Since you are on a switched network, anyone plugging in a "sniffer," or running a "sniffer" application on their desktop will only see broadcasts, multicasts, and the traffic destined for their host.
Unless they have admin privileges to set the switch up to "span" (mirror) a port / some ports there won't be much to be seen.
This also is a good example of why physical security (putting the network infrastructure devices behind closed & locked doors) is important. If someone can only get to a host connection, there's not much chance that they can connect to a server trunk and get any important information.
I've never heard of "anti-sniff" devices or software, but it sounds interesting.
Sniffing a segment of a network (LAN/VLAN), is easily accomplished using Ettercap. Ettercap has numerous options, some of which are man in the middle arp poisoning, and mac-address discovery of the LAN. Once the mac address of the gateway is discovered, all traffic to/from that mac address can be captured, using Ethereal, or any other sniffer of choice.
I've tried it, and it works pretty slick. Exercise caution with Ettercap's option switches, as incorrect use can crash a LAN/VLAN (which makes it a layer2 DOS attack tool).
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...