Solved

Linux Networking question

Posted on 1997-09-24
1
204 Views
Last Modified: 2010-03-18
Hey all!!

Here's a good one for you :)

I want to be able to watch the amount of bandwidth an IP or Class of IP's uses..

What hardware / software can I get for linux that will do this for me?

Thanx all
Andrew
q@qonline.com.au

0
Comment
Question by:Q010797
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
unicorntech earned 50 total points
ID: 1586648
There are two ways you could do this. First you could use radius and write some scripts that will analyse the log-files and then tailor the scripts to output the stats for a range of ip's.

I will discuss this with you tomorrow and the other options available tomorrow. Sorry I didn't call back today but I will call you first thing in the morning and talk about his and the mail issue previously discussed,

Regards,

Jason
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question