Experience Sharing: Network Management Security log server traffic monitoring

Source: Internet
Author: User
Keywords Traffic monitoring network management security log
Tags data data center ddos function hardware hardware devices listed monitor
Commonly used flow monitoring software has du Meter, MRTG, PRTG, SolarWinds and so on. Now there are also many hardware devices also have the function of traffic monitoring. Then how does the data center engine room monitor the incoming and outgoing traffic of our server? The four software listed above except du meter, the other three software are able to monitor each switch port. You might say that the software monitors the switch, not my server traffic. The flow monitoring software is in fact the use of SNMP (simple receptacle Management Kyoto, easy Network Management protocol or Small Network Management Protocol) to monitor the flow of the switch. Since your server has been in the data center staff of the official room shelves, officially connected to the Internet the moment, your server traffic has been recorded by their monitoring, once you have any problems with the server traffic, they can send traffic map to you at any time. SolarWinds can reflect the flow of the port at the top of the switch in different colors, and it has a lot of gadgets that can be used for network management. Once the data center staff found that your server traffic is not normal, they will take the appropriate measures, that is, on the switch to your server on the port to speed limits (data centers are using Intelligent network management type of switch, The switch contains many commands to control the switch and the packet through the switch, and then notifies you that the server traffic is not normal, and then you log on to the server to find out why. Of course, if your server traffic is abnormal because of the Dos/ddos, data center staff will contact you the first time, if you have the conditions, they will help put your server against Dos/ddos attack system. (Dos/ddos, denial of service/distributed denial of service, denial of service) is the use of a large amount of data packets beyond the target processing ability to consume available systems, bandwidth resources, resulting in paralysis of network services an attack. Flow monitoring of the specific implementation of the technology in this is not detailed, if you are interested in, you can look for online, a lot of tutorials waiting for you to explore it, the majority of MRTG, solarwinds mainly. Don't blame me for losing your appetite, technology needs to be put in your brain. I said here that you might remember it today, but you may forget it in two days. Or the sentence: computer this thing is very practical. Do it yourself, the impression in the brain is much deeper than I told you.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.