[157556] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Network scan tool/appliance horror stories

daemon@ATHENA.MIT.EDU (Justin M. Streiner)
Mon Oct 29 15:25:21 2012

Date: Mon, 29 Oct 2012 15:25:08 -0400 (EDT)
From: "Justin M. Streiner" <streiner@cluebyfour.org>
To: "nanog@nanog.org" <nanog@nanog.org>
In-Reply-To: <7EF4A8B03B0A3A44858C8B42E0DB236A0121BCA40E2B@PHX-52N-EXM04A.lcc.usairways.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Mon, 29 Oct 2012, Pedersen, Sean wrote:

> We're evaluating several tools at the moment, and one vendor wants to 
> dynamically scan our network to pick up hosts - SNMP, port-scans, WMI, 
> the works. I was curious if anyone had any particularly gruesome horror 
> stories of scanning tools run amok.

If you have any overloaded/under-powered network gear, such as stateful 
firewalls and routers that do lots of NAT, you might find them very 
quickly, depending on how aggressive the scanning tool is.  There might 
also be devices out there that, while possibly lightly loaded, can reach 
some minimally documented resource threshold under a very aggressive scan, 
and subsequently tip over.

Also, if you're doing IPv6, the performance metrics for many network 
devices can be a bit more of a moving target.

jms


home help back first fref pref prev next nref lref last post