You did not really tell us what was insuffent about the traffic programs mentioned
earlier - mrtg , iptraf, ipfm, etheral.
These kind of tools - especially mrtg - go out to an snmp enabled device and ask it
its stats. If you want to see this snmp stuff more directly - pull down the ucd snmp
tools. You are going to want the snmpwalk command - and your usage will look a bit
like this (where 192.168.1.1 is the ip of the snmp managed device)
/usr/bin/snmpwalk 192.168.1.1 public >/home/httpd/html/mrtg/netopia_snmpwalk.txt
Snmpwalk and other tools are contained in these packages:
ucd-snmp-4.1.1-2.i386.rpm
ucd-snmp-devel-4.1.1-2.i386.rpm
ucd-snmp-utils-4.1.1-2.i386.rpm
btw - webalizer and analog are great free programs to analize web traffic but are not
so good for network traffic. A webmaster wants to know how often the webserver is
being 'hit' and wants to know what people are looking at and who they might be.
If what you were looking for needs to scoop up and keep all network traffic and then
analyze it - that kind of tool gets expensive. There are some linux tools that can
scoop up traffic,(dumptool comes to mind - but I have not used it) but as far as I
know it does not analyze the traffic and they are a bit tough to use. Perhaps you
will write one for us?
When I was doing this kind of thing we liked the network general sniffers, but they
were about $8000 each too. And if you buy one you should take their expensive class
as well. This kind of tool will scoop up all the traffic and run a rule based expert
system over the traffic and will warn you about problems. It will generate nice
traffic graphs. You then can drill down through the protocol stack if necessary. It
would be great to do this at home 'kids' but the entry cost is rather steep.
A step down from a sniffer is something like 3com's Transend software package and the
RMON probes in equipment. I have forgotton the name of Cisco's equivelant product.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]