If you mean home/office router, it is not Cisco for a long time. It is a reference designs of used ICs and other components glued together in some China company routed on China PCBs, soldered on China factories, flashed with China firmware made with reference SDKs and packed into China enclosures with Cisco(Lnksys) logo on the top.
Enterprise routers was sligtly different, but I'm afraid that there is no any difference anymore. You could be surprised, but there exist a factories that makes Cisco enterprise grade switches and routers (like Cisco 2911R) right in Russia (2 factories in Zelenograd and Tver), but it mostrly assembly lines and the products are only for Russian market.
Hopefully, nearly all Cisco/Lynksys Home/Office routers easily reflashed with OpenWRT Linux distribution and you could get rid of factory firmware crap without any significant problems and get the control over your property back. But in that case there is no any sense to buy Cisco branded China routers, you could just buy any similar openly Chineese router like TP-Link, install OpenWRT and get the same result for less money.
thanks for your response, no this was an enterprise router sold to a large transportation co. the actual problem isn’t software, it’s a pin sized microchip installed on a cpu. you can’t “uninstall” it, you can only burn it off, physically.
3945
*add remark: it was likely the voice card that was installed that was generating the odd traffic, i only took a couple of forensic classes but the professors were useless, didn’t actually have real world experience.
Strange, it is simple old model, may be IOS was hacked? It's old thing, I see nothing impossible in existence of known vulnerabilites in that devices. Check CVEs on your IOS version, may be you'll find something.
If you mean home/office router, it is not Cisco for a long time. It is a reference designs of used ICs and other components glued together in some China company routed on China PCBs, soldered on China factories, flashed with China firmware made with reference SDKs and packed into China enclosures with Cisco(Lnksys) logo on the top.
Enterprise routers was sligtly different, but I'm afraid that there is no any difference anymore. You could be surprised, but there exist a factories that makes Cisco enterprise grade switches and routers (like Cisco 2911R) right in Russia (2 factories in Zelenograd and Tver), but it mostrly assembly lines and the products are only for Russian market.
Hopefully, nearly all Cisco/Lynksys Home/Office routers easily reflashed with OpenWRT Linux distribution and you could get rid of factory firmware crap without any significant problems and get the control over your property back. But in that case there is no any sense to buy Cisco branded China routers, you could just buy any similar openly Chineese router like TP-Link, install OpenWRT and get the same result for less money.
thanks for your response, no this was an enterprise router sold to a large transportation co. the actual problem isn’t software, it’s a pin sized microchip installed on a cpu. you can’t “uninstall” it, you can only burn it off, physically.
Could you name a router model?
3945 *add remark: it was likely the voice card that was installed that was generating the odd traffic, i only took a couple of forensic classes but the professors were useless, didn’t actually have real world experience.
Strange, it is simple old model, may be IOS was hacked? It's old thing, I see nothing impossible in existence of known vulnerabilites in that devices. Check CVEs on your IOS version, may be you'll find something.