fernald@meridn.dec.com (11/16/88)
In article <5571@polyslo.CalPoly.EDU>, mliu@polyslo.CalPoly.EDU (Mei-Ling L. Liu) writes: > > *** Detecting Unauthorized Connections on Your Network *** > > I am anxious to hear from people who have looked into or have > implemented tools to detect unauthorized connections on their net- > works. I used the following network tool to verify network configuration. It could also be run daily by a system manager to detect unauthorized taps: NCP> set mod config circ xyz-0 surv enab This starts the NICONFIG monitor to report the presence of taps at the physical link. One can review a listing using: NCP> show mod config circ xyz-0 char +------------------------+-----------------------------------------+ | c.b. fernald | arpa: fernald%meridn.dec@decwrl.arpa | | DEC Connecticut SWS | uucp: decwrl!meridn.dec.com!fernald | +------------------------+-----------------------------------------+