I'm curious how would you go about simulating a large amount of users to
make this as realistic as possible? Also I don't this command is available
in the IOS's that I have used for dynamips.
On Fri, Mar 26, 2010 at 4:05 PM, luan nguyen <luan_at_netcraftsmen.net> wrote:
> Hey Charles.
>
> Great thing about working at Netcraftsmen is collectively we've seen almost
> all problems.
> This can be done using a home network or dynamips and WM.
>
> -Luan
>
>
>
> -----Original Message-----
> From: Charles.Henson_at_regions.com
> Sent: March 26, 2010 3:28 PM
> To: Luan Nguyen <luan_at_netcraftsmen.net>
> Cc: ccielab_at_groupstudy.com; 'Marko Milivojevic' <markom_at_ipexpert.com>;
> 'Narbik Kocharians' <narbikk_at_gmail.com>; nobody_at_groupstudy.com
> Subject: RE: Protection against Man-in -d -middle attack
>
> Luan,
> Respectfully, aren't we being a little tough for a volunteer driven
> GS? You're at NetCraftsmen. Have you labbed it up?
>
>
> Charles Henson
>
>
>
>
>
> |------------>
> | From: |
> |------------>
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |"Luan Nguyen" <luan_at_netcraftsmen.net>
> |
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |------------>
> | To: |
> |------------>
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |"'Marko Milivojevic'" <markom_at_ipexpert.com>
> |
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |------------>
> | Cc: |
> |------------>
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |"'Narbik Kocharians'" <narbikk_at_gmail.com>, <ccielab_at_groupstudy.com>
> |
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |------------>
> | Date: |
> |------------>
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |03/26/2010 02:21 PM
> |
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |------------>
> | Subject: |
> |------------>
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
> |RE: Protection against Man-in -d -middle attack
> |
>
> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>
>
>
>
>
> You can talk the talk, but everything needs to be tested out in a lab first
> before implement...no matter how much is the amount of planning! That's
> how I always do thing anyway, from a simple thing like this DAI problem to
> complex voice, NAC with ASA for VPN...etc.
> What happen to all the existing DHCP clients? How do you create the DHCP
> leasing info? What's the best way of getting it without disrupting the
> users?...etc. Be less general.
>
> " Anything can be done with the right amount of careful
> planning and execution" sounds like coming from my corporate boss back in
> the day...
>
> -----Original Message-----
> From: Marko Milivojevic [mailto:markom_at_ipexpert.com]
> Sent: Friday, March 26, 2010 2:56 PM
> To: Luan Nguyen
> Cc: Narbik Kocharians; ccielab_at_groupstudy.com
> Subject: Re: Protection against Man-in -d -middle attack
>
> On Fri, Mar 26, 2010 at 18:35, Luan Nguyen <luan_at_netcraftsmen.net> wrote:
> > That's too general :)
> > How about labbing that up? Say a small network of 10 VM XP machines of
> extremely bitchy client = no down time?
>
> I don't think I was too general. Those things are not labbed, but
> planned. Anything can be done with the right amount of careful
> planning and execution.
>
> If you need a solution for the problem, feel free to contact me offline.
>
> --
> Marko Milivojevic - CCIE #18427
> Senior Technical Instructor - IPexpert
>
> YES! We include 400 hours of REAL rack
> time with our Blended Learning Solution!
>
> Mailto: markom_at_ipexpert.com
> Telephone: +1.810.326.1444
> Fax: +1.810.454.0130
> Web: http://www.ipexpert.com/
>
> __________ Information from ESET NOD32 Antivirus, version of virus
> signature database 4977 (20100326) __________
>
> The message was checked by ESET NOD32 Antivirus.
>
> http://www.eset.com
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Fri Mar 26 2010 - 16:35:19 ART
This archive was generated by hypermail 2.2.0 : Thu Apr 01 2010 - 07:26:36 ART