Solved

Program for net flow

Posted on 2003-10-31
6
231 Views
Last Modified: 2010-04-21
please tell me what is the best program for linux that describes net flow as each ip and how its bandwidth that takes , i watch this link i want to posess this prog if you can know what is the name of this prog and where can i get it tell and thanks alot , this is the link for prog
http://netflow.p-i-s.com
0
Comment
Question by:ahfaris
6 Comments
 
LVL 1

Accepted Solution

by:
aacosta earned 168 total points
ID: 9657087
Hello,
 Ntop is free and has a plugin for gathering Netflow infomation.
The URL is: http://www.ntop.org/ntop.html
  The gathered information is storage in plain text files, then you can manage it as you wish.

Alejandro,-
0
 
LVL 20

Assisted Solution

by:Gns
Gns earned 166 total points
ID: 9657092
Since you need log on to that, I couldn't very well tell:-).
Might be some snmp statistics from routers... Munged through mrtg... http://people.ee.ethz.ch/~oetiker/webtools/mrtg/
ntop is nice tool (http://www.ntop.org/ntop.html), as is the nice sniffer ethereal (http://www.ethereal.com/).

-- Glenn
0
 
LVL 12

Assisted Solution

by:paullamhkg
paullamhkg earned 166 total points
ID: 9661674
yes, mtrg and ntop is good tools, but I will recomment iptraf have a look here http://www.zpdee.net/~joecat/iptraf.html
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10231571
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Split between aacosta, Gns and paullamhkg
Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

khkremer
EE Cleanup Volunteer
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now