2015. 5. 30. 09:12

Network Tools 

설치 해 봐할 툴... 

출처: http://www.ciokorea.com/slideshow/22430?slide=1#stage_slide 

하나씩 설치하면서 사용법을 정리해야겠다.

  1. 캑티(Cacti)
  2. 나기오스(Nagios)
  3. 이싱가(Icinga)
  4. 네디(NeDi)
  5. 옵저비움(Observium)
  6. 자빅스(Zabbix)
  7. 니톱(Nitop)

* New Relic


Posted by 노을지기
2011. 2. 1. 03:23
출처: http://ji80903.tistory.com/359

[출처] : http://onlybible.tistory.com/69

서버의 넷마스크 설정시 or x.x.x.x/25 이런씩으로 설정할때가
아래 부분을 기억한다면 쉽게 계산을 할 수가 있습니다.             =        11111111.11111111.11111111.00000000        24비트         =        11111111.11111111.11111111.10000000        25비트         =        11111111.11111111.11111111.11000000        26비트         =        11111111.11111111.11111111.11100000        27비트         =        11111111.11111111.11111111.11110000        28비트         =        11111111.11111111.11111111.11111000        29비트         =        11111111.11111111.11111111.11111100        30비트         =        11111111.11111111.11111111.11111110        31비트         =        11111111.11111111.11111111.11111111        32비트

와 같이 클래스를 구분할 수 있습니다.

- Network 계산 표

호스트수         Netmask             Bitmask
254                   24
128                25
64                 26
32                 27
16                 28
8                   29
4                  30
2                  31
1                  32

마지막이 제일 중요한듯...

내가 쓰는 것이 이니, 4개의 호스트가 가능하군..ㅋ

Posted by 노을지기

Configuring the Juniper Firewall Traffic Log (Policy Log)
Problem or Goal:

Juniper Firewalls provide traffic logs to monitor and record the traffic that policies permit across the firewall. A traffic log notes the following elements for each session:
  • Date and time that the connection started
  • Source address and port number
  • Translated source address and port number
  • Destination address and port number
  • The duration of the session
  • The service used in the session

To log all traffic that a Juniper firewall device receives, you must enable the logging option for all policies.

To log specific traffic, enable logging only on policies that apply to that traffic.

The firewall generates logs when sessions end.  However beginning with ScreenOS 5.2.0 and above, you also have the option to start logging at session initiation.  Logging at session init will not show duration but it can be useful for troubleshooting purposes. 

Note: There are three ways to view the logs:

To configure the Juniper Firewall Traffic Log, perform the following steps:

Step one: Open the WebUI. For assistance, see KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI.

Step two: From the ScreenOS options menu, click Policies.

Image of step two

Step three: In the From drop-down menu, select the desired From and To zones.  For example, in the From drop-down menu, click to select Trust. In the To drop-down menu, click to select Untrust.

Image of step three and four

Step four: Click New or Edit.

Step five:  Click to select Logging.

step five

By checking the first box, the security device generates logs when sessions end. By checking the 'at Session Beginning', the security device generate logs when sessions start. If both are selected, you will get both entries.

Step six:   Click OK.

Note: You can view traffic logs stored in flash storage on the Juniper firewall device through either the CLI or WebUI. You may also open or save the file to the location you specify, and then use an ASCII text editor (such as Notepad or WordPad) to view the file. Alternatively, you can send them to an external storage space, or include traffic logs with event logs sent by email to an administrator. To view the traffic logs through the WebUI, perform the following:

Step seven:   To view the Traffic Logs from the ScreenOS options menu, click Reports, and then select Policies.  To view the Traffic Logs from the CLI, enter the command get log traffic <options>.

Related Links:
Posted by 노을지기
네트워크 스캐닝 툴이다.
출처: http://kraulife.tistory.com/22



diamondcs port explorer


Posted by 노을지기

Objects > Addresses > List > New: Enter the following, then click OK:
Address Name: addr_1
IP Address/Domain Name:
IP/Netmask: (select),
Zone: Untrust

Posted by 노을지기
이전버튼 1 2 이전버튼