It’s the “remote capture” that scares me.

I was testing some Meraki kit, called their NOC to try to debug some Radius 
issues, tech tells me “oh yes, I can see your traffic going hither and yon 
between the test client and test server that are both in your office, and 
looking at the packet contents I can see ….”

With Ruckus (or almost any other) gear, I have to either open up a hole through 
my firewall or grab the packet traces and send them to the tech folk.  They 
don’t have uncontrolled access to my internal traffic out of the box.

        paul


> On Feb 4, 2015, at 8:31 AM, Ray Soucy <[email protected]> wrote:
> 
> Honestly, in a lot of cases you don't even need a device to support
> packet capture as a feature to add it as a feature once its
> compromised.  This is just FUD IMHO.
> 
> On Wed, Feb 4, 2015 at 7:24 AM, Paul Nash <[email protected]> wrote:
>>> I love the built-in remote packet captures,
>> 
>> You, the NSA, and lots and lots of hackers, ALL love the remote packet 
>> capture.  If Meraki support can turn it on, so can someone who penetrates 
>> their systems (by getting a job there or by hacking), and then they get to 
>> see everything happening INSIDE your network.  Not just your WAN traffic, 
>> which would be bad enough.
>> 
>>        paul
> 
> 
> 
> -- 
> Ray Patrick Soucy
> Network Engineer
> University of Maine System
> 
> T: 207-561-3526
> F: 207-561-3531
> 
> MaineREN, Maine's Research and Education Network
> www.maineren.net

Reply via email to