[comp.dcom.telecom] Detecting unauthorized network connections

mliu@EDDIE.MIT.EDU (Mei-Ling L. Liu) (11/10/88)

       *** Detecting Unauthorized Connections on Your Network ***

       I am anxious to hear from people who  have  looked  into  or  have
       implemented tools to detect unauthorized connections on their net-
       works.
       I  have  a  campus  network with a broadband backbone and ethernet
       basebands.   We are running XNS now but will soon be switching  to
       TCP/IP.    Users  are supposed to notify us (the Computing Center)
       before they hook anything up to the network, but naturally some of
       them conveniently overlook this rule.   Up to  now  we  have  been
       relying on everybody's decency to cooperate,  but now it seems in-
       evitable that we are going to have to police the network to  catch
       intruders.
       If you know of any software/hardware tool for what I need,  please
       respond.  Thanks.
       ******************************************************************
       Mei-Ling L. Liu, Coordinator, Network Administration
       Communications Services
       Cal Poly San Luis Obispo
       Internet: mliu@polyslo.calpoly.edu
       BITNET: mliu@calpoly
       ******************************************************************