RE: Protection against Man-in -d -middle attack

From: luan nguyen <luan_at_netcraftsmen.net>
Date: Fri, 26 Mar 2010 17:36:03 -0400

A couple of VMs should be enough.

-----Original Message-----
From: Mark Matters <markccie_at_gmail.com>
Sent: March 26, 2010 4:35 PM
To: luan nguyen <luan_at_netcraftsmen.net>
Cc: Charles.Henson_at_regions.com; ccielab_at_groupstudy.com; Marko Milivojevic
<markom_at_ipexpert.com>; Narbik Kocharians <narbikk_at_gmail.com>;
nobody_at_groupstudy.com
Subject: Re: Protection against Man-in -d -middle attack

I'm curious how would you go about simulating a large amount of users to make
this as realistic as possible? Also I don't this command is available in the
IOS's that I have used for dynamips.

On Fri, Mar 26, 2010 at 4:05 PM, luan nguyen <luan_at_netcraftsmen.net> wrote:
Hey Charles.

 Great thing about working at Netcraftsmen is collectively we've seen almost
all problems.
 This can be done using a home network or dynamips and WM.

 -Luan

 -----Original Message-----
 From: Charles.Henson_at_regions.com
 Sent: March 26, 2010 3:28 PM
 To: Luan Nguyen <luan_at_netcraftsmen.net>
Cc: ccielab_at_groupstudy.com; 'Marko Milivojevic' <markom_at_ipexpert.com>; 'Narbik
Kocharians' <narbikk_at_gmail.com>; nobody_at_groupstudy.com
 Subject: RE: Protection against Man-in -d -middle attack

 Luan,
        Respectfully, aren't we being a little tough for a volunteer driven
 GS? You're at NetCraftsmen. Have you labbed it up?

 Charles Henson

 |------------>
 | From: |
 |------------>
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
 |"Luan Nguyen" <luan_at_netcraftsmen.net>
                                                                      |
>---------------------------------------------------------------------------
-----------------------------------------------------------------------|
 |------------>
 | To: |
 |------------>
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
  |"'Marko Milivojevic'" <markom_at_ipexpert.com>
                                                                      |
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
 |------------>
| Cc: |
 |------------>
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
  |"'Narbik Kocharians'" <narbikk_at_gmail.com>, <ccielab_at_groupstudy.com>
                                                                      |
>---------------------------------------------------------------------------
-----------------------------------------------------------------------|
 |------------>
 | Date: |
 |------------>
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
  |03/26/2010 02:21 PM
                                                                      |
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
 |------------>
 | Subject: |
 |------------>
>--------------------------------------------------------------------------
------------------------------------------------------------------------|
 |RE: Protection against Man-in -d -middle attack
                                                                      |
>--------------------------------------------------------------------------
------------------------------------------------------------------------|

 You can talk the talk, but everything needs to be tested out in a lab first
before implement...no matter how much is the amount of planning! That's
how I always do thing anyway, from a simple thing like this DAI problem to
 complex voice, NAC with ASA for VPN...etc.
 What happen to all the existing DHCP clients? How do you create the DHCP
leasing info? What's the best way of getting it without disrupting the
 users?...etc. Be less general.

 " Anything can be done with the right amount of careful
 planning and execution" sounds like coming from my corporate boss back in
 the day...

 -----Original Message-----
 From: Marko Milivojevic [mailto:markom_at_ipexpert.com]
 Sent: Friday, March 26, 2010 2:56 PM
 To: Luan Nguyen
 Cc: Narbik Kocharians; ccielab_at_groupstudy.com
 Subject: Re: Protection against Man-in -d -middle attack

 On Fri, Mar 26, 2010 at 18:35, Luan Nguyen <luan_at_netcraftsmen.net> wrote:
> That's too general :)
> How about labbing that up? Say a small network of 10 VM XP machines of
 extremely bitchy client = no down time?

 I don't think I was too general. Those things are not labbed, but
 planned. Anything can be done with the right amount of careful
 planning and execution.

 If you need a solution for the problem, feel free to contact me offline.

 --
 Marko Milivojevic - CCIE #18427
 Senior Technical Instructor - IPexpert

 YES! We include 400 hours of REAL rack
 time with our Blended Learning Solution!

 Mailto: markom_at_ipexpert.com
 Telephone: +1.810.326.1444
 Fax: +1.810.454.0130
 Web: http://www.ipexpert.com/

 __________ Information from ESET NOD32 Antivirus, version of virus
 signature database 4977 (20100326) __________

 The message was checked by ESET NOD32 Antivirus.

http://www.eset.com

 Blogs and organic groups at http://www.ccie.net

 _______________________________________________________________________
 Subscription information may be found at:
http://www.groupstudy.com/list/CCIELab.html

 Blogs and organic groups at http://www.ccie.net

 _______________________________________________________________________
 Subscription information may be found at:
http://www.groupstudy.com/list/CCIELab.html

 Blogs and organic groups at http://www.ccie.net

 _______________________________________________________________________
 Subscription information may be found at:
http://www.groupstudy.com/list/CCIELab.html

Blogs and organic groups at http://www.ccie.net
Received on Fri Mar 26 2010 - 17:36:03 ART

This archive was generated by hypermail 2.2.0 : Thu Apr 01 2010 - 07:26:36 ART