mliu@EDDIE.MIT.EDU (Mei-Ling L. Liu) (11/10/88)
*** Detecting Unauthorized Connections on Your Network ***
I am anxious to hear from people who have looked into or have
implemented tools to detect unauthorized connections on their net-
works.
I have a campus network with a broadband backbone and ethernet
basebands. We are running XNS now but will soon be switching to
TCP/IP. Users are supposed to notify us (the Computing Center)
before they hook anything up to the network, but naturally some of
them conveniently overlook this rule. Up to now we have been
relying on everybody's decency to cooperate, but now it seems in-
evitable that we are going to have to police the network to catch
intruders.
If you know of any software/hardware tool for what I need, please
respond. Thanks.
******************************************************************
Mei-Ling L. Liu, Coordinator, Network Administration
Communications Services
Cal Poly San Luis Obispo
Internet: mliu@polyslo.calpoly.edu
BITNET: mliu@calpoly
******************************************************************