None whatsoever. Not interesting enough. I was just trying to help and not satisfied with the general answer.
-----Original Message-----
From: Charles.Henson_at_regions.com
Sent: March 26, 2010 4:30 PM
To: luan nguyen <luan_at_netcraftsmen.net>
Cc: ccielab_at_groupstudy.com; 'Marko Milivojevic' <markom_at_ipexpert.com>; 'Narbik Kocharians' <narbikk_at_gmail.com>; nobody_at_groupstudy.com
Subject: RE: Protection against Man-in -d -middle attack
I understand and can appreciate using dynamips and vmware and whatnot to
mock things up. I was just curious how much labbing was being done on your
side considering you are the one doing the talking. Again, no cheap shot
intended..
Charles Henson
|------------>
| From: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|luan nguyen <luan_at_netcraftsmen.net> |
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| To: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|<Charles.Henson_at_regions.com> |
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| Cc: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|<ccielab_at_groupstudy.com>, "'Marko Milivojevic'" <markom_at_ipexpert.com>, "'Narbik Kocharians'" <narbikk_at_gmail.com>, <nobody_at_groupstudy.com> |
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| Date: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|03/26/2010 03:09 PM |
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| Subject: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|RE: Protection against Man-in -d -middle attack |
>--------------------------------------------------------------------------------------------------------------------------------------------------|
Hey Charles.
Great thing about working at Netcraftsmen is collectively we've seen almost
all problems.
This can be done using a home network or dynamips and WM.
-Luan
-----Original Message-----
From: Charles.Henson_at_regions.com
Sent: March 26, 2010 3:28 PM
To: Luan Nguyen <luan_at_netcraftsmen.net>
Cc: ccielab_at_groupstudy.com; 'Marko Milivojevic' <markom_at_ipexpert.com>;
'Narbik Kocharians' <narbikk_at_gmail.com>; nobody_at_groupstudy.com
Subject: RE: Protection against Man-in -d -middle attack
Luan,
Respectfully, aren't we being a little tough for a volunteer
driven
GS? You're at NetCraftsmen. Have you labbed it up?
Charles Henson
|------------>
| From: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|"Luan Nguyen" <luan_at_netcraftsmen.net>
|
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| To: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|"'Marko Milivojevic'" <markom_at_ipexpert.com>
|
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| Cc: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|"'Narbik Kocharians'" <narbikk_at_gmail.com>, <ccielab_at_groupstudy.com>
|
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| Date: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|03/26/2010 02:21 PM
|
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|------------>
| Subject: |
|------------>
>--------------------------------------------------------------------------------------------------------------------------------------------------|
|RE: Protection against Man-in -d -middle attack
|
>--------------------------------------------------------------------------------------------------------------------------------------------------|
You can talk the talk, but everything needs to be tested out in a lab first
before implement...no matter how much is the amount of planning! That's
how I always do thing anyway, from a simple thing like this DAI problem to
complex voice, NAC with ASA for VPN...etc.
What happen to all the existing DHCP clients? How do you create the DHCP
leasing info? What's the best way of getting it without disrupting the
users?...etc. Be less general.
" Anything can be done with the right amount of careful
planning and execution" sounds like coming from my corporate boss back in
the day...
-----Original Message-----
From: Marko Milivojevic [mailto:markom_at_ipexpert.com]
Sent: Friday, March 26, 2010 2:56 PM
To: Luan Nguyen
Cc: Narbik Kocharians; ccielab_at_groupstudy.com
Subject: Re: Protection against Man-in -d -middle attack
On Fri, Mar 26, 2010 at 18:35, Luan Nguyen <luan_at_netcraftsmen.net> wrote:
> That's too general :)
> How about labbing that up? Say a small network of 10 VM XP machines of
extremely bitchy client = no down time?
I don't think I was too general. Those things are not labbed, but
planned. Anything can be done with the right amount of careful
planning and execution.
If you need a solution for the problem, feel free to contact me offline.
-- Marko Milivojevic - CCIE #18427 Senior Technical Instructor - IPexpert YES! We include 400 hours of REAL rack time with our Blended Learning Solution! Mailto: markom_at_ipexpert.com Telephone: +1.810.326.1444 Fax: +1.810.454.0130 Web: http://www.ipexpert.com/ __________ Information from ESET NOD32 Antivirus, version of virus signature database 4977 (20100326) __________ The message was checked by ESET NOD32 Antivirus. http://www.eset.com Blogs and organic groups at http://www.ccie.netReceived on Fri Mar 26 2010 - 17:25:12 ART
This archive was generated by hypermail 2.2.0 : Thu Apr 01 2010 - 07:26:36 ART