2015. 5. 30. 09:12

Network Tools 

설치 해 봐할 툴... 

출처: http://www.ciokorea.com/slideshow/22430?slide=1#stage_slide 

하나씩 설치하면서 사용법을 정리해야겠다.

  1. 캑티(Cacti)
  2. 나기오스(Nagios)
  3. 이싱가(Icinga)
  4. 네디(NeDi)
  5. 옵저비움(Observium)
  6. 자빅스(Zabbix)
  7. 니톱(Nitop)

* New Relic

http://newrelic.com/application-monitoring/features

Posted by 노을지기
2011. 2. 1. 03:23
출처: http://ji80903.tistory.com/359

[출처] : http://onlybible.tistory.com/69

서버의 넷마스크 설정시 255.255.255.128 or x.x.x.x/25 이런씩으로 설정할때가
있습니다.
아래 부분을 기억한다면 쉽게 계산을 할 수가 있습니다.


255.255.255.0             =        11111111.11111111.11111111.00000000        24비트
255.255.255.128         =        11111111.11111111.11111111.10000000        25비트
255.255.255.192         =        11111111.11111111.11111111.11000000        26비트
255.255.255.224         =        11111111.11111111.11111111.11100000        27비트
255.255.255.240         =        11111111.11111111.11111111.11110000        28비트
255.255.255.248         =        11111111.11111111.11111111.11111000        29비트
255.255.255.252         =        11111111.11111111.11111111.11111100        30비트
255.255.255.254         =        11111111.11111111.11111111.11111110        31비트
255.255.255.255         =        11111111.11111111.11111111.11111111        32비트


와 같이 클래스를 구분할 수 있습니다.

- Network 계산 표

호스트수         Netmask             Bitmask
254                 255.255.255.0            24
128                 255.255.255.128         25
64                  255.255.255.192         26
32                  255.255.255.224         27
16                  255.255.255.240         28
8                    255.255.255.248         29
4                   255.255.255.252         30
2                   255.255.255.254         31
1                   255.255.255.255         32

마지막이 제일 중요한듯...

내가 쓰는 것이 255.255.255.252 이니, 4개의 호스트가 가능하군..ㅋ

Posted by 노을지기
http://kb.juniper.net/InfoCenter/index?page=content&id=KB4214&actp=search&viewlocale=en_US&searchid=1296236314942

Summary:
Configuring the Juniper Firewall Traffic Log (Policy Log)
Problem or Goal:

Solution:
Juniper Firewalls provide traffic logs to monitor and record the traffic that policies permit across the firewall. A traffic log notes the following elements for each session:
  • Date and time that the connection started
  • Source address and port number
  • Translated source address and port number
  • Destination address and port number
  • The duration of the session
  • The service used in the session

To log all traffic that a Juniper firewall device receives, you must enable the logging option for all policies.

To log specific traffic, enable logging only on policies that apply to that traffic.

The firewall generates logs when sessions end.  However beginning with ScreenOS 5.2.0 and above, you also have the option to start logging at session initiation.  Logging at session init will not show duration but it can be useful for troubleshooting purposes. 

Note: There are three ways to view the logs:

To configure the Juniper Firewall Traffic Log, perform the following steps:

Step one: Open the WebUI. For assistance, see KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI.


Step two: From the ScreenOS options menu, click Policies.

Image of step two

Step three: In the From drop-down menu, select the desired From and To zones.  For example, in the From drop-down menu, click to select Trust. In the To drop-down menu, click to select Untrust.

Image of step three and four

Step four: Click New or Edit.

Step five:  Click to select Logging.


step five

By checking the first box, the security device generates logs when sessions end. By checking the 'at Session Beginning', the security device generate logs when sessions start. If both are selected, you will get both entries.

Step six:   Click OK.

Note: You can view traffic logs stored in flash storage on the Juniper firewall device through either the CLI or WebUI. You may also open or save the file to the location you specify, and then use an ASCII text editor (such as Notepad or WordPad) to view the file. Alternatively, you can send them to an external storage space, or include traffic logs with event logs sent by email to an administrator. To view the traffic logs through the WebUI, perform the following:

Step seven:   To view the Traffic Logs from the ScreenOS options menu, click Reports, and then select Policies.  To view the Traffic Logs from the CLI, enter the command get log traffic <options>.

Purpose:
Troubleshooting
Related Links:
Posted by 노을지기
네트워크 스캐닝 툴이다.
출처: http://kraulife.tistory.com/22

(H)Tcpview
http://technet.microsoft.com/en-us/sysinternals/bb897437

nmap
http://nmap.org/download.html

diamondcs port explorer
http://download.cnet.com/DiamondCS-Port-Explorer/3000-2085_4-10191769.html

http://www.nirsoft.net/

http://www.wireshark.org/
Posted by 노을지기

Objects > Addresses > List > New: Enter the following, then click OK:
Address Name: addr_1
IP Address/Domain Name:
IP/Netmask: (select), 10.2.2.5/32
Zone: Untrust


Posted by 노을지기
이전버튼 1 2 이전버튼