At present, trusted clients are allowed access on the switch/router based on IP/MAC. However, these can be easily spoofed. Implement a solution which uses modified TCP/IP protocol stack in order to identify trusted clients at switch/router level. Subsequently solution should restrict network access based on this identification.
Notes: Participants should use their own hardware like switch, router, PC etc. to demonstrate their solution. Use any open source switch firmware if the solution involves modifying firmware of the switch to understand customised TCP/IP.
Sample Data Required: No