Solved

Intranet Security

Posted on 2004-09-27
3
312 Views
Last Modified: 2010-04-10
How to keep track of request from Intranet to Internet? or is there any software to keep track of work done on all the machines in the intranet ?
0
Comment
Question by:riteinfotech
3 Comments
 
LVL 3

Accepted Solution

by:
cagri earned 125 total points
ID: 12159350
Well, of course there are many software doing what you are looking for but let's clearify first. What are we trying to achieve ?

Where the people on Intranet doing on the Internet ? Or What the Intranet people doing including local activities ??

For the first, you will be likely to be probing between your local area switch and Internet router (or mirroring the Internet port of your switch). The latter, requires you to monitor EVERYTHING which is  in general much more CPU intensive depending the size and load of your network.

Here are a few starter applications:

http://www.ntop.org/ntop.html
NTOP is a great reporting tool for your traffic, it does not show every single action historically however, provides you a very detailed, broad reporting about your network usage. Like top 10 users, applications used by each of these users, what they are downloading etc.etc.

If you would like to make autiding and would like to KEEP EVERYTHING, flow-tools coupled with Cisco NetFlow technology is a great solution, you can keep a log of your traffic back to several months and perform in depth queries like where was that guy connecting at 14:24, Tuesday, or who was connecting to blah.com at this hour ???
http://www.splintered.net/sw/flow-tools/ is the link for flowtools and it also has the info about Cisco configuration.

Both solutions are FOC considering you have some hardware in hand.

Hope this helps,

0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now