Help me understand something:
if we are using switches, we should ONLY see traffic on any given port that is either a) unicast to the address(es) serviced on that port, b) broadcast within the VLAN that port belongs to or c) generated by equipment attached to that specific port.
So if I'm tacking a packet trace, even if my nic is promiscuous I should not see for example, traffic specifially bound from one server to another when the port I'm tracing is a workstation, would that not be correct?
I set up a session with the source being a workstation, and the destination being my laptop, ran ethereal and started trapping and I'm seeing all kinds of stuff I just don't think should be copied out to the source switch port...
if we are using switches, we should ONLY see traffic on any given port that is either a) unicast to the address(es) serviced on that port, b) broadcast within the VLAN that port belongs to or c) generated by equipment attached to that specific port.
So if I'm tacking a packet trace, even if my nic is promiscuous I should not see for example, traffic specifially bound from one server to another when the port I'm tracing is a workstation, would that not be correct?
I set up a session with the source being a workstation, and the destination being my laptop, ran ethereal and started trapping and I'm seeing all kinds of stuff I just don't think should be copied out to the source switch port...