FAQ |
Kalender |
![]() |
#1 | |||
|
||||
Flitig postare
|
Jag har en FreeBSD server, där jag vill övervaka alla IP:s trafik för sig själv.
Hur ska jag göra för att få ut trafik statistik för sig själv på alla IP nummer burken har? Tack på förhand. |
|||
![]() |
![]() |
![]() |
#2 | ||
|
|||
Medlem
|
Kör igång en snmp-demon och släng in PRTG på valfri windowsburk.
Sen kan du övervaka alla nätverkskort(IPs) och se trafiken i realtid. |
||
![]() |
![]() |
![]() |
#3 | ||
|
|||
Nykomling
|
Ett snabbt sätt att kolla all mysig fakta om dina besökare är att använda gratis tjänsten extreme tracking.
För resultat kan du kolla min sida ; 81.232.82.202 aka www.linuxgamerz.com och länkarna längst ner. ![]() |
||
![]() |
![]() |
![]() |
#4 | |||
|
||||
Medlem
|
Vi kör ipfm för att logga den typen av data, men finns givetvis ett antal olika tillvägagångssätt. Ta en titt på http://arkiv.freebsd.se/?ml=freebsd-...04-06&t=287694 för lite andra idéer!
|
|||
![]() |
![]() |
![]() |
#5 | |||
|
||||
Flitig postare
|
Tack för tipsen, ska checka igenom dom och se hur det löser sig.
|
|||
![]() |
![]() |
![]() |
#6 | ||
|
|||
Har WN som tidsfördriv
|
Ethereal är inte så dumt heller om du vill titta på trafiken i realtid. Annars skulle jag precis som dmdpageup köra snmp
|
||
![]() |
![]() |
![]() |
#7 | |||
|
||||
Medlem
|
http://www.wireshark.org/
Wireshark: Sniffing the glue that holds the Internet together Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences). http://www.snort.org/ Snort: A Everyone's favorite open source IDS This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts. Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort. |
|||
![]() |
![]() |
Svara |
|
|