /28 or whatever subnet is the same customer anyway -
and with proper anti-spoofing filtering, no other source IPs can get
out of the VLAN.

But that's getting off-topic on tcpdump-workers.  A better list for that
might be cisco-nsp (see http://puck.nether.net/ for a number of very
interesting networker lists).

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             [EMAIL PROTECTED]
fax: +49-89-35655025                        [EMAIL PROTECTED]
-
This is the tcpdump-workers list.
Visit https://lists.sandelman.ca/ to unsubscribe.

Reply via email to