heck What the is wrong with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA

Size: px
Start display at page:

Download "heck What the #%!@ is wrong with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA"

Transcription

1 heck What the is wrong ^ with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA 1

2 Agenda Intro to Monitoring Nagios Install/Config Usage Custom plugins Internet protocols 101 SMTP IMAP HTTP Packet sniffing for dummies Intro to Troubleshooting Tools telnet, openssl grep, sed ps, lsof, netstat 2

3 MONITORING 3

4 Automated Monitoring Workflow 4

5 Monitoring Packages: Open Source Pandora FMS Opsview Core Naemon Captialware ServerStatus Core Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 5

6 Monitoring Packages: Commercial Nagios XI Groundwork PRTG network monitor CopperEgg WhatsUp Gold PRTG network monitor op5 (Naemon) All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 6

7 Why Automatic Service Monitoring? Spot small problems before they become big ones Learn about outages before your users do Checklist when restoring from a power outage Gives you better problem reports than users Problems you might never spot otherwise Failed HDDs in RAIDs Full /var partitions Logs not rotating System temperature rising 7

8 Why Automatic Service Monitoring? Capacity planning Performance data can generate graphs of utilization RAM, Disk, etc. Availability reports - CAUTION Easy to generate -- even easier to generate wrong Make sure your configurations actually catch problems Will also include problems with Nagios itself :( If you re going to quote your availability numbers (SLAs, etc.) make sure you understand what you re actually monitoring. 8

9 Without Monitoring With Monitoring! The Internet s down - fix it!!! dhcp out of leases dhcp server down dns server not responding ethernet switch down ISP link down / saturated 9

10 Without Monitoring With Monitoring! ZOMG! Our web site is down! O Noes!!! connectivity issues web server down apache not running web server disk full server load too high 10

11 Nagios Open source host / service monitoring package Nagios Ain't Gonna Insist On Sainthood Originally released in 1999 as NetSaint Available in 2 versions: Core and XI Nagios Core: Open-source, freely available Nagios XI: Commercial Free license for up to 7 hosts Available as source installer or VMware appliance 11

12 Terminology Host - A logical (physical / virtual) machine running an OS Service - A resource available on a host Network service (www, dns, imap) Local resource (free RAM, disk space, system load) Plugin - An executable that checks something Add-on - An extension to Nagios that adds functionality Graphing, Trending, SNMP trap reporting, etc. 12

13 What s a plugin? Plugins actually run the service or host checks. Each plugin monitors a different type of service Data from plugin is communicated to Nagios using a (very) simple API Plugins can also report Performance Data (perfdata) to be graphed or tracked Requires a perfdata add-on (or Nagios XI) Plugins can be written in any language Perl plugins can run using Nagios s embedded perl interpreter for increased performance 13

14 INSTALLING NAGIOS 14

15 A word of caution... Installing Nagios on Linux is much easier than Mac. While most Linux distros are still shipping Nagios 3.5.x, they usually come with all the pre-requisite packages available via their native package managers. This makes it much easier to build 4.x from source. Small to medium environments don t require much of a server to run Nagios. Mac installations will require you to install numerous prerequisites, especially for the plug-ins. Many of the pre-reqs can be installed using MacPorts, Homebrew and cpan. If you can run on Linux, do it. 15

16 About Nagios Replacements When Nagios went commercial, the open-source community decided that it needed not one, not two, but three replacements for Nagios: Icinga and Naemon (forks of Nagios) and Shinken (a drop-in replacement). Most linux distros are now shipping one or more of these compatible replacements rather than the official Nagios Core. Not a single distro I checked is shipping Nagios 4. Either Shinken, Naemon or Icinga should work fine using the material covered in the tutorial, but I have only briefly tested Icinga and have not tested Shinken or Naemon at all. 16

17 About Nagios Plugins source On January 15, 2014, Nagios Enterprises forked the original code from the Nagios plugins project, effectively creating two sources for the Nagios plugins. The original maintainers of the plugins package renamed it to monitoring plugins and now host their distribution at monitoring-plugins.org Nagios Enterprises appears to be actively maintaining the nagios-plugins package, including security fixes This tutorial will use the official Nagios plugins package 17

18 Requirements C compiler (Xcode + cmdline tools) Perl 5.8+ (for many plugins) Web server (for web interface) PHP 5.3 gd (for statusmap and trends CGIs) rrdtool, perl-rrd, php-gd (for PNP4Nagios) 18

19 Nagios 4 - brew or build from source Latest MacPorts version of nagios is boo :( Uses old worker code and not as efficient as 4.x Latest Homebrew version is yay! brew install nagios! We want Nagios at least fixes lots of bugs and is much faster 19

20 Create the user and group Nagios needs a user / group to run as Create user nagios with group nagios Can use System Preferences -- no need to resort to command line 20

21 Create group nagios Go to Users and Groups, click the + Change New Account: selector to Group Set name to nagios 21

22 Create user nagios Click + again Create a Standard account Account name: nagios Set a password for security 22

23 Create user nagios Right-click the new nagios account and select Change group to nagios Set shell to /usr/bin/false 23

24 Download Nagios Core Nagios plugins package PNP4Nagios 24

25 Installing Nagios on OSX Install Xcode and command line tools Install gd library using MacPorts (or homebrew) cpan! port install gd2! brew install gd! install Net::SNMP! Extract the tarball Configure and install nagios./configure --with-gd-inc=/opt/local/include \ --with-gd-lib=/opt/local/lib \ --with-httpd-conf=/etc/apache2/other! 25

26 Compile problems: ld: archive has no table of contents for architecture x86_64 Probably a makefile bug Solution: run ranlib lib/libnagios.a 26

27 Installation from source sudo -s! make install! make install-config! make install-webconf install-exfoliation! make install-commandmode! install -m 755 -o root -g wheel daemon-init \! /usr/local/nagios/nagios.init! htpasswd -c /usr/local/nagios/etc/htpasswd.users nagios 27

28 Build and Install Plugins The plugins have LOTS of prerequisites LDAP libs SNMP utils samba client openssl libs Installed most prerequisites via MacPorts Homebrew should work as well!./configure --prefix=/usr/local/nagios \! --enable-perl-modules \! --with-mysql=/opt/local/lib/mysql5 \! --with-openssl=/opt/local/ 28

29 Install pnp4nagios Pre-reqs: rrdtool, perl RRD modules, php-gd!./configure --with-nagios-user=nagios \! with-nagios-group=nagios!! make! # Install without npcd (bulk mode)! make install-config install-processperfdata \! install-html install-plugins 29

30 Configure pnp4nagios cp /usr/local/pnp4nagios/etc/nagios.cfg-sample \! /usr/local/nagios/etc/pnp4nagios.cfg! cp /usr/local/pnp4nagios/etc/misccommands.cfg-sample \ /usr/local/nagios/etc/objects/misccommands.cfg 30

31 Create LaunchDaemon <?xml version="1.0" encoding="utf-8"?>! <!DOCTYPE plist PUBLIC -//Apple Computer//DTD PLIST 1.0//EN! >! <plist version="1.0">! <dict>! <key>label</key>! <string>org.nagios.nagios</string>! <key>programarguments</key>! <array>! <string>/usr/local/nagios/bin/nagios</string>! <string>-d</string>! <string>/usr/local/nagios/etc/nagios.cfg</string>! </array>! <key>keepalive</key>! <true/>! </dict>! </plist> 31

32 Web server / PHP Enable OSX web server Set PHP timezone to avoid a warning echo "date.timezone = 'America/New_York'" >>/etc/php.ini 32

33 CONFIGURING NAGIOS 33

34 Configuration Nagios has 2 parts to configure: the daemon and the cgi s Configure the CGIs to define access levels (authorization) Configure the daemon Commands Check commands Misc commands (how to notify, event handlers) Services Contacts Monitoring and alerting policies 34

35 Enable authentication in the CGIs cgi.conf use_authentication=1! Expects your web server to authenticate users Only allow admin users to issue commands and view config details authorized_for_system_information=...! authorized_for_configuration_information=...! authorized_for_system_commands=...! authorized_for_all_service_commands=...! authorized_for_all_host_commands=...! Allow any authenticated user to view Nagios status authorized_for_all_services=*! authorized_for_all_hosts=* 35

36 nagios.cfg Main configuration file Typically includes additional cfg files for commands, services, etc. ( objects ) cfg_file=/path/to/file! cfg_dir=/path/to/dir/of/configs! Interval length How many seconds are Nagios s default unit of time If you need to monitor a service more than once per minute, you can lower this from 60 interval_length=60 36

37 nagios.cfg Timeouts (in seconds):! service_check_timeout=60! host_check_timeout=30! event_handler_timeout=30! notification_timeout=30! ocsp_timeout=5! perfdata_timeout=5! If you have checks, event handlers, etc. that take a long time to run, increase the appropriate timeout value 37

38 Included default config files commands.cfg contacts.cfg localhost.cfg printer.cfg switch.cfg templates.cfg timeperiods.cfg Define commands called in other files Define contacts to be notified Example services for the local system, example printer, example network switch, etc. Templates for most objects; useful as a starting point for inheritance Def. periods of time (24x7, daytime, etc) 38

39 Inheritance All objects in Nagios support inheritance via the use <template> directive. Templates can inherit from other templates All templates must include the register 0 directive so Nagios knows it s just a template Templates include common settings for different obj types normal_check_interval, retry_check_interval, notification_interval, notification_period, notification_options, max_check_attempts, check_period 39

40 Object Configuration: Overview Inheritance 40 Reference / Assignment

41 Inheritance Example define service {!!name generic-service!!normal_check_interval! 5!!retry_check_interval!! 1!!max_check_attempts!! 3!!! register!!!!!! 0! }!! define service {!! use!!!!! generic-service!!! host_name!!! webserv!! service_description HTTP!! check_command!!! check_http! } Check every 5 minutes. Notify after service is down for ~3 minutes. 41

42 Basic Configuration Example Monitor a mail server that provides IMAP, SMTP and webmail Server IP address is name hornet All services are running on standard ports Not concerned with SSL services for this demo 42

43 Example: Host Templates define host {!! name!!!!!!!!!!!! generic-host!! notifications_enabled! 1!! event_handler_enabled! 1!! flap_detection_enabled! 1!! process_perf_data! 1!! retain_status_information! 1!! retain_nonstatus_information! 1!! notification_period! 24x7!! check_period!!!!!!!!! 24x7!! register! 0! } 43

44 Example: Host Templates define host {!! name!!!!!!!!!!!! generic-server!! use!!!!!!!!!!!! generic-host!! check_interval!!!!!!!! 5!! retry_interval!!!!!!!! 1!! max_check_attempts!!!!!! 5!! check_command!!!!!!!! check-host-alive!! notification_options!!!!!! d,u,r!! notification_interval!!!!! 120!! contact_groups!!!!!!!! sysadmins!! register!!!!!!!!!! 0! } 44

45 Example: Define Contacts define contact {!! contact_name!!!!! alice!! use!!!!!!!! generic-contact!! alias!!!!!!!! Alice Admin!! !!!!!!!! }! define contact {!! contact_name!!!!! bob!! use!!!!!!!! generic-contact!! alias!!!!!!!! Bob Admin!! !!!!!!!! }! define contactgroup {!! contactgroup_name!!!! sysadmins!! alias!!!!!!!! All admins!! members!!!!!!! alice,bob! } 45

46 Example: Define the Server define host {!! name!!!!!!!!!!! hornet!! use!!!!!!!!!!! generic-server!! host_name!!!!!!!!! hornet!! host_address!!!!!!!! ! } Most configuration inherited from generic-server Server will be checked every 5 minutes Problems will be re-checked every minute Alerts will be sent to contact group sysadmins after 5 failed checks 46

47 Example: Service Template define service{! name generic-service! active_checks_enabled 1! passive_checks_enabled 1! parallelize_check 1! check_freshness 0! notifications_enabled 1! event_handler_enabled 1! flap_detection_enabled 1! process_perf_data 1! check_period 24x7! max_check_attempts 5! normal_check_interval 5! retry_check_interval 1! notification_options w,u,c,r! notification_interval 60! notification_period 24x7! register 0! } 47

48 Example: Define the Services define service {!! use!!!!!!!!!!! generic-service!! host_name!!!!!!!!! hornet!! service_description!!!!! HTTP!! check_command!!!!!!! check_http! } Service will be checked every 5 minutes Problems will be re-checked every minute Alerts will be sent to contacts assigned to the host hornet 48

49 Example: Define check command define command {! command_name check_smb! command_line $USER1$/check_disk_smb -H $HOSTADDRESS$ -s "$ARG1$" -u nagios -p foobar -w "$ARG2$" -c "$ARG3$"! } Check command uses macros $USER1$ is set in nagios.cfg and is usually the full path to plugins installation directory $ARG1$, $ARG2$, etc. are macros that refer to arguments when calling the check_smb command $HOSTADDRESS$ is the IP of the host that is being checked 49

50 Example: Define New Service define service {!! use!!!!!!!!! generic-service!! host_name!!!!!!! hornet!! service_description!!! Docs share!! check_command!!!!! check_smb!is docs!80%!95%! } Passes 3 arguments to the check_smb check command SMB share IS docs will be checked every 5 minutes Problems will be re-checked every minute Alerts will be sent to contacts assigned to the host hornet 50

51 Running Plugins on a Remote Host Sometimes you need the plugin to actually run on the monitored host Checking local resources like disk, ram, etc. Multiple options for remote plugin execution check_by_ssh - ssh to host and run local plugin nrpe ncpa - the Nagios Remote Plugin Executor - a full-featured Nagios monitoring agent 51

52 USING NAGIOS 52

53 Navbar Overview Main window 53

54 Host summary Services View Service summary 54

55 Click on Services - Critical 55

56 Host and Service Groups Organize services or hosts into groups by function, etc. Can disable alerts, schedule downtime, etc. on whole group Can show availability report for a whole group Group services by desired reporting capability Groups get a unique URL so you can send a single link to check on a group of hosts Great for PHBs! Also great for delegated IT departments 56

57 Service Groups 57

58 Acknowledging an Outage Click on service name (or hostname) that has the problem Under Service Commands Click Acknowledge this service problem You must enter a comment about why you are acknowledging the problem (i.e., Bob is working on it ) Click Commit 58

59 Acknowledging an Outage Click Here 59

60 Acknowledging an Outage 60

61 The Tactical Overview Displays overview of monitored services and hosts Shows if Any services / hosts have notifications disabled Any services / hosts are flapping Active / passive checks enabled / disabled Warning / Critical / Okay breakdown 61

62 The Tactical Overview 62

63 Silencing All Alerts Don t ever do this! You *will* forget to turn them back on At least make sure someone is watching the dashboard! Hidden at bottom of sidebar Click Process Info 63

64 Silencing All Alerts Disable notifications Failed Nagios upgrade causes every plugin to fail Some other problem with Nagios server itself Disable event handlers (in case one is going crazy) 64

65 CUSTOM PLUGINS 65

66 Custom Plugins Nagios can monitor anything you can write a script to check Simple API: just write text to stdout and exit with a value You can write plugins in ANY language you choose! bash, python, tcl, expect perl (Nagios has embedded perl interpreter for speed) C, C++ Huge collection of plugins available at: Be wary of some community plug-ins! Test first!!! 66

67 The API exit code: 0: OK - everything is normal. Carry on. 1: Warning - a metric s warning threshold was exceeded 2: Critical - service not running or a metric s critical threshold was exceeded 3: Unknown - plugin was unable to run properly stdout: Brief summary of the state of the service. Generally included in pages so keep length short Not mandatory; does not affect Nagios s interpretation of the service state Can include performance data 67

68 Performance Data Metrics about the state of the service Can be used to generate graphs showing trends, etc. Performance data processing requires some external add-on like PNP4Nagios 68

69 Performance Data Perfdata is separated from main plugin output by vertical bar character (pipe symbol) Format: name=value[unit];[w thresh];[c thresh];[min];[max]! Minimal output: name=value Examples: bytes= temp=69.5f;78;85;50;100 mailq=34messages;200;400 disk_root=85% 69

70 Example Plugin - Time Machine Let s write a plugin to check that a machine is being backed up by Time Machine Figure out how to check this via command line tmutil latestbackup /Volumes/Time Machine Backups/Backups.backupdb/agrajag/ We can parse this last part into a timestamp with date -jf '%Y-%m-%d-%H%M%S' ' ' +%s! Beware differences between GNU date and BSD date Compare to date +%s! Simple arithmetic to see if we ve crossed a threshold 70

71 Minimal Plugin - Time Machine #!/bin/bash! <read warning and critical thresholds>!! now=$(date +%s)! latestbackup=$(tmutil latestbackup sed -e 's/.*\///' )! latest=$(date -jf '%Y-%m-%d-%H%M%S' "$latestbackup" +%s)! delay=$(( now - latest ))! if [ $delay -gt $critical ]; then state=2! elif [ $delay -gt $warning ]; then state=1! else state=0! fi! exit $state 71

72 TROUBLESHOOTING 72

73 Basic troubleshooting resources Logs!!!! You might have to enable or raise the log level Verbose / debug output --debug --verbose -v or -vvvv options run servers in the foreground Watch the traffic or service output Telnet Packet capture (tcpdump, wireshark, etc.) Examine processes ps, lsof, netstat, strace Network / DNS tests ping, dig, traceroute, nmap 73

74 It s Log, Log, Log! /var/log/* Common log tools grep tail head less Not sure, which file to look at? Sort by modification time: ls -lt! Learn about regular expressions for searching with grep 74

75 Common Log Actions Watch a logfile in real-time tail -f logfile! Print the last 100 lines tail -100 logfile! Search for specific text - case insensitive grep -i -e some string logfile! Exclude lines with specific text grep -v -e some string -e other string logfile! Truncate (clear) a log file without disturbing file permissions > logfile 75

76 Common Log Regular Expressions ^string string$ program: String at beginning of line String at end of line Find a program in syslog file (colon) 8\.8\.8\.8 IP addresses must escape the dot progname.*error prog.*(error warn) Line that mentions a program and error Find error or warn on the line 76

77 Processes ps aux List all processes on the system and the user it s running as lsof List all open files and which process / user is using it Great for finding why you can t unmount a filesystem Make sure a process is using the files you think it is lsof also lists listening network processes lsof grep IPv4 77

78 Netstat Display info about network sockets and connections BSD (Mac) and GNU (Linux) versions differ significantly Linux: -l -p Show listening processes Show process PID! Both: -n Show numerical output - skip DNS resolution 78

79 Query DNS with dig dig is part of the OSX base and most Linux distros Query DNS without involving host s resolver or cache Query for exact record type Query a specific DNS server Use dig to ensure that your name servers are answering queries properly Compare to output of host <query> to spot resolver problems!! dig [@<server>] <query> [<record type>] 79

80 Common dig Queries : jmalone@gargravarr; ; <<>> DiG P1 ; (1 server found)! ;; global options: +cmd! ;; Got answer:! ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41627! ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0!! ;; QUESTION SECTION:! ; IN A!! ;; ANSWER SECTION:! IN CNAME quordlepleen.cv.nrao.edu.! quordlepleen.cv.nrao.edu IN A !! 80

81 Common dig Queries ; <<>> DiG P1 nrao.edu in ns! ; (1 server found)! ;; global options: +cmd! ;; Got answer:! ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1187! ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0!! ;; QUESTION SECTION:! ;nrao.edu. IN NS!! ;; ANSWER SECTION:! nrao.edu IN NS cv3.cv.nrao.edu.! nrao.edu IN NS zia.aoc.nrao.edu.! nrao.edu IN NS sadira.gb.nrao.edu. 81

82 Telnet & Openssl We can use telnet and openssl to open a TCP connection to a service on any port on communicate directly to the service as if we were a client program Use telnet for un-encrypted services telnet <hostname> <port>! <port> can be numeric or name from /etc/services Use openssl for an SSL- or TLS-protected service openssl s_client -connect <host>:<port> 82

83 Telnet Example: web server : jmalone@gargravarr; telnet 80! Trying ! Connected to Escape character is '^]'.! GET / HTTP/1.0!! HTTP/ OK! Date: Mon, 17 Mar :03:31 GMT! Expires: -1! Cache-Control: private, max-age=0! Content-Type: text/html; charset=iso ! Set-Cookie: PREF=ID=a725ac8...; expires=wed, 16-Mar :03:31 GMT; path=/; domain=.google.com! Set-Cookie: NID=67=O11S-VZ1...; expires=tue, 16-Sep :03:31 GMT; path=/; domain=.google.com; HttpOnly! Server: gws!! <!doctype html><html itemscope="" itemtype=" <head><meta content="search the world's information, including webpages, images, videos and more... 83

84 Same thing but HTTPS $ openssl s_client -connect CONNECTED( )! depth=2 /C=US/O=GeoTrust Inc./CN=GeoTrust Global CA! verify error:num=20:unable to get local issuer certificate! verify return:0! ---! Certificate chain! 0 s:/c=us/st=california/l=mountain View/O=Google Inc/CN= i:/c=us/o=google Inc/CN=Google Internet Authority G2! 1 s:/c=us/o=google Inc/CN=Google Internet Authority G2! i:/c=us/o=geotrust Inc./CN=GeoTrust Global CA! 2 s:/c=us/o=geotrust Inc./CN=GeoTrust Global CA! i:/c=us/o=equifax/ou=equifax Secure Certificate Authority! ---! (certificate block)! subject=/c=us/st=california/l=mountain View/O=Google Inc/CN= issuer=/c=us/o=google Inc/CN=Google Internet Authority G2! ---! SSL handshake has read 3238 bytes and written 444 bytes! ---! New, TLSv1/SSLv3, Cipher is RC4-SHA! Server public key is 2048 bit! Secure Renegotiation IS supported! Compression: NONE! Expansion: NONE! SSL-Session:! Protocol : TLSv1! 84

85 SMTP Simple Mail Transfer Protocol RFC 821, 2821, 5321 Simple vocabulary: HELO! Note: the angle brackets are included around the address MAIL FROM: <address>! RCPT TO: <address>! DATA! QUIT 85

86 SMTP Example : jmalone@gargravarr; telnet smtp.cv.nrao.edu smtp! Connected to cv3.cv.nrao.edu.! Escape character is '^]'.! 220 cv3.cv.nrao.edu ESMTP Sendmail cv-ws-8.12; Sun, 16 Mar 2014! HELO gargravaar.local! 250 cv3.cv.nrao.edu Hello va-xx.dhcp.xx [184.xx], pleased to meet you! MAIL FROM: <user@example.com>! <user@example.com>... Sender ok! RCPT TO: <jmalone@nrao.edu>! <jmalone@nrao.edu>... Recipient ok! DATA! 354 Enter mail, end with "." on a line by itself! Subject: This is a test!! Hi. This is a test message.!.! s2h2udah Message accepted for delivery! QUIT! cv3.cv.nrao.edu closing connection! Connection closed by foreign host. 86

87 IMAP Example $ openssl s_client -connect hornet:imaps! * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN AUTH=CRAM-MD5 AUTH=X-PLAIN-SUBMIT] Dovecot ready.!. login nagios foobar!. OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE SORT SORT=DISPLAY THREAD=REFERENCES THREAD=REFS MULTIAPPEND CATENATE UNSELECT ] Logged in!. list "" *! * LIST (\HasNoChildren) "." "Deleted Messages"! * LIST (\HasNoChildren) "." "Drafts"! * LIST (\HasNoChildren) "." "Junk"! * LIST (\HasNoChildren) "." "Sent Messages"! * LIST (\HasNoChildren) "." "INBOX"!. OK List completed.!. logout! * BYE Logging out!. OK Logout completed.! closed 87

88 IMAP Example: Bad auth $ openssl s_client -connect hornet:imaps! * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN AUTH=CRAM-MD5 AUTH=X-PLAIN-SUBMIT] Dovecot ready.!. login nagios wrongpassword!. NO [AUTHENTICATIONFAILED] Authentication failed.!! Cannot tell if problem is username or password Check server logs bash-3.2# grep dovecot /var/log/system.log! Jul 6 14:35:55 hornet dovecot[1533]: auth: Error: od(nagios, ): Credentials could not be verified, username or password is invalid.! bash-3.2# id nagios! uid=1025(nagios) gid=20(staff) groups=20(staff), 403(com.apple.sharepoint.group.2),402(com.apple.sharepoint.group. 1),404(com.apple.sharepoint.group.3),12(everyone), 61(localaccounts) 88

89 IMAP Example: Bad auth mech $ openssl s_client -connect hornet:imaps! * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=LOGIN AUTH=CRAM-MD5 AUTH=X-PLAIN-SUBMIT] Dovecot ready.!. login nagios foobar!. NO [ALERT] Unsupported authentication mechanism.!!! In this case, the plain mechanism was disabled by the server. Had to enable this mech to support a legacy client that only did plaintext auth. 89

90 PACKET SNIFFING 90

91 Packet Sniffing Packet sniffing examines live network traffic on a connection Watch contents of network packets during a connection to look for problems Two main tools to cover Wireshark: graphical packet sniffing tool tcpdump: command-line packet sniffing tool Other tools available EtherApe - Linux GUI network monitor iptraf - Linux TUI connection monitor 91

92 Wireshark X11 application - requires XQuartz on Originally known as Ethereal Powerful capture filters and protocol decoders Warning: In the past, bugs in the protocol decoders have led to remote attack vectors when running Wireshark as root. You have been warned. Can also capture traffic on one machine using tcpdump and load the cap file into Wireshark on another 92

93 Start new Wireshark Overview capture 93

94 Select Interface Wireshark Overview Enter capture filter Start capture 94

95 Capture Filters Capture filters are different from display filters Capture filters use libpcap syntax (same as tcpdump)! host Only capture packets involving this host! host Exclude specific IP address Useful for chatty hosts you don t care about dst port 80 arp - Traffic send to Any traffic involving the www port - Just watch ARP traffic (look for storms) 95

96 Capture Filters Can use logical operators to AND or OR filters dst or dst host and host host and (host or host )! tcp portgrange Traffic from privileged ports! 96

97 Different from capture filters Display Filters ip.addr == Any traffic involving host! ip.addr == Traffic not involving host NOTE: don t use ip.addr!= not the same filter ip.dst == tcp.port == 80 arp - Traffic destined for Any non-ssl web traffic - Any ARP traffic 97

98 Display Filters Can use logical operators to AND or OR filters arp or tcp.port == 22 ip.addr == and tcp.port == 53 ip.addr == and (tcp.port==53 or tcp.port==5353) Other types of matching ip.addr contains http.request.uri matches jsp$ 98

99 tcpdump Command-line packet sniffer for unix systems Can filter captured traffic based on IP, port, protocol, etc. Can save pcap files for use with other decoder software Use options -s 0 -w <filename> The -s 0 tells it to snarf the whole packet not just the headers scp file back to your machine and analyze with Wireshark Uses the same syntax for capture filters as Wireshark and other libpcap applications. 99

100 THANK YOU! 100

Automated System Monitoring

Automated System Monitoring Automated System Monitoring Josh Malone jmalone@nrao.edu Systems Administrator National Radio Astronomy Observatory Charlottesville, VA https://blogs.nrao.edu/jmalone 2 One night, about 8 or 9 years ago,

More information

NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...

NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios deployment

More information

Availability Management Nagios overview. TEIN2 training Bangkok September 2005

Availability Management Nagios overview. TEIN2 training Bangkok September 2005 1 Availability Management Nagios overview Agenda 2 Introduction Objectives Functionalities Requirement. Architecture & Operation Operation Description WEB portal Plugins and extensions Plugins description

More information

How To Monitor A Network With Nagios And Other Tools

How To Monitor A Network With Nagios And Other Tools Network Monitoring with Nagios and other tools Wednesday, 19 July 2006 Martin B. Smith martins@bebr.ufl.edu What is a network monitoring system? A combination of hardware and software used to administer

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Document d'installation FAN 2.1

Document d'installation FAN 2.1 Document d'installation FAN 2.1 Filename : FAN_Documentation_EN_v2.1-1 Version : 2.1 Date : 12/04/2011 Authors : Olivier LI-KIANG-CHEONG, Manuel OZAN, Charles JUDITH Licence : Creative Commons Attribution

More information

Packet Sniffing with Wireshark and Tcpdump

Packet Sniffing with Wireshark and Tcpdump Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security

More information

Setting Up A Nagios Monitoring System Warren Block, May 2005

Setting Up A Nagios Monitoring System Warren Block, May 2005 Setting Up A Nagios Monitoring System Warren Block, May 2005 What Is Nagios? NAGIOS (na gee ose) is a system that will monitor the status of other network computers or components. It can watch your network

More information

Wireshark Deep packet inspection with Wireshark

Wireshark Deep packet inspection with Wireshark Wireshark Deep packet inspection with Wireshark Wireshark is a free and open-source packet analyzer. It is commonly used to troubleshoot network issues and analysis. Originally named Ethereal, in May 2006

More information

Monitoring a Linux Mail Server

Monitoring a Linux Mail Server Monitoring a Linux Mail Server Mike Weber mweber@spidertools.com] Various Methods to Monitor Mail Server Public Ports SMTP on Port 25 POPS on Port 995 IMAPS on Port 993 SNMP Amavis on Port 10024 Reinjection

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

Cannot send Autosupport e-mail, error message: Unknown User

Cannot send Autosupport e-mail, error message: Unknown User Cannot send Autosupport e-mail, error message: Unknown User Symptoms Unable to send Autosupport e-mails and the following error message is reported: asup.smtp.fail http://now.netapp.com/eservice/ems?emsaction=details&eventid=200573&software=ontap&em

More information

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

SSL Tunnels. Introduction

SSL Tunnels. Introduction SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,

More information

Présentation de Nagios

Présentation de Nagios Rémi Laurent remi.laurent@fsugar.be http://www.fsugar.be/ 11 avril 2009 Nagios? système de monitoring : services réseaux paramètres vitaux notification gestion des incidents prises d actions... Vocabulaire

More information

An Introduction to Monitoring with Nagios

An Introduction to Monitoring with Nagios An to Monitoring with Nagios Laurent Andrey Rémi Badonnel LORIA - INRIA Grand Est ISSNSM 2008, Zurich Laurent Andrey, Rémi Badonnel An to Monitoring with Nagios 1/32 Local checks Remote checks Conclusions

More information

Network Monitoring Systems / Nagios. 2/19/08 Michael Miller e mail: mike.mikemiller@gmail.com

Network Monitoring Systems / Nagios. 2/19/08 Michael Miller e mail: mike.mikemiller@gmail.com Network Monitoring Systems / Nagios 2/19/08 Michael Miller e mail: mike.mikemiller@gmail.com Network Monitoring System What is a Network Monitoring System ( NMS ) What types of devices can you monitor?

More information

20 Command Line Tools to Monitor Linux Performance

20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance It s really very tough job for every System or Network administrator to monitor and debug Linux System

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Advanced System Monitoring

Advanced System Monitoring Advanced System Monitoring with Nagios, PNP4Nagios and NConf Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA is great It checks your servers It tells you when

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Introduction to system monitoring with Nagios, Check_MK and Open Monitoring Distribution (OMD)

Introduction to system monitoring with Nagios, Check_MK and Open Monitoring Distribution (OMD) to system monitoring with, and Open Monitoring Distribution () Mensa Centro de Física de Materiales (CSIC-UPV/EHU) HPCK 14 Barcelona, 13-14th January 2014 Why monitoring? What to monitor? How to monitor?

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

wget

wget NSCA (with Nagios) Prerequisites -Nagios should be previously installed and configured -External commands should be enabled and configured for Nagios previously Getting the source The first step would

More information

W3Perl A free logfile analyzer

W3Perl A free logfile analyzer W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed

More information

NETWORK MONITOR. Some high-end network monitoring. Watching your systems with Nagios COVER STORY. What Is Nagios? Installing the Server and Plugins

NETWORK MONITOR. Some high-end network monitoring. Watching your systems with Nagios COVER STORY. What Is Nagios? Installing the Server and Plugins COVER STORY Nagios Workshop Watching your systems with Nagios NETWORK MONITOR Nagios monitors your network and provides early warning for problems with hosts and services. BY JULIAN HEIN Some high-end

More information

Monitoring Systems and Services. Alwin Brokmann DESY-IT March 24 28,2003 CHEP 2003 San Diego

Monitoring Systems and Services. Alwin Brokmann DESY-IT March 24 28,2003 CHEP 2003 San Diego Monitoring Systems and Services Alwin Brokmann DESY-IT March 24 28,2003 CHEP 2003 San Diego Requirements Host Monitoring Service Monitoring Navigation User specific Parameter s WEB Interface Alarming Escalation

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added

More information

Monitoring MySQL. Geert Vanderkelen MySQL Senior Support Engineer Sun Microsystems

Monitoring MySQL. Geert Vanderkelen MySQL Senior Support Engineer Sun Microsystems Monitoring MySQL Geert Vanderkelen MySQL Senior Support Engineer Sun Microsystems Agenda Short intro into MySQL, the company Monitoring MySQL: some examples Nagios plugins for MySQL MySQL Enterprise Monitor

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Penetration Testing LAB Setup Guide

Penetration Testing LAB Setup Guide Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

MONITORING EMC GREENPLUM DCA WITH NAGIOS

MONITORING EMC GREENPLUM DCA WITH NAGIOS White Paper MONITORING EMC GREENPLUM DCA WITH NAGIOS EMC Greenplum Data Computing Appliance, EMC DCA Nagios Plug-In, Monitor DCA hardware components Monitor DCA database and Hadoop services View full DCA

More information

http://cnmonitor.sourceforge.net CN=Monitor Installation and Configuration v2.0

http://cnmonitor.sourceforge.net CN=Monitor Installation and Configuration v2.0 1 Installation and Configuration v2.0 2 Installation...3 Prerequisites...3 RPM Installation...3 Manual *nix Installation...4 Setup monitoring...5 Upgrade...6 Backup configuration files...6 Disable Monitoring

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Parallels Plesk Panel 11 for your Linux server

Parallels Plesk Panel 11 for your Linux server Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

Getting Started With Your Virtual Dedicated Server. Getting Started Guide Getting Started Guide Getting Started With Your Virtual Dedicated Server Setting up and hosting a domain on your Linux Virtual Dedicated Server using Plesk 8.0. Getting Started with Your Virtual Dedicated

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Supermicro Server Monitoring with SuperDoctor 5 and Nagios Using SNMP Protocol. Version 1.1b

Supermicro Server Monitoring with SuperDoctor 5 and Nagios Using SNMP Protocol. Version 1.1b Supermicro Server Monitoring with SuperDoctor 5 and Nagios Using SNMP Protocol Version 1.1b Supermicro Server Monitoring with SuperDoctor 5 and Nagios Using SNMP Protocol Release: v 1.1b Document release

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Review Quiz 1. What is the stateful firewall that is built into Mac OS X and Mac OS X Server?

Review Quiz 1. What is the stateful firewall that is built into Mac OS X and Mac OS X Server? ----------------------------- Chapter 1 PLANNING SYSTEM 1. What is the formal definition of utilization? 2. Name the common units in which heat load is measured. 3. What is the easiest way to determine

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

TCP Packet Tracing Part 1

TCP Packet Tracing Part 1 TCP Packet Tracing Part 1 Robert L Boretti Jr (robb@us.ibm.com) Marvin Knight (knightm@us.ibm.com) Advisory Software Engineers 24 May 2011 Agenda Main Focus - TCP Packet Tracing What is TCP - general description

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

Nagios. cooler than it looks. Wednesday, 31 October 2007

Nagios. cooler than it looks. Wednesday, 31 October 2007 Nagios cooler than it looks 1 Outline sysadmin 101 Nagios Overview Installing nagios NRPE / NSCA Other Stuff Questions 2 Sysadmin 101 Every sysadmin needs a decent toolkit... 3 Sysadmin 101 Every sysadmin

More information

Getting Started Guide. Getting Started With Your Dedicated Server. Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0.

Getting Started Guide. Getting Started With Your Dedicated Server. Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0. Getting Started Guide Getting Started With Your Dedicated Server Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0. Getting Started with Your Dedicated Server Plesk 8.0 Version

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Monitoring Software Services registered with science.canarie.ca

Monitoring Software Services registered with science.canarie.ca Monitoring Software Services registered with.canarie.ca Introduction The software registry at.canarie.ca monitors each of the contributed services via the API defined in Research Service Support for the

More information

Workflow Configuration on R12/R11. High Level Steps. SENDMAIL configuration mostly done by System Administrator Workflow configuration for R12

Workflow Configuration on R12/R11. High Level Steps. SENDMAIL configuration mostly done by System Administrator Workflow configuration for R12 Workflow Configuration on R12/R11 High Level Steps SENDMAIL configuration mostly done by System Administrator Workflow configuration for R12 SENDMAIL Configuration tested on RedHat 4 update 5 -------------------------------------------------------------------

More information

Request Manager Installation and Configuration Guide

Request Manager Installation and Configuration Guide Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

6.0. Getting Started Guide

6.0. Getting Started Guide 6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

PIX/ASA 7.x with Syslog Configuration Example

PIX/ASA 7.x with Syslog Configuration Example PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages

More information

Network Monitoring Tool with LAMP Architecture

Network Monitoring Tool with LAMP Architecture Network Monitoring Tool with LAMP Architecture Shuchi Sharma KIIT College of Engineering Gurgaon, India Dr. Rajesh Kumar Tyagi JIMS, Vasant Kunj New Delhi, India Abstract Network Monitoring Tool enables

More information

Clustered Data ONTAP 8.3

Clustered Data ONTAP 8.3 Clustered Data ONTAP 8.3 Remote Support Agent Configuration Guide For Use with Clustered Data ONTAP NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Features Overview Guide About new features in WhatsUp Gold v14

Features Overview Guide About new features in WhatsUp Gold v14 Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...

More information

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Rebasoft Auditor Quick Start Guide

Rebasoft Auditor Quick Start Guide Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Nagios XI - NRPE Troubleshooting and Common Solutions

Nagios XI - NRPE Troubleshooting and Common Solutions Purpose The Industry Standard in IT Infrastructure Monitoring This document describes how to troubleshoot NRPE (Nagios Remote Plugin Executor) agent issues in Nagios XI. NRPE is most commonly used to monitor

More information

Ulteo Open Virtual Desktop - Protocol Description

Ulteo Open Virtual Desktop - Protocol Description Ulteo Open Virtual Desktop - Protocol Description Copyright 2008 Ulteo SAS 1 LIST OF PROTOCOLS USED CONTENTS Contents 1 List of Protocols used 1 1.1 Hyper Text Transfert Protocol (HTTP)..............................

More information

FileMaker Server 12. FileMaker Server Help

FileMaker Server 12. FileMaker Server Help FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

The Application Layer: DNS

The Application Layer: DNS Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)

More information

Asia Web Services Ltd. (vpshosting.com.hk)

Asia Web Services Ltd. (vpshosting.com.hk) . (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk

More information

While are you still in Nagios working directory, create a new file for DNS servers monitoring

While are you still in Nagios working directory, create a new file for DNS servers monitoring NAGIOS MONITORING ----------------- On AUTH1 server 1. Go to Nagios working directory $ cd /usr/local/etc/nagios 2. Copy Nagios sample files To do this, make sure you are in Nagios working directory from

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Deployment and Monitoring. Pascal Robert MacTI

Deployment and Monitoring. Pascal Robert MacTI Deployment and Monitoring Pascal Robert MacTI Contents Deployment Standard wotaskd/javamonitor Wonder s wotaskd/javamonitor Alternatives Monitoring Nagios JMX wotaskd/javamonitor Bundled with WO, as two

More information

CSE 127: Computer Security. Network Security. Kirill Levchenko

CSE 127: Computer Security. Network Security. Kirill Levchenko CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure

More information

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Introduction to Passive Network Traffic Monitoring

Introduction to Passive Network Traffic Monitoring Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki antonakd@csd.uoc.gr Active Monitoring Inject test packets into the network or send packets

More information