9/19/2023 0 Comments Ssh copy files from untangle to pc![]() ![]() ![]() If you have a lot of machines you will want to set Spiceworks to only scan the wireless range if that is where the problem is to limit the time it takes to scan.Īnother option you could look into is WireShark. That will let you tie the IP to the machine name. Set it up to scan very frequently (every 5 or 10 minutes should do) so it will discover new devices quickly as they are connected to the network. Spiceworks will be your best bet for that for getting a name for the PC. You could set up Untangle to authenticate through your domain which you likely don't want to do since this is a public access system. (You might get the MAC address via the syslog if you bump up the detail, not sure though) Now - is there a way to set Untangle to see netbios name and MAC addresses? This was Cisco designed - as stupidly designed as it is. That means any laptop that has wireless capability can get an ip number to connect to the Internet. We are a public library system and we have free wireless internet access as one of our services. What might have been better when it was set up is one thing, but I have to work with how it is set up now. Ok don't know what ACL is? That's number one. These things can be difficult to setup and use for a novice but if you are interested I would be glad to answer questions and point out how to's for you. There is a free program called Splunk that you can install on a workstation and will act as a syslog server and has a nice search interface dig through all the data to find what you need. Untangle has syslog capabilities as well and will give you much more detail than you get from the reports. ![]() (To be sure, it would help if we knew the model numbers of the Cisco equipment.) The syslog server can be a simple workstation (your PC perhaps) that is left on all the time. The Cisco devices should be able to generate syslog messages and send them to a server you setup. There is no log on the Cisco device so I can't compare the report against anything-very expensive equipment that does very little of what I need. But, I won't know that there is hacking going on til I read the report generated by Untangle the next day which will give the IP number that the controller assigns the hacker's laptop. I can see the wireless customer's MAC and the IP number given him in the controller at the time he is actually using our network. This is confusing, I hope that I have explained it there. So, setting up just the computers that I know the MAC numbers for would not work for us - sorry but I appreciate the help. Cisco Controller acts as DHCP using a small portion of our IP numbers for our wireless customers. We have set up through Cisco controllers a wireless network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |