tag:blogger.com,1999:blog-2673681754036568683.post4424924863619804845..comments2024-03-12T17:19:42.304+08:00Comments on Taking Network Security to the Streets: Don'ts for Cisco router p1Unknownnoreply@blogger.comBlogger6125tag:blogger.com,1999:blog-2673681754036568683.post-4562748113454034692010-07-30T02:17:20.899+08:002010-07-30T02:17:20.899+08:00In addressing the router enables wireless networki...In addressing the router enables wireless networking connection, really amazing what Technology has changed these days. I like meeting new things. This is why i have come to this blog, I find it very interesting.This is like <br /><a href="http://www.costaricaindex.com/costa-rica-investment/investment-costa-rica.html" title="costa rica investment opportunities" rel="nofollow">costa rica investment opportunities</a> really interesting too.Unknownhttps://www.blogger.com/profile/00303888404713862153noreply@blogger.comtag:blogger.com,1999:blog-2673681754036568683.post-90601689839048440652007-03-06T17:34:00.000+08:002007-03-06T17:34:00.000+08:00Unfortunately, i dont know any other commands othe...Unfortunately, i dont know any other commands other than cdp. you can try show ip route, but you need to figure out manually.<BR/><BR/>HackathologyAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-2673681754036568683.post-69733545002763483552007-03-06T16:13:00.000+08:002007-03-06T16:13:00.000+08:00agree that if it is compromised.but cdp neighbours...agree that if it is compromised.<BR/><BR/>but cdp neighbours is a command needed by my network guys. is there another way they can discover without using cdp? the issues with cdp have long been documented, and company policy does call for it to be turned off. but the impact of turning it off affects their work.<BR/><BR/>i have to measure up the risk the functionality of it to decide if it should be approved or not.<BR/><BR/>as for syslogging, it is not about monitoring. these are monitored for sure, however the decision not to log at a certain level means if there is a need to do forensics or security audit due to an incident, the information may not be complete due to lack of details in the log.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2673681754036568683.post-79493336941656207482007-03-06T14:30:00.000+08:002007-03-06T14:30:00.000+08:00I forgot to add something for cdp, i know it is no...I forgot to add something for cdp, i know it is not facing the internet, but if i compromise your external router, i can know what are your neighbors by issuing the show cdp neighbors. Refer to my previous post for the images, i managed to hacked the routers and firewall, and what if i issue those commands?<BR/><BR/>HackathologyAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-2673681754036568683.post-29640490295248007782007-03-06T14:22:00.000+08:002007-03-06T14:22:00.000+08:00Well, cdp v1 is considered high risk to me if i we...Well, cdp v1 is considered high risk to me if i were to setup a router. CDP is known to DoS attack and i had tested it before. As for workaround, try CDP v2. Personaly, i had not tested it, but you can give it a try.<BR/><BR/>For syslog, i personally use 6 or 7. But if you would prefer to use 4 or 5, and if you think it consumes a lot of space, make sure there is a constant monitoring of space and archieving is performed. <BR/><BR/>HackathologyAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-2673681754036568683.post-33527743840074464312007-03-06T10:40:00.000+08:002007-03-06T10:40:00.000+08:00Hi, i understand the vulnerabilites for no cdp run...Hi, i understand the vulnerabilites for no cdp run. But if the router is not facing the internet, would you consider it high risk too? We do maintain cdp run, so that we can do a discover and see if there are any rogue systems plugged in. as in, unknown/unauthorised systems. Are there work arounds without the use of cdp?<BR/><BR/>i would like your comment on syslog levels too. Sys log 4 or 5? 5 consumes a lot of space, but it may have info that is useful for audit trail and forensics. The standard is level 6 i believe but it is unnecessary.Anonymousnoreply@blogger.com