Anyone out there currently using a tool that would identify rogue
devices in your network?
In my case, one trait of a "rogue" is a piece of equipment using a non
authorized snmp community string.
Another might be the assignment of unauthorized IP address space.
Mike
---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Fri Mar 5 08:18:06 2004
This archive was generated by hypermail 2.1.8 : Fri Mar 05 2004 - 08:18:06 PST