Compare cert salaries and plan your next career move
wastedtime wrote: » If you have access to the switches you could follow the mac address back to the port and disable it. Just an idea.
RobertKaucher wrote: » If your switches are managed you could check the MAC tables to find which switch it is plugged into and then set that port to be administratively down (i.e. turned off). The only problem is that this assumes you are using managed switches. Have you confirmed if this is a PC/printer/whatever? I would start by finding out what the device actually is (look up the first 3 octets of the MAC address and try to access the device). If you think it’s a PC try to browse to [URL="file://\\ipaddress\C$"]\\ipaddress\C$[/URL] and see which users have signed into the PC by who has profiles on it. If it’s a printer it probably has an HTTP management page. That might help you.
RobertKaucher wrote: » Did you try just browsing to [URL="file://\\ipaddress"]\\ipaddress[/URL] or http://ipaddress ? Might give you some clues. Looking at what CNET Tech. makes, I would bet it is probably a PC as well. But it could be a consumer grade wireless router or other network device. Could a user have brought something in and plugged it in without permission? Let us know...
brad- wrote: » If someone brought something in, they would need to know our network scheme to manually assign the IP and then crack the password to get on our wireless. All is well though...the guy that installed our camera system came out and just rebooted it all...no worries anymore. Thanks guys!
brad- wrote: » If someone brought something in, they would need to know our network scheme to manually assign the IP and then crack the password to get on our wireless.
tiersten wrote: » It is trivial to determine the relevant details of your network. The danger isn't that somebody is connecting something to your wireless network but more that they're plugging in an unprotected WiFi AP or other unauthorised device. To protect against this, you need to use 802.1x on your network to provide authentication.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.