sure, you have a few choices, depending on your needs. What you are seeing is Broadcast traffic I believe. with no vlans (cept default vlan 1, Im assuming) all of your devices are percieved to be on the same wire, so broadcasts for SMTP, www, etc are all heard by each device ON that wire. I'd suggest VLANing, and subnetting to create smaller boardcast domains. Create each switch as it's own vlan, connect that vlan to the core 4908, define that VLAN as an interface at layer 3, have that IP as the default gateway for each particular vlan, and default route those IPs to your border router. You can get WAY more simple, or complex, depending on your needs, but Im recommending is considered the "collapsed core" network topology, per Cisco, I think..... now if I could just learn how to spell IP....
But the traffic I see it's not just broadcast, I can eg. see singel conection between a workstation on our net (do not have to be on the same segment of the star) downloading a page on a external web-server, or someone in the net checking there mail at our mail-server. And this I can do from any workstation (that have a sniffer-program) in the net.
I can't see all trafic but very much.
And this is not just an security matter, if someone is downloading a lot from eg. Kaza, Gnutella... then this traffic is going to all (I don't knew if it's all but many) switches and is a great burden to the net. And it's not broadcast nor multicast.
My guess is that the eth port on the swich that you connect your PC is configured as a span port, and because you can see everything in the network, that all the other switch ports on all the switches are also configged as span ports. Most likely, when the network was setup, someone set them up this way, perhaps for testing, perhaps out of ignorance. Please post a reply when you figure this out.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...