The Protocols window is also a good way to optimize your network. List to block that unwanted traffic from clogging up your network.Īfter it's blocked, you should see a drastic drop in the traffic Lists, add the suspect address to the incoming filter rule set or Access Third-party firewall solution, such as a Cisco PIX firewall or Access Should your network not employ IP Tables, but instead it uses a You can end this problem by blocking the domain from entering yourīlocking the offensive address is as simple as adding the suspect address to an input IP Tables chain like this. You see that the vast amount of WWW traffic is hitting one of yourīackup Web servers and that traffic is coming from one specific domain. You open the Protocols window and confirm that WWW is racking When you fire up EtherApe, you see a Web of You can use EtherApe to check on the traffic that's moving Suppose your network becomes extremely slow, and you have no Protocols window is a great tool to use for troubleshooting your The Protocol window keeps a running total of each type of packet that traverses your network. You need to know more about the traffic passing on your network, youįrom the View drop-down menu, select Protocols to open the Protocols window ( Figure B). Figure A lists both the destination (192.168.1.3) and the Only the type and relative size of traffic, but also the source of the Of the SSH connection (shown in light blue). That the WWW connection (shown in red) is approximately twice the size As trafficĬomes in, the amount of traffic is represented by the size of the lines You'll notice that the display immediately becomes dynamic. Primary traffic displayed is WWW, SSH, and SMTP, because I host Web andĮ-mail servers, and I use secure shell for remote administration. There is traffic actively passing through your network. You start EtherApe, you may or may not see traffic depending on whether When you open EtherApe, you'll see a window much like the one shown in Figure A.ĮtherApe can track many types of network traffic. Once you've installed the application, run EtherApe by typing etherape at the command prompt. The second installation method, from rpm, requires the RPM file and is installed by root using the following command: The first way is to install from the source code, which requires the source tarball file and is compiled and built by root using the following commands: GNOME, which is also available from the GNOME site.Libglade, which is available from the GNOME site.GTK+, which is available from the GTK+ site.The Libpcap packet capture library, which is available from the Lawrence Berkeley National Laboratory.In this Daily Drill Down, I will show you how to get EtherApe up and running and how to customize it to fit your needs.ĮtherApe is installed within the Linux operating system and requires: IP and TCP modes supports Ethernet, FDDI, PPP, and slip devices įilters traffic and reads traffic from both a tcpdump file and live from the network. Network monitor, EtherApe offers a dynamic graphical interface features Option for monitoring your network’s data traffic. The EtherApe network monitor is a midrange Learn how to install, configure, and use this monitoring tool However, the open source community has a free solution,ĮtherApe. Network monitors are invaluable tools to administrators but can beĬostly.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |