Pat,

The "8th layer" policy idea is good.  I would take that one step
further, after checking with your legal department to make sure they
don't have a problem with it and that it's airtight:

In addition to the "disciplinary action up to and including termination"
clause, incorporate in company policy a clause something like this: 
"Any personal computer or networking equipment that is plugged into
company infrastructure without explicit approval is forfeit and becomes
the property of the company."

This is particularly effective if your policies include a statement that
those who agree to it also agree to any future revisions of said policy.

As for a technical way to stop it ... shutdown all unused switchports,
or assign them to a VLAN that goes nowhere.  You'd still need to check
for rogue equipment -- someone could set up their machine with two NICs,
hang an AP off one of them, and make it work with address translation.

Thanks,
Shawn

Patrick Donlon wrote:
> 
> Thanks Chris, I was thinking more about securing the switch ports by
> authenticating mac's (probably a bit OTT) or using SNMP to check for new
> devices, any other ideas?  I've already set up a wireless LAN here with WEP
> with authentication on an ACS server, which is a waste of time when you
have
> people setting up there own kit,




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=47391&t=47287
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to