F5F Stay Refreshed Power Users Networks Find the network host location

Find the network host location

Find the network host location

Pages (2): Previous 1 2
B
boriagot
Member
112
01-14-2023, 01:11 AM
#11
I possess the IP addresses, but the sole MAC is from the forwarding gateway—the interface of our core router. It seems to reside in a separate broadcast domain, causing the original MAC to disappear each time it reaches another LAN segment. The logs from IDS/IPS, the firewall, and my sinkhole only capture DNS queries that fail to register the device name with our DHCP. What remains are just RFC1918 addresses and the domain it’s trying to resolve, which has been normal traffic for Microsoft and NSCI servers during that period. The IP appears largely irrelevant because the subnet it uses doesn’t exist in my setup.
B
boriagot
01-14-2023, 01:11 AM #11

I possess the IP addresses, but the sole MAC is from the forwarding gateway—the interface of our core router. It seems to reside in a separate broadcast domain, causing the original MAC to disappear each time it reaches another LAN segment. The logs from IDS/IPS, the firewall, and my sinkhole only capture DNS queries that fail to register the device name with our DHCP. What remains are just RFC1918 addresses and the domain it’s trying to resolve, which has been normal traffic for Microsoft and NSCI servers during that period. The IP appears largely irrelevant because the subnet it uses doesn’t exist in my setup.

F
FrankenDaemon
Member
59
01-14-2023, 08:07 PM
#12
Are there any virtual interfaces or IP addresses set up accidentally in the forwarding gateway?
F
FrankenDaemon
01-14-2023, 08:07 PM #12

Are there any virtual interfaces or IP addresses set up accidentally in the forwarding gateway?

R
RoyalBubble
Junior Member
15
01-15-2023, 06:25 AM
#13
Yes, you may share the logs without personal details.
R
RoyalBubble
01-15-2023, 06:25 AM #13

Yes, you may share the logs without personal details.

_
173
01-19-2023, 01:31 PM
#14
The forwarding interface lacks virtual interfaces, but the ingress interface does. I’m unable to provide any logs due to restrictions. The data I have includes only IP, MAC addresses and DNS query details from the sinkhole, which isn’t much beyond that. I’m sorry for the inconvenience!
_
_The_Aquarius_
01-19-2023, 01:31 PM #14

The forwarding interface lacks virtual interfaces, but the ingress interface does. I’m unable to provide any logs due to restrictions. The data I have includes only IP, MAC addresses and DNS query details from the sinkhole, which isn’t much beyond that. I’m sorry for the inconvenience!

T
TahPie
Junior Member
15
01-27-2023, 01:16 AM
#15
You're confirming MPLS usage, but I need to clarify whether you're operating the cloud-based MPLS or managing your own infrastructure. Could you specify if it's a VPLS, VLL, or another type?
T
TahPie
01-27-2023, 01:16 AM #15

You're confirming MPLS usage, but I need to clarify whether you're operating the cloud-based MPLS or managing your own infrastructure. Could you specify if it's a VPLS, VLL, or another type?

G
Giulio_Luca
Junior Member
13
02-03-2023, 12:49 PM
#16
That's clear, I get it. I handle some isolated networks and share similar challenges. I enjoy the detective work, though I wish I could be there to follow those devices directly. It seems they're using Windows-based systems, which is generating a lot of network activity. No junior IT staff at the remote locations?
G
Giulio_Luca
02-03-2023, 12:49 PM #16

That's clear, I get it. I handle some isolated networks and share similar challenges. I enjoy the detective work, though I wish I could be there to follow those devices directly. It seems they're using Windows-based systems, which is generating a lot of network activity. No junior IT staff at the remote locations?

X
xXOMGItsLinkXx
Junior Member
45
02-09-2023, 05:34 PM
#17
I usually enjoy digging into any kind of investigation, but these days it tends to move up the chain a bit. This is the first task I’ve managed on my own lately because of other busy projects. It’s basically about a Windows device making noise that caught my interest. Our field support crew just got three new green engineers on the job, and I’ve already prepared my usual “this network isn’t your playground” comment. I’m still a bit unsure, but I have some surprise posture checks coming up next week to confirm their reports. We’ll find out what happens then.
X
xXOMGItsLinkXx
02-09-2023, 05:34 PM #17

I usually enjoy digging into any kind of investigation, but these days it tends to move up the chain a bit. This is the first task I’ve managed on my own lately because of other busy projects. It’s basically about a Windows device making noise that caught my interest. Our field support crew just got three new green engineers on the job, and I’ve already prepared my usual “this network isn’t your playground” comment. I’m still a bit unsure, but I have some surprise posture checks coming up next week to confirm their reports. We’ll find out what happens then.

K
Kaiya_Saphira
Junior Member
7
02-09-2023, 09:58 PM
#18
A properly executed 802.1X setup places minimal strain and likely saved you a lot of time. A centralized syslog server would also be beneficial, allowing logs to be sent to Greylog for full indexing and easy searching of useful data. However, these solutions aren't very helpful right now since we can't implement tools to assist further. What's going on here? Shouldn't you be able to trace each forwarding device through ARP tables as it happens? It seems unusual that you can't do that or at least narrow down the network segment. With the details you have about your network and routing tables, is there a more probable source segment? Would every segment permit this source IP to reach the destination, or would it be redirected elsewhere based on its origin? Often it's simpler to rule out impossible paths before proceeding.
K
Kaiya_Saphira
02-09-2023, 09:58 PM #18

A properly executed 802.1X setup places minimal strain and likely saved you a lot of time. A centralized syslog server would also be beneficial, allowing logs to be sent to Greylog for full indexing and easy searching of useful data. However, these solutions aren't very helpful right now since we can't implement tools to assist further. What's going on here? Shouldn't you be able to trace each forwarding device through ARP tables as it happens? It seems unusual that you can't do that or at least narrow down the network segment. With the details you have about your network and routing tables, is there a more probable source segment? Would every segment permit this source IP to reach the destination, or would it be redirected elsewhere based on its origin? Often it's simpler to rule out impossible paths before proceeding.

B
ByDark_Dragon
Junior Member
11
02-09-2023, 11:40 PM
#19
Sorry for the delay, but I just reviewed the post here, @Tzomb1e. You need to set up DHCP relay with option 82 on the server, ensuring every static address is covered. Option 82 works by encapsulating switch/router TLV data directly to the server. This method acts as a sudo authentication and provides precise details about any malicious device. The DHCP records every lease, linking it to the switch/router hostname, IP, VLAN and port. This simplifies tracking DHCP clients since the lease reveals the exact device and port. As an ISP, we must comply with legal requirements for this level of tracking to verify authentication and protect customers. While better software options exist, I haven’t pursued that path yet. For static devices, dot1x tracking is essential and unavoidable.
B
ByDark_Dragon
02-09-2023, 11:40 PM #19

Sorry for the delay, but I just reviewed the post here, @Tzomb1e. You need to set up DHCP relay with option 82 on the server, ensuring every static address is covered. Option 82 works by encapsulating switch/router TLV data directly to the server. This method acts as a sudo authentication and provides precise details about any malicious device. The DHCP records every lease, linking it to the switch/router hostname, IP, VLAN and port. This simplifies tracking DHCP clients since the lease reveals the exact device and port. As an ISP, we must comply with legal requirements for this level of tracking to verify authentication and protect customers. While better software options exist, I haven’t pursued that path yet. For static devices, dot1x tracking is essential and unavoidable.

Pages (2): Previous 1 2