We are rebuilding a very large airport enterprise network with Cisco 6509's in core and distribution and stacks of 3500's at the edges. We have started seeing quite a few cases of user installed 802.11b wireless access points which violates network security. I haven't been able to find any reasonable method of detecting an attached access point, shutting the port on the 3500 down and generating an SNMP trap. Any ideas or plans on the horizon?
I would suggest that you check the MAC prefix for this type of device and put a filter in your routers to detect it and trigger a trap. You can then investigate and close the port if necessary. Another alternative would be to lock all unused ports and lock lve ports to a specfic ethernet address this is secure but a bit labour intensive.
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...
Attached policy provides CLI access to the Cisco 4G router over text messaging. Two files are in the attached .tar file:
2. PDF with instructions on how to load and use the .tcl file.