05-05-2006 09:09 AM - edited 03-09-2019 02:49 PM
Is there a clear cut way to block applications (such as nmap) from performing a fingerprint and determining the device is a cisco router/switch?
Pete
05-06-2006 08:38 AM
No, you cannot change that behavior because the nmap OS Fingerprint is based on TCP/IP stack characteristics how the devices responds and this is not configurable in a Cisco device.
The only way would be to place an IPS that would block the attckers source or the responses. But remember that blocking (Shunning) is quiet dangerous because it is also easy to forge the source IP.
sincerely
Patrick
05-08-2006 05:02 AM
Thanks... I wasnt sure if i could block certain things that NMAP looks for but i guess not.
Pete
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: