From: John Kaberna (jkaberna@xxxxxxxxxxxx)
Date: Sat Aug 18 2001 - 23:22:53 GMT-3
Imagine being thrown in to a client's site to troubleshoot a network outage
without any preparation time. You don't have access to a sniffer. The
server having connectivity problems is a Sun box. You want to know if that
traffic is making it back to the server. The routers are heavy utilized and
running any kind of detailed debug may impact them adversely. What do you
do? How many guys without NOS experience will know to use snoop to see
exactly what arrives at the server and filter on a specific port? Probably
none. How many will know when to block TCP and UDP ports 135-139 for NT if
you don't want certain networks (especially public) to be able to exploit
known vulnerabilities? I'm sure we could go on and on and everyone with NOS
experience can come up with much better examples than I've given. As a
matter of fact, I think these issues are neglected in our internetworking
studies way too much.
John Kaberna
CCIE #7146
NETCG Inc
Cisco Premier Partner
www.netcginc.com
(415) 750-3800
Fax: 750-3900
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:31:53 GMT-3