Solved

ntop

Posted on 2004-04-11
2
511 Views
Last Modified: 2012-05-04
Hi all,

I installed ntop on my debian box today. It looks like a very decent program and will probably give me more info than I care to know! Originally all I wanted was a program that showed me how much throughput I am using in any given period. I'm paying for my bandwidth usage on a monthly basis and I want to keep my isp honest :)

Hopefully ntop does this...I can't tell as of yet because it's only been installed for a few minutes. If I decide to keep it, I'd like to have it so that only I can view the results. I don't have X installed on this machine but I can check ntop reports with a browser from another machine if I point it to that box at port 3000. Since ntop has an embedded http server, I don't think I can configure it so that a password has to be entered to view the results. My question here is how can I configure ntop so that a password is required to view the results?

I'm awarding 500 points to the easiest, most detailed answer. I will also consider an alternative program that can generate the info I'm after...and if it could actually break it down per user that would be awesome...but I'd settle for just total throughput reporting. Thanks in advance,

-Pat
0
Comment
Question by:pat5star
2 Comments
 
LVL 44

Accepted Solution

by:
Karl Heinz Kremer earned 500 total points
Comment Utility
Go to the "Admin" tab, click on the Users link and set a password for the admin user.

Then click on the "URLs" link, click on "Add URL" and leave the directory part of the URL empty. This will apply this rule to all of the ntop directories. Then make sure that you have "admin" in the Authorised Users field. Click on "Add URL"

From now on, only the admin user should have access to the ntop web pages.
0
 
LVL 3

Author Comment

by:pat5star
Comment Utility
Thanks khkremer,

That did exactly what I wanted. As impressive as ntop is so far, this is one thing that could definitely be improved. The setup for users and pages is not very intuitive...or at least it wasn't to me anyways!

Thanks again for your help,

-Pat
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now