14 Oct
2012
14 Oct
'12
10:09 p.m.
SSL throughout the network, with access control enforced using certificates is certainly a good idea. But most of the problem you face is metrics and inventory control of authorized devices. Commercial WIPS gear does a lot of this heavy lifting without your having to script it all yourself. On Monday, October 15, 2012, Jimmy Hess wrote:
A NAT device is one example..... another example of an unauthorized device could be an unauthorized hardware keylogger/ network backdoor, with unauthorized connectivity to the LAN, and possible covert channels/backdoors/firewall bypasses.
-- Suresh Ramasubramanian (ops.lists@gmail.com)