Sender: |
|
Date: |
Fri, 5 Aug 2016 17:38:00 +0300 |
Reply-To: |
|
Message-ID: |
|
Content-Transfer-Encoding: |
7bit |
Subject: |
|
From: |
|
Content-Type: |
text/plain; charset="US-ASCII"; format=flowed |
In-Reply-To: |
|
MIME-Version: |
1.0 |
Comments: |
|
Parts/Attachments: |
|
|
Could you please stop this, which is not an SL issue?
On 2016-08-05 17:19, Lamar Owen wrote:
> On 07/30/2016 06:35 PM, ToddAndMargo wrote:
>> I am looking to do network discovery. Basically, everything
>> on the interface, regardless of what network it belongs to
>> or if even has an ip assigned. Like AutoScan Network, only
>> not abandoned.
>>
> I have a dedicated install of NetworkSecurityToolkit (NST) on a box
> connected to two ports on one of our core switches. One port is the
> admin port that NST serves its web GUI on; the second port is a
> capture-only port and connects to a SPAN port on the core switch
> (Cisco terminology, as it's a Cisco 7609). I set up the SPAN to
> redirect traffic for the ports and/or VLANs I'm interested in looking
> at, and then capture all the traffic (I capture all traffic then
> filter it out). Not as clean as some other solutions, but it does get
> everything.
|
|
|