Solved

How to configure port monitoring for screendoor

Posted on 2008-10-15
6
186 Views
Last Modified: 2012-05-05
Need to configure ports to monitor internet access
0
Comment
Question by:jammin_j
  • 3
  • 3
6 Comments
 
LVL 16

Expert Comment

by:Aaron Street
ID: 22724490
what are you configuring the ports on?

what types of switchs/ routers?

on a cisco switch you simple

type

#monitor session 1 source g1/0/2
#monitor session 1 destination g2/0/3

or some thing like that ;)
0
 

Author Comment

by:jammin_j
ID: 22724801
Precisely, on the Cisco. I have the source as the firewall and the destination the Screendoor.
0
 
LVL 16

Expert Comment

by:Aaron Street
ID: 22728563
so what do you actuly need to know?

on a cisco thats all you need to do tell the switch what port you want to use as source, and what port you want to send the mirrored data to. and then attach the monitering PC/software to that destination port.

 
0
Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

 

Author Comment

by:jammin_j
ID: 22736383
I put monitor destination on the listening port and the source as our pix firewall, and still no filtering. Is this not correct?
0
 
LVL 16

Expert Comment

by:Aaron Street
ID: 22738494
yes that should be fine.

you need to make sure that you monitor traffic in both ways in/out

if you are not sure you ahve it right. Put a PC on the monitering port and then look to see how its network card stats are mounting up. you should see a lot of packets hitting it if the monitering is set up corredctly. to be sure down load wire shark on to it and capture some data to see if the port is being mirrored correctly.

if you do a "show monitor" on  the cisco swith what dose it desplay?
0
 

Accepted Solution

by:
jammin_j earned 0 total points
ID: 22836181
It was the silly screendoor software. ScreenDoor blames Cisco... Cisco confirmed monitoring operational. I updated the Screendoor Software and... BINGO!

Done!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This tutorial will go through the steps required to write a script that will back up the configuration settings of a HP-ProCurve switch. You will need to get the following things to follow this tutorial: Telnet Scripting Tool e.g. TST10.exe …
Hello All, I have been training on Multicast for a while now and whenever I start the topic , I find out that my friends /  Colleagues mention that they do not know how to test Multicast Joins. As most of the multicast would be video traffic and …
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now