Webinar topic: MPLS on Router OS V7 - Part 1
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How MPLS on Router OS V7 works
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/SvZrYNA0-rQ
Webinar topic: MPLS on Router OS V7 - Part 1
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How MPLS on Router OS V7 works
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/SvZrYNA0-rQ
In this webinar, we start the discussion with an introduction to BGP like AS to AS connection, comparison BGP routing and traditional routing, also BGP peering. we then talk about problem that might occur during BGP peering, its effects, and the solution. finally we cover an example of how to configure BGP filter on mikrotik.
The recording is available on youtube (GLC Networks Channel): https://www.youtube.com/channel/UCI611_IIkQC0rsLWIFIx_yg
Webinar topic: MPLS on Router OS V7 - Part 1
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How MPLS on Router OS V7 works
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/SvZrYNA0-rQ
Network LACP/Bonding/Teaming with MikrotikGLC Networks
Webinar topic: Network LACP/Bonding/Teaming with Mikrotik
Presenter: Achmad Mardiansyah
In this webinar series, How Network LACP/Bonding/Teaming with Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/smRcyLE42hU
Cisco CCNA IP SLA with tracking configurationHamed Moghaddam
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Webinar topic: Mikrotik Load Balancing with PCC
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Load Balancing with PCC
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/3leJgk9u7Gw
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
How to manage internet clients of an ISP with PPPoE and MikroTik. For
centralized AAA (Authentication, Authorization and Accounting), freeRadius is used.
Webinar topic: Mikrotik Fastpath vs Fasttrack
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Fastpath vs Fasttrack
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/et6MwYY0dvo
Webinar topic: OSPF On Router OS7
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How OSPF On Router OS7
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/nuByFdZHvAg
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
In this webinar, we start the discussion with an introduction to BGP like AS to AS connection, comparison BGP routing and traditional routing, also BGP peering. we then talk about problem that might occur during BGP peering, its effects, and the solution. finally we cover an example of how to configure BGP filter on mikrotik.
The recording is available on youtube (GLC Networks Channel): https://www.youtube.com/channel/UCI611_IIkQC0rsLWIFIx_yg
Webinar topic: MPLS on Router OS V7 - Part 1
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How MPLS on Router OS V7 works
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/SvZrYNA0-rQ
Network LACP/Bonding/Teaming with MikrotikGLC Networks
Webinar topic: Network LACP/Bonding/Teaming with Mikrotik
Presenter: Achmad Mardiansyah
In this webinar series, How Network LACP/Bonding/Teaming with Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/smRcyLE42hU
Cisco CCNA IP SLA with tracking configurationHamed Moghaddam
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Webinar topic: Mikrotik Load Balancing with PCC
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Load Balancing with PCC
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording is available on Youtube
https://youtu.be/3leJgk9u7Gw
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
How to manage internet clients of an ISP with PPPoE and MikroTik. For
centralized AAA (Authentication, Authorization and Accounting), freeRadius is used.
Webinar topic: Mikrotik Fastpath vs Fasttrack
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing Mikrotik Fastpath vs Fasttrack
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/et6MwYY0dvo
Webinar topic: OSPF On Router OS7
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How OSPF On Router OS7
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/nuByFdZHvAg
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
In this webinar, we discuss a feature from mikrotik routerOS that is called fasttrack. This feature will improve routerboard performancce for particular connection. unlike fastpath, using fasttrack requires trigger from firewall filter/mangle.
Correct understanding of connection and connection-tracking is very crucial when configuring the trigger.
The recording is available on youtube (GLC Networks Channel): https://www.youtube.com/channel/UCI611_IIkQC0rsLWIFIx_yg
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriNETWAYS
ntop ist ein Open Source Network Monitoring Projekt fokussiert auf Network Traffic Monitoring. Durch das Aufkommen von modernen Computerarchitekturen und high-speed Netzwerken, mussten viele Komponenten umgestaltet werden, um die neuen Herausforderungen zu meistern. Das Monitoring von 10G-Netzwerken erfordert eine high-speed Paketerfassung/-übermittlung und effiziente Monitoring Applikationen. In den vergangenen Jahren hat ntop etliche Open Source Tools, Kernel Module und flow-basierte Applikationen, um high-speed Traffic Monitoring auf Standard Hardware zu ermöglichen. Dieser Talk wird Ihnen einen Überblick über die Vielzahl an ntop Monitoring Komponenten verschaffen und Ihnen ntopng vorstellen, die neuste Version von ntop. Außerdem werden Use Cases aufzeigen, bei denen sich diese Tools bewährt haben.
in this webinar, we will discuss one way to setup a stable OSPF network. that is how to select properly network type: default (broadcast), NBMA (non broadcast multiple access), PTP (point to point). we also discuss how OSPF works, how link state differs from distance vector, and discuss the benefit and drawback on each type. ospf drawback and ospf benefit
Similar to Bandwidth Monitoring - pfSense Hangout March 2015 (20)
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
2. Project Notes
● pfSense 2.2.1 is out!
– Security and bug fixes
● pfSense University on-line training
– More classes being added
● New ADI hardware will begin shipping within
the next few weeks
● Hangout software change likely next month
3. About this Hangout
●
Covering Bandwidth Monitoring using built-in methods and add-on packages
● Per-IP and aggregate monitoring
●
RRD Graphs
●
SNMP
●
Traffic Graphs (Widget, Status > Traffic Graphs)
● pftop
●
bandwidthd
●
darkstat
●
iftop
● ntopng
●
vnstat2
●
softflowd / Netflow
●
Not covering proxy-based tracking such as lightsquid or sarg
4. General Notes
● Many packages only allow for monitoring a single interface
– LAN is typically the best to monitor for tracking local user
behavior since it will show the user IP addresses
– In a fully routed setup, either WAN or LAN interfaces may be
monitored. WAN for Internet-bound traffic or LAN to also catch
local traffic
● Some packages such as bandwidthd and softflowd may
only report or graph once bandwidth has reached a certain
usage level. Quiet or practically idle interfaces may not
show any traffic even when there is a little traffic present
5. Monitoring Feature Comparison
Name Multi-I'face Per IP Graphs Built-In GUI NanoBSD Real-Time
RRD Yes No Yes Yes Yes Yes* No
SNMP Yes No n/a Yes Config Yes n/a
Widget/TG Yes Table Yes Yes Yes Yes Yes
pftop Yes * No Yes Yes Yes Yes
bandwidthd No Yes Yes No Yes Maybe No
darkstat Yes Yes I'face only No Yes Yes Both
iftop No * No No No Yes Yes
ntopng Yes Yes Yes No Yes No Both
vnstat2 Yes No Yes No Yes Yes No
Softflowd Yes * n/a No Config Yes n/a
6. RRD Graphs
● Status > RRD Graphs
● Offers historical, per-interface, total traffic, and per-interface
packets per second graphs
● Built into the base system
● Automatic and on by default, but can be disabled
● Stats are generated using pf counters, so they do not work
with the firewall (pf) disabled
● On NanoBSD the graphs are saved during a clean shutdown
or more often if configured to do so
● Data may be backed up in config.xml
7. SNMP
● Services > SNMP
● Enable, set community, etc.
● Requires an external SNMP monitoring system to
poll the SNMP data and produce graphs
– Cacti, Zabbix, many others
● Per-interface data only, not per-IP
● Some programs support near-real-time
throughput graphing depending on polling options
8. Traffic Graphs (Real-Time)
● Status > Traffic Graphs or Dashboard Widget
● Real-time representation of bandwidth on an
interface
● Status > Traffic Graphs has a table with some
momentary per-IP data (inside the interface subnet)
● SVG, requires a compatible browser
● Have to leave the browser open viewing the graph
to see usage over a (short) time span
9. pftop
● Diagnostics > pftop in the GUI
● Run “pftop” from the shell or option #9 at console/ssh menu
● Information is presented from the pf state table in real time
● pf must be enabled for it to function
● Shows traffic info by state, which includes the source IP
address, source port, destination IP address, destination
port
● List can be sorted in various ways: Age, Expiration, Packets,
Rate, Bytes, Source (From), Source Port, Peak, Destination
Port, None, or Destination (To)
10. bandwidthd
● Package – Install as usual
● Services > BandwidthD
● Check Enable, pick one Interface, check Draw Graphs, click Save
● Offers historical Per-IP address graphs with some protocol info (e.g.
HTTP) shown on the graph
● Users have had issues with the package over time (Service stops
running, install or uninstall issues, booting issues)
● Check Output CDF and Recover CDF to ensure data retention
● Does not hook into privilege system – Accessible to anyone that can
reach the GUI port without authentication
● May install on NanoBSD, but not recommended for use there
11. darkstat
● Package – Install as usual
● Diagnostics > Darkstat Settings
● Select Interfaces, click Save
● Click Automatic Reload for real-time total bandwidth usage graph
● Small, fast/light
● Has per-interface graphs but no per-IP graphs
● Has Per-IP totals/stats including a protocol breakdown
● Supports both IPv4 and IPv6
● Does not hook into privilege system
● Runs its own daemon on port 666, open to anyone who can reach the
firewall on that port without authentication
12. iftop
● Package – Install as usual
● Console only, no GUI menu entry or options
● Easy to use from the shell, provides useful real-
time feedback
● Run: iftop -nNpPi em0
● Several views, press T to toggle
13. ntopng
● Package – install as usual
● Quite large/heavy. The 800lb gorilla of monitoring!
● Visit Diagnostics > ntopng settings first!
– Set Password/Confirm, Interfaces, click Change.
– Set other options as desired
● To view data, visit Diagnostics > ntopng
● Runs its own daemon on port 3000 but includes its own
authentication system. Default credentials are “admin”
and the password set above.
● Has real-time and historical data, per-IP graphs, protocol
data, more information than most people would ever need
● By far the prettiest and best-looking of all options
14. vnstat2
● Package – Install as usual
● Status > vnstat2
● Check box to enable the frontend
● Visit the vnstati tab, pick interface, click Save
● Useful but limited
● Interface summary info and interface graphs, no per-host
data
● Does not hook into the privilege system, accessible to
anyone who can reach the GUI port without authentication
15. softflowd
● Package – install as usual
● Services > softflowd
● Exports netflow data to an external collector such
as nfsen, ntopng on another host, etc.
● The collector records and analyzes data, produces
graphs, etc.
● There is also pfflowd, but it currently does not work
on 2.2, similar to softflowd but uses pf counters.
16. Conclusion
● Several packages can be installed and run
simultaneously but do not install them all
● Questions?
● Ideas for hangout topics? Post on forum,
comment on the blog posts, Reddit, etc