Hi lads,
I'm about to embark on a security review/implementation for a mid sized orgaisation next week. I have an extensive template
for both layer 2 and layer 3 devices and have researched a fair amount of detail on each . Here's my question though.
after I implement the changes if there any way of checking that the changes haven't had any adverse effect on the network as a whole, instead of having to wait for the phone to ring.
I know nmap is a good network reconnaissance tool that should output good information . Just wondering if any of ye guys use a similar process .
Thank alot
Kevin
I'm about to embark on a security review/implementation for a mid sized orgaisation next week. I have an extensive template
for both layer 2 and layer 3 devices and have researched a fair amount of detail on each . Here's my question though.
after I implement the changes if there any way of checking that the changes haven't had any adverse effect on the network as a whole, instead of having to wait for the phone to ring.
I know nmap is a good network reconnaissance tool that should output good information . Just wondering if any of ye guys use a similar process .
Thank alot
Kevin