Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
178 Vulnerability ManageMent
If a network tap is used instead of the port mirroring function, then
only a limited amount of traffic may be visible to the device. is is
because not all devices are exchanging packets with devices outside of
their own network segment. When port mirroring is used on a switch,
all packets from all members of a particular network segment can be
copied to the analyzer. A network tap is used on a single network
cable to observe whatever may pass by but the conversations between
two devices on the same network would remain unobserved.
It is possible through some creative network configuration to over-
come this problem within limits. e mirroring solution is limited in
the completeness of traffic that can be examined b
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512