How to block Internet sharing by MacBook on Cisco Switches Cisco Vulnerability
I have a issue, on my LAN we found a vulnerability, the MAC laptop (MacBook Pro) had a sharing internet featuring. using Ethernet cable connected and you can share internet ussing AirPort to the other devices, you can configure the MAC as Access Point and make a NAT on the network.
I applied the port-security using max 2 mac address and switchport protect and spanning-tree bpduguard and traffic still passing. If you analyze the traffic you will only see the ip Ethernet cable, even apply the dhcp snoop give a IP address on devices connect to the MacBook.
Not sure if there is any feature to prevent ad-hoc wireless networks originated from a user machine from a Cisco Switch stand point of view, generally the User IT dept will create a GPO to disable ad-hoc networking on user wnic's or you have the wireless dept that keeps an eye on the any rogue AP's popping up in your network.
I am sure the Wireless Controllers now are capable of switchport tracing for rogue AP's and err-disable them as well.
Hello!I'm looking for a way to make my EEM script more dynamic and automated for my environment. This is what I have - basically I just capture the 4 IPSec peer IP addresses of each neighbor and insert this data into 4 different variables. ...
Hi all,I have a couple of Nexus9k switches. I need to get tcpdump from the physical interface which connected to the server. I'm looking for a specific protocol on tcpdump so that which feature should I use? I asked that because I couldn't full...
We are building out our first few AAR polices and are running into an error message.Built Global Policy with SLA class and traffic rules for voice traffic, attached to to the sites and VPN we needed, no issue. Building a second policy for management ...
Cisco Champion Radio · S7|E45 Network Insights with AI Endpoint Analytics
Identifying who and what is on the network is a challenge for many organizations. Incomplete visibility makes it difficult to implement advanced security policies and recommendatio...