images

Our Technology

nmap

stands for “network map”.p is actually more than just a port scanner. In addition to listing the open ports on a network, it also tries to construct an inventory of all the services running in a network. It also tries to detect as to which operating system is running on each machine, etc.

Nessus Vulnerability Scanner

Nessus is a remote security scanner, meaning that it is typically run on one machine to scan all the services offered by a remote machine in order to determine whether the latter is safeguarded against all known security exploits.

Protect:

If a violation occurs, the interface will remain online. Legitimate traffic will be forwarded and unauthorized traffic will be dropped, but No notification is given of this occurrence. It drops packets with unidentified source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value.

Redundant information

If a violation occurs it puts the interface into the error-disabled condition immediately and sends an SNMP trap notification. The interface will stop forwarding all traffic, including non-violating traffic, until it is removed from an errdisable state. This is the default action for Port Security

Restrict:

: If a violation occurs, the interface will remain online. Legitimate traffic will be forwarded, and unauthorized traffic will be dropped. An SNMP trap is generated, the log is appended. And the violation counter is incremented. It drops packets with unidentified source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the Security Violation counter to increment.

What We Do

COMMUNICATION BETWEEN ROGUE PC AND HOST

After successful physical connection with Fast Ethernet 0/1 port, hacker tried to communicate with other nodes on that network. As a result he failed in communication

VERIFICATION OF PORT SECURITY VIOLATION

Now go to switch’s configuration mode and try to know the status of port number 0/1 because the hacker physically connects with port number 0/1. Therefore, try the command show port-security interface Fast Ethernet 0/i. It displays output from the show port-security command for a specified interface.

Network Policy

This policy is to restrict the access of anyone towards the network resource and make clear who all will access the network. It will also ensure whether that person should be authenticated or not. This policy also includes other aspects like, who will authorize the new devices that will be connected with network? The documentation of network changes. Web filters and the levels of access.