background preloader

Networks

Facebook Twitter

Google.

VPN

ARGUS- Auditing Network Activity. Welcome to Argus, the network Audit Record Generation and Utilization System. The Argus Project is focused on developing all aspects of large scale network activity audit. Argus, itself, is next-generation network flow technology, going from packets on the wire to advanced network flow data, to network forensics data; all in support of Network Operations, Performance and Security Management. If you need to know what is going on in your network, right now or historically, you will find Argus a useful tool.

Argus is composed of an advanced comprehensive network flow data generator, the Argus sensor, which processes packets (either capture files or live packet data) and generates detailed network flow status reports of all the flows in the packet stream. Argus captures much of the packet dynamics and semantics of each flow, with a great deal of data reduction, so you can store, process, inspect and analyze large amounts of network data efficiently. Fun with network Scangear. Updated Dec 20 2002 The iR Port Forwarder Page This page has been put together to assist you in connecting a single iR pull scanning product into a multi network/subnet environment Update Oct 24 2002 Network Scangear V 1.4 now supports subnet scanning Click here to download the Port Forwarder 1. 2. 3. 4. 5. The iR product will require a network/subnet. Lets use the following IP addresses for the Port Forwarder NICS and iR product.

NIC 1 192.168.10.10 IP Address of Port Forwarder NIC 1 (Connected to Subnet 1) NIC 2 192.168.20.10 IP Address of Port Forwarder NIC 2 (Connected to Subnet 2) NIC 3 192.168.30.10 IP Address of Port Forwarder NIC 3 (Connected to Subnet 3) NIC 4 192.168.0.10 IP Address of Port Forwarder NIC 4 (Connected to iR Product) iR Product 192.168.0.100 IP Address of iR product Once configured correctly, the Port Forwarder will forward all TCP/UDP/IPX packets received on NIC 1, NIC 2 and NIC 3 directly to the iR Product 6. 7. 8. 9. 10.

Here is an example; 11. 12. 13. 14. 1. MyConnection Server Tutorials - Creating an eMail link once a test has finished. Creating an eMail link once a test has finished The tutorial below explains how to set up the applet to pass the results of a test to a JavaScript function and then use JavaScript to display a link used to email the results. Step 1 The <param> that needs to be added to your applet code is: Where the value is the JavaScript function and parameters passed. So the applet code may look like this: <applet MAYSCRIPT name="myspeed" code="myspeedserver/applet/myspeed.class" archive="myspeed.jar,/myspeed/plugins.jar" width="600" height="400"> <param name="js" value=""> <param name="testspecid" value="-2"></param> Java is required to view this applet </applet> Step 2 explains how to fill in the "value=" part of the param.

Step 2 For this tutorial we are going to pass a few variables that would relate to a MySpeed test. The code above will run a JavaScript function called "mys" and pass the parameters specified. Step 3 The JavaScript needed is: Step 4 Below is a working example in action: SecLists.Org Security Mailing List Archive. Nmap - Free Security Scanner For Network Exploration & Security Audits. The Socrates Project | SOCRATES. Future communication networks will exhibit a significant degree of self-organisation. The principal objective of introducing self-organisation, comprising self-optimisation, self-configuration and self-healing, is to effectuate substantial operational expenditure (OPEX) reductions by diminishing human involvement in network operational tasks, while optimising network efficiency and service quality.

The SOCRATES (Self-Optimisation and self-ConfiguRATion in wirelEss networkS) project aims at the development of self-organisation methods to enhance the operations of wireless access networks, by integrating network planning, configuration and optimisation into a single, mostly automated process requiring minimal manual intervention. Regarding the technological scope, SOCRATES primarily concentrates on wireless access networks, as the wireless segment generally forms the bottleneck in end-to-end communications, both in terms of operational complexity and network costs. Ch01: Configuring Cisco PIX Firewalls.

Sometimes you may have a Cisco PIX 501 firewall protecting your DSL based home network. This chapter covers how to configure it and in addition, there are a number of fully commented sample PIX configurations in the appendix in which each line is explained. It is important to remember that the PIX 501 has two Ethernet interfaces. The named "outside" should always be connected to the Internet and the one labeled "inside" should be connected to your home network. The "outside" interface may sometimes be referred to as the "unprotected" interface and the "inside" interface is frequently referred to as the "protected" one. Network address translation is a method used to help conserve the limited number of IP addresses available for internet purposes.

The Introduction to Networking page explains the concept in more detail in addition to other fundamental topics. There are many ways to access the PIX command line. Via The Console Port Via Telnet pixfw# wr mem Building configuration...

Tools