Solved

I have configured server and want to trace the traffic under that IP live...

Posted on 2008-10-01
11
210 Views
Last Modified: 2012-05-05
Hi there,

I have a FileZilla server. I configured the server with its defaults and set the user and credential...

I want to trace the traffic on that IP live...Which tool do you recommend me? (pref. free)

Best regards...
0
Comment
Question by:jazzIIIlove
  • 6
  • 5
11 Comments
 
LVL 13

Assisted Solution

by:Rowley
Rowley earned 500 total points
ID: 22622466
http://www.wireshark.org/

There is no better imho.
0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 22622599
ok...i installed wireshark...But how am i going to set the remote servers IP? I want to see the traffic in my local machine...So, what am i going to do? How can i set the remote machine's IP in the tool?

Best regards...
0
 
LVL 13

Accepted Solution

by:
Rowley earned 500 total points
ID: 22622683
You'll be able to monitor any traffic between your own pc and the remote machine. To analyse network traffic on the server, you'll need to install wireshark on the server.

A filter to view all traffic destined for a particular host, type:

ip_dst_host == "x.x.x.x" where x.x.x.x is the destination ip address.

you can string filters together using "and", for example:

ip_src_host == "x.x.x.x" and ip_dst_host == "x.x.x.x".

Thus endeth this brief tutorial. For more help and information, including manuals and documentation on how to use wireshark, check out:

http://wiki.wireshark.org/
http://www.wireshark.org/docs/
http://www.wireshark.org/lists/

Good paper on it here: http://www.willhackforsushi.com/books/377_eth_2e_06.pdf

Happy reading!
0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 22628137
is it possible to monitor the server by installing a software to my home PC?

I have the IP and credentials of remote server...So isn't that possible to monitor with my localhost?
0
 
LVL 13

Expert Comment

by:Rowley
ID: 22631696
Yes, it may be possible.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 12

Author Comment

by:jazzIIIlove
ID: 22636295
cool, how...any example?

I raised the point to 500 for this, because it gets complicated...
0
 
LVL 13

Expert Comment

by:Rowley
ID: 22636902
...well...what is it exactly you want to monitor?
0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 22641541
<<...well...what is it exactly you want to monitor?
Just who downloads what...Any attacks on the machine...There is no SSH server and the connections are insecure so i just want to track it from my home...
0
 
LVL 13

Assisted Solution

by:Rowley
Rowley earned 500 total points
ID: 22641765
Well...access information is in the access logs. Use a web log analysis tool such as Analog, webalizer, awstats or anything else you might come across.

There are also many free services out there that will monitor http access given a url. One i've used is http://www.siteuptime.com/ . The costs are fairly cheap if you want to subscribe for regular polling.

To provide you with some basic form of protection against attack, use http://www.modsecurity.org module for apache.

Can't really help you any more...stuff like this is well beyond the scope of a forum thread imho.
0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 22641836
thanks but i don't need http access...I need ftp access...Any links regarding this?
0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 22642376
ok.ok i see the ftp under http://www.siteuptime.com/ .
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: rfc1180
The Maximum Segment size (MSS) is an important consideration when troubleshooting connectivity via the Internet/Intranet. As the packets are routed via the Internet/Intranet, the packets must traverse through multiple routers in the path between two…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now