Cisco Sniffing
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
The rule detects configuration or modification of monitor, SPAN, or RSPAN sessions on a Cisco device, potentially indicating sniffing or surveillance activity.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_CISCO_SPAN_RSPAN_CONFIGURATION" select Action1.HOSTNAME,Action1.TYPESOURCE,Action1.TYPEFACILITY,Action1.INTERFACE,Action1.COMMANDEXECUTED,Action1.USERNAME,Action1.MESSAGE
Detection
Execution Mode
realtime
Log Sources
Cisco
Author
Austin Clark


