| To be more specific,
According to my knowledge HUbwatch can display the IP address if the connected
node on a DECrepeater 900TM that runs TCP/IP.
If this is the case; is it then possible with HUBwatch 3.* to generate an alarm
when that address changes. This is handy to quickly detect "spoofing" and
reduces network down time?
Secondly, if a repeater can detect the ip address is it possible and / or
likely that the repeater can be upgraded to a "secure ethernet access server".
thereby give customers the same level of security when running TCP/IP as they
have today when running DECnet.
regards jos
|
|
> According to my knowledge HUbwatch can display the IP address if the
> connected node on a DECrepeater 900TM that runs TCP/IP.
Correct. HUBwatch does this by reading the MAC address for the port
from the repeater and then checking for IP addresses at that MAC
address; the repeater does not know what the IP address is. This
lookup is quite expensive.
> If this is the case; is it then possible with HUBwatch 3.* to
> generate an alarm when that address changes. This is handy to quickly
> detect "spoofing" and reduces network down time?
First, it would be prohibitivly expensive both in terms of network
traffic and HUBwatch cpu time.
Second, since HUBwatch asks the node (via its MAC address) for the IP
addresses it is using, a 'spoofer' could easily lie or just fail to
respond to the query, making the check useless.
> Secondly, if a repeater can detect the ip address is it possible and
> / or likely that the repeater can be upgraded to a "secure ethernet
> access server". thereby give customers the same level of security
> when running TCP/IP as they have today when running DECnet.
I don't know enough to comment on the level of security they have with
DECnet.
Basically, I don't think you can get this at a competetive cost in a
repeater. You might raise the issue with the product management for
the Personal Ethernet product(s), however; they are multi-port bridges,
not repeaters. It might be possible to set up bridge filtering on a
port to prevent either eavesdropping or spoofing through the port.
|