<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Locating unauthorized, unmanaged hubs? in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928617#M26765</link>
    <description>Some users on our network have apparently taken it upon themselves to bring in equipment from outside our network and hook it up.  We've had reports that these hubs have been hooked up, and we're assuming their unmanaged.  Is there a way to effectively locate these...parasites...remotely?&lt;BR /&gt;</description>
    <pubDate>Fri, 23 Sep 2005 12:43:42 GMT</pubDate>
    <dc:creator>Preston Gallwas</dc:creator>
    <dc:date>2005-09-23T12:43:42Z</dc:date>
    <item>
      <title>Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928617#M26765</link>
      <description>Some users on our network have apparently taken it upon themselves to bring in equipment from outside our network and hook it up.  We've had reports that these hubs have been hooked up, and we're assuming their unmanaged.  Is there a way to effectively locate these...parasites...remotely?&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Sep 2005 12:43:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928617#M26765</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-23T12:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928618#M26766</link>
      <description>You could do better.  You could set MAC address security to continuous learn and kill anything with more than one MAC per port.&lt;BR /&gt;&lt;BR /&gt;If you are not ready for such drastic action, you would need to query the MAC addresses of all the ports that are not ISL.  Those with more than one MAC would have a hub/switch/WAP attached.</description>
      <pubDate>Fri, 23 Sep 2005 12:48:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928618#M26766</guid>
      <dc:creator>Les Ligetfalvy</dc:creator>
      <dc:date>2005-09-23T12:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928619#M26767</link>
      <description>Okay les, on a 2600 series running 8.53, would i just "show mac" &lt;BR /&gt;?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Sep 2005 13:08:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928619#M26767</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-23T13:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928620#M26768</link>
      <description>Correct, use "show mac-address".  You can also list them by port or VLAN.&lt;BR /&gt;&lt;BR /&gt;You can also do this using SNMP via the dot1dTpFdbTable within the Bridge MIB.&lt;BR /&gt;&lt;BR /&gt;1.3.6.1.2.mib2(1).dot1dBridge(17).dot1dTp(4).dot1dTpFdbTable(3)</description>
      <pubDate>Fri, 23 Sep 2005 15:07:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928620#M26768</guid>
      <dc:creator>Manfred Arndt</dc:creator>
      <dc:date>2005-09-23T15:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928621#M26769</link>
      <description>IMHO, rogue device detection should be included in any decent NMS app.  Even worse than unmanaged hubs/switches are when users attach wireless access points.</description>
      <pubDate>Sat, 24 Sep 2005 08:25:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928621#M26769</guid>
      <dc:creator>Les Ligetfalvy</dc:creator>
      <dc:date>2005-09-24T08:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928622#M26770</link>
      <description>An unmanaged hub would be, effectively,  a passive device and not say anything on the network itself.&lt;BR /&gt;&lt;BR /&gt;The suggestions to look for more than one MAC address at ingress to your switch ports is probably the best you can do, but keep in mind  it may have false positives and false negatives.&lt;BR /&gt;&lt;BR /&gt;The false positives might include single systems running virutal machines - they can have several MAC addresses.&lt;BR /&gt;&lt;BR /&gt;The false negatives might include people with the hub, but only one system connected to it.&lt;BR /&gt;&lt;BR /&gt;That you are getting reports of people bringing-in hubs suggests they are looking to solve problems with the current setup.  You may want to go beyond finding the hubs and figure-out why people are adding the hubs in the first place and address that too.&lt;BR /&gt;&lt;BR /&gt;Unless you are running with spanning tree disabled, I'm not sure what "harm" could come from folks having hubs in their offices - heck or even switches for that matter.  Is there a specific concern you have with people having hubs?</description>
      <pubDate>Mon, 26 Sep 2005 11:44:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928622#M26770</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-09-26T11:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928623#M26771</link>
      <description>We're a school district, and we must enforce the policy, number one.&lt;BR /&gt;&lt;BR /&gt;In addition to that, there are technical issues that arise, such as the fact that we are operating without spanning tree (which I have been a big proponent of getting it turned on, but there was an issue years ago with STP not allowing the Novell client to authenticate.  I believe it was solved with portfast, or, RSTP, but I have not tested that...and its been an uphill battle getting that arena set up.), managing things with an IT department that is clearly understaffed...etc.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Sep 2005 13:31:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928623#M26771</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-26T13:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928624#M26772</link>
      <description>Running without spanning tree... doubleplusungood.  I guess that explains the need to be so draconian about the hubs and other devices.  Interesting how it all starts to build on itself isn't it?</description>
      <pubDate>Mon, 26 Sep 2005 13:35:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928624#M26772</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-09-26T13:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928625#M26773</link>
      <description>yeah.  likewise, if you have any resources for best practices of moving towards a STP implementation...I'd love to see it.  We've got 65 subnets across approx 45 locations...&lt;BR /&gt;&lt;BR /&gt;I'd love to study up and make a case for deploying it once i make sure out network functions with it enabled (netware client, other apps, etc)&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Sep 2005 13:58:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928625#M26773</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-26T13:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928626#M26774</link>
      <description>Are you trying to run a flat network across those 45 locations?&lt;BR /&gt;&lt;BR /&gt;Since STP doesn't cross routers, ass-u-me-ing each separate location is one or more IP subnets, the number of locations should be a don't care for STP.</description>
      <pubDate>Mon, 26 Sep 2005 14:08:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928626#M26774</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-09-26T14:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928627#M26775</link>
      <description>27 locations are 1 IP subnet per location, (elementary schools and support sites)&lt;BR /&gt;&lt;BR /&gt;6 of them have 2 IP subnets&lt;BR /&gt;&lt;BR /&gt;Our high schools have between 4 and 8 subnets...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;What do you mean by flat network?  We're Hub-n-spoke here...&lt;BR /&gt;&lt;BR /&gt;CISCO7000 --WAN --&amp;gt;Cisco2600--&amp;gt;HP ProCurve 2600 series stack&lt;BR /&gt;&lt;BR /&gt;Is generally the setup for all sites&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Sep 2005 11:44:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928627#M26775</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-28T11:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928628#M26776</link>
      <description>one flat network would be one broadcast domain - i was guessing at that since you were asserting that enabling STP was a problem because of the number of sites involved.  since STP would not cross routers, the only way the number of sites could be an issue were if you were trying to run a flat network.&lt;BR /&gt;&lt;BR /&gt;so on the surface at least it would seem that enabling STP wouldn't be that big a deal?</description>
      <pubDate>Wed, 28 Sep 2005 11:50:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928628#M26776</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-09-28T11:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928629#M26777</link>
      <description>No...unless it breaks some sort of novell login...again, I believe RSTP is the fix for this.&lt;BR /&gt;&lt;BR /&gt;Is implementation pretty straightforward?&lt;BR /&gt;&lt;BR /&gt;Are KNOWN uplink ports the only ones we need identify? is there a way to automatically identify?&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Sep 2005 12:04:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928629#M26777</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-28T12:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928630#M26778</link>
      <description>this may be getting a bit beyond the scope ofthe thread - ifyou want to switch to email - rick.jones2@hp.com.&lt;BR /&gt;&lt;BR /&gt;anyway, i was meaning to ask about that STP broke novell login bit - do you have details of exactly how novell login cared about spanning tree?</description>
      <pubDate>Wed, 28 Sep 2005 12:08:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928630#M26778</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-09-28T12:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Locating unauthorized, unmanaged hubs?</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928631#M26779</link>
      <description>E-mail sent, closing thread.</description>
      <pubDate>Wed, 28 Sep 2005 12:10:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/locating-unauthorized-unmanaged-hubs/m-p/4928631#M26779</guid>
      <dc:creator>Preston Gallwas</dc:creator>
      <dc:date>2005-09-28T12:10:59Z</dc:date>
    </item>
  </channel>
</rss>

