mliu@EDDIE.MIT.EDU (Mei-Ling L. Liu) (11/10/88)
*** Detecting Unauthorized Connections on Your Network *** I am anxious to hear from people who have looked into or have implemented tools to detect unauthorized connections on their net- works. I have a campus network with a broadband backbone and ethernet basebands. We are running XNS now but will soon be switching to TCP/IP. Users are supposed to notify us (the Computing Center) before they hook anything up to the network, but naturally some of them conveniently overlook this rule. Up to now we have been relying on everybody's decency to cooperate, but now it seems in- evitable that we are going to have to police the network to catch intruders. If you know of any software/hardware tool for what I need, please respond. Thanks. ****************************************************************** Mei-Ling L. Liu, Coordinator, Network Administration Communications Services Cal Poly San Luis Obispo Internet: mliu@polyslo.calpoly.edu BITNET: mliu@calpoly ******************************************************************