You could configure nessus scanning on the server to fingerprint the OS. http://www.cisco.com/en/US/products/ps6128/products_tech_note09186a0080545b62.shtml
Daniel Tuck Network Administrator JNCIA - Western State College of Colorado [EMAIL PROTECTED] (970)943-3123 On 4/16/08 7:07 AM, "James Moskwa" <[EMAIL PROTECTED]> wrote: Has anyone run into this yet? Any thoughts on how to neutralize it as a bypass? http://daa1000.tripod.com/ Regards, -- Jim Jim Moskwa Manager Networks & Security Information Technology Department Johnson & Wales University 8 Abbott Park Place Providence, RI 02903 Office: 401-598-1556 Fax: 401-598-1329 Email: [EMAIL PROTECTED]
