You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a network administrator, I want to use cabestan to inventories the devices on my network from a network scan
Solution
Using nmap we can scan an IP range, identify some information about devices behind the IP address.
Feature 1 : Host discovery
Doc :https://nmap.org/book/host-discovery.html
Scan a range of IPs to list the IP identifying a running device. This let us gather a list of address that can be used to call running devices connected to the network. As IP might change over time, they shouldn't be used to identify a device.
MAC address are unique identifier for device ethernet interfaces. They could be used in our case as :
a primary key to identify a device. /!\ (1) MAC address could be manually modified even if it is highly unlikely (2) Several MAC addresses can identify one device with several Ethernet interfaces
a way to determine network physical interface vendors
Nmap can tag a device in the network with a type according to it's matching algorithm. The list of device types can be found in the doc.
This could be useful to characterize the device.
Problem
As a network administrator, I want to use cabestan to inventories the devices on my network from a network scan
Solution
Using
nmap
we can scan an IP range, identify some information about devices behind the IP address.Feature 1 : Host discovery
Doc : https://nmap.org/book/host-discovery.html
Scan a range of IPs to list the IP identifying a running device. This let us gather a list of address that can be used to call running devices connected to the network. As IP might change over time, they shouldn't be used to identify a device.
Feature 2 : MAC detection
Doc: https://nmap.org/book/firewall-subversion.html#defeating-firewalls-mac-spoofing
MAC address are unique identifier for device ethernet interfaces. They could be used in our case as :
Feature 3 : Remote OS Detection
Doc : https://nmap.org/book/osdetect.html
This feature allows us to detect which OS the device is running on.
This could be very useful to characterize the device.
Feature 4 : Device type
Doc : https://nmap.org/book/osdetect-device-types.html
Nmap can tag a device in the network with a type according to it's matching algorithm. The list of device types can be found in the doc.
This could be useful to characterize the device.
Feature 5 : Application and services
Doc : https://nmap.org/book/vscan.html
This feature allows us to inventories some services reachable over the network. It can be used to :
Limits
The text was updated successfully, but these errors were encountered: