We have a Cisco network environment where are configured 4 VLANs.
We are using Sniffer 4.60, and I'm doing a mirror from the main VLAN in one of the ports from thecore switch (a Catalyst 6509).
My question is, what should we monitor or mirror to know the utilisation of the LAN bw, or let's say...
Hello:
I believe what marktook says is right, when the DNS server went down, we could get connected to Unix server after a while.
I was wondering if there's any way to eliminate the reverse lookup IP for the Unix server either be on the Unix server or DNS server instead of add a static entry...
Sorry I missed this part:
We can ping by IP but not by name.
Can not telnet by name neihter IP.
My concern is why even we don't need name resolution the Unix servers depend on that DNS server.
Thanks
CELE1
This is the scenario:
We have and HP UX n windows servers (NT 4.0 and 2k). In our network environment one of the Windows servers is acting as the DNS and WINS for the entire network.
We have experienced some times this:
when this server (DNS)goes down it's not possible to Telnet to Unix...
Hello:
I'm new on SNMP/MIBs, in general terms I'm new on monitoring and I was wondering if anyone has some quick start guide on the use of SNMP (how to create communities, how many, which MIBs to use and so on).
Thanks in advance for yor help.
AE
For some reason whene celaning up the setings of one of my 3548 I ereased the flash and now is un-usable.
Can anyone drive me on how to recovery the flash or code of the switch?
Thanks
AE
Can anyone give a suggestion on a good network monitoring tool, I've been using Sniffer for a while, but this is not what we need, we need a more proactive tool, kind of combination o what Sniffer does and something that allows you to browse the entire network and see details (i.e. Response...
Check also at
http://www.antivirus.com/, look for InterScan Web Manager
http://www.checkpoint.com, CheckPoint FW-1 it's firewall and can also perform content filtering
But take in mind and I agree with Yizhar, may be there's no a cheap solution which does both.
Cheers
Thanks for those who have time to respond.
This is my doubt:
If you know that some one hack a Windows machine, how to know from which station and how it was done, in this particular case in a internal environment (same LAN).
Does any one have an idea, what can I do to audit/strike back since...
Thanks to all who answered.
The problem was solved just rebooting the PBX.
We just configured the trunk using same parameters as follows:
Signaling Mode:ISDN-PRI
Interface: Network
Line Coding: hdb3
Using DCS
The only change we made was change "Primary D-Channel" to different port
Cheers
I'm using a topology where we have a MS Ver. 2.0 Proxy Server before the Internet Firewall.
This Proxy is used for caching and as well as authentication (we use Windows password to get access Internet), the problem is that I haven't found the way to use/configure the proxy in the client in order...
I'm still having same problem, and it reduces the thing to the FAC's.
We can use other FAC's between stations from one loctaion to other like fordwaring and some others but no the FAC for switch the MWI between locations.
Any tip?
Thanks
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.