If the Linksys devices are DHCP clients themselves, you might be able to use DHCPFingerprint to locate them when they renew their leases. You may want to contact the folks at http://www.packetfence.org. They may have a more comprehensive list of signatures. Also, nmap may work, see http://seclists.org/lists/nmap-dev/2003/Apr-Jun/0010.html for more details. Examining TTLs of packets coming from edge devices may also give you some indication of who's sitting behind an extra hop, though some folks may be savvy enough to tweak this on their workstations to avoid detection. Good luck. On 8/25/05, Martin Mkrtchian <dotsecure@xxxxxxxxx> wrote: > Dear Group Members > > We are migrating from Lucent QIP to MetaIP for DHCP services and so > far we have had two issues when MetaIP has been implemented for VLAN > that has an unauthorized Linksys router giving out IP addresses. > > Is there a scanning tool out there that can determine if there are > unauthorized Linksys (type) routers in a specific VLAN? > > Your input is appreciated > > Thank You > > Martin M > http://dotsecure.blogspot.com > -- Dave Hull ireadit@xxxxxxxxx