How to use mrtg to monitor traffic on your wireless and wired network

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

The VeriTrak Enterprise Application Created for The Verification Company By CTO Source, Inc. This presentation provides an overview of the system and links.
Network Performance Measurement
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Network Operations and Network Management.
Advanced Workgroup System. Printer Admin Utility Monitors printers over IP networks Views Sharp and non-Sharp SNMP Devices Provided Standard with Sharp.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Monitoring network traffic of Cisco 2950 switch and Cisco 1600 router Group 4 Ishan Shah (CIN: ) Jyotsna Mishra (CIN: ) Parth Chavda (CIN: )
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Insuring your WISP by Jeremy Anthony Kinsey a bella mia company.
Measuring Performance Chapter 12 CSE807. Performance Measurement To assist in guaranteeing Service Level Agreements For capacity planning For troubleshooting.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Confidential property of Belkin International. Unlawful to copy or reproduce in any manner without the express written consent of Belkin International.
Enterprise Network Security Accessing the WAN Lecture week 4.
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
The Pros and Cons of Collecting Performance Data using Agentless Technology Dima Seliverstov John Tavares Tianxiang Zhang BMC Software, Inc.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Networking Components Chad Benedict – LTEC
Experiences in Analyzing Network Traffic Shou-Chuan Lai National Tsing Hua University Computer and Communication Center Nov. 20, 2003.
REMOTE ACCESS Research Data Management. On Campus There are two networks – the staff network and the student network. Staff network: Access to the shared.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
 2000 Deitel & Associates, Inc. All rights reserved. Chapter 24 – Web Servers (PWS, IIS, Apache, Jigsaw) Outline 24.1Introduction 24.2Microsoft Personal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
Copyright MCL-Technologies v MCL-Collection MCL-Link.
TEAM Basic TotalElectrostatic ManagementAwareness&
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Network and Server Statistics using Cacti. Introduction A tool to monitor, store and present network and system/server statistics Designed around RRDTool.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
Chapter 19: Network Management Business Data Communications, 4e.
A powerful network monitoring system
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Copyright © 2004 Insight Technology, Inc. All Rights Reserved. 1 Performance Insight for Oracle 5.2 V.S Oracle Enterprise Management
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
How to use mrtg to monitor traffic on your wireless and wired network a bella mia company.
Web-based Application Includes: –Integrated Web Server –Integrated Database.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Page PearsonAccess™ Technology Training Online Test Configuration.
Network Monitoring Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Technology Audit Brandon Hall.
Gateway HDL-MBUS01IP.431.
Instructor Materials Chapter 1: LAN Design
Application or server monitoring
Lab A: Planning an Installation
Configuration and Monitoring
Network Operations and Network Management
Instructor Materials Chapter 9: Testing and Troubleshooting
CompTIA Server+ Certification (Exam SK0-004)
Chapter 6 Network Performance Measurement
The Internet.
Traffic Analysis with Ethereal
Lecture 6: TCP/IP Networking By: Adal Alashban
Printer Admin Print Job Manager
LINKSYS SUPPORT NUMBER. Linksys Support Number for upgrading firewall, Installation and Repair and Connecting Device and Fix Error Messages by Linksys.
Title: Tech Training Certificate: Ace of Initiative Program
KEEPING IT UP How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
CT 1306 Communication Networks Management Lab
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Linux and TCP/IP Networking
Chapter 15: Network Monitoring and Tuning
STATEL an easy way to transfer data
Presentation transcript:

How to use mrtg to monitor traffic on your wireless and wired network a bella mia company

A Little Background Josh Easton CTO at Bella Mia, Inc. Been an ISP for 8 years In our 4th year as a WISP Part-15 WISP of the Year WISPCON III Part-15 Member Regular Speaker at WISPCON. Located in South East Wisconsin

How do you know what your customers are doing?

Why should I monitor traffic? To determine how much of your network capacity is left Collect statistics on what your average customer needs for bandwidth Allows you to tell customers when they should buy more bandwidth from you Helps when diagnosing problems

How does mrtg work Collects data via SNMP Record`s an interface`s traffic counters every 5 minutes Places data in a fixed-size log Creates graphs, updates web page

What is SNMP? Simple Network Management Protocol UDP based, port 161 Community name functions as a password Many implementations allow access control via IP address

What do I need to run mrtg Under Windows NT/2000: Mrtg itself ActivePerl FireDaemon Under Unix: Mrtg package or source code Perl, standard on almost all systems

What else do I need? Devices that support snmp A web server to host the page generated by mrtg

How to set it up Set up devices you want to monitor Configure community names, allow machine running mrtg to monitor it Install mrtg and support software Create a configuration By hand with a text editor Using cfgmaker script Or a combination of both Test out configuration Setup automated process to run mrtg periodically Create a cron job or background process

Now for some examples

Presentation presented and created by Questions? Presentation presented and created by Josh Easton Thank you for your attention! A PPT copy of the presentation can also be found online at: http://wispconVII.mia.net/ppt/mrtg.ppt a bella mia company Copyright 2005 bella mia, inc.