How to trace IP address ports and request comming to network interfaces

Hi all,
I am using Solaris IP filter. I need to check the requests that is comming to a patiquler interfaces.
Is there any possibilities to get the IP address: Port, weather the request is Deny from the server etc....
Thanks.
Viraj

Lian,
Did you find a solution?? If still looking, talk to Triometric, they can monitor and log this, a side effect of performance monitoring.
Have fun

Similar Messages

  • How  to configure website address to http request

    hi
    How to configure website address to http request
    (I want access JBOSS URL: http://localhost:8080/HIS/Login using website like www.HIS.com)
    Please help me.

    What I'm trying to do is connect my laptops built in wifi adapter to my home network and connect my usb wifi adapter to my phones hotspot then combine the bandwidth into one stream so that my speed is faster.

  • Had to wipe my drive so I could do a clean install of snow leopard Now I look every where on how to move bookmarks, address book and I cal settings.  I have them back up on a external drive with Time machine but can not move, copy or restore my old sett d

    Had to wipe my drive so I could do a clean install of snow leopard.   Now I have look every where on how to move bookmarks, address book and I cal settings.  I have them back up on a external drive with Time machine but can not move, copy or restore my old settings.  The instructions I have found or no help or needs more clarafication on what to do.

    Use migration assistant to move your files.  http://support.apple.com/kb/HT4889

  • How to trace changes in directories and files in windows using java.

    Hi,
    Want to know how to trace changes in directories and files in windows using java.
    I need to create a java procedure that keeps track of any changes done in any directory and its files on a windows System and save this data.
    Edited by: shruti.ggn on Mar 20, 2009 1:56 AM

    chk out the bellow list,get the xml and make the procedure.....     
         Notes          
    1     Some of the similar software’s include HoneyBow, honeytrap, honeyC, captureHPC, honeymole, captureBAT, nepenthes.     
    2     Some of the other hacking software’s include keyloggers. Keyloggers are used for monitoring the keystrokes typed by the user so that we can get the info or passwords one is typing. Some of the keyloggers include remote monitoring capability, it means that we can send the remote file across the network to someone else and then we can monitor the key strokes of that remote pc. Some of the famous keyloggers include win-spy, real-spy, family keylogger and stealth spy.          
    3     Apart from theses tools mentioned above there are some more tools to include that are deepfreeze, Elcomsoft password cracking tools, Online DFS, StegAlyzer, Log analysis tools such as sawmill, etc.

  • How to trace Very Long SQL and PLSQL?

    Hi,
    i need an advice on how to trace very long PLSQL as iam new to my company and the business is very new to me , i am a very good developer using Developer suite , but my weak point is tracing very long packages and undestand them ,
    i want to trace a Procedure that have a LOT of lines of code and it calls many other packages, i really need to be quick in undestading what this procedre is doing as i should solve my problem in appropriate time
    i am using dbms_output.put_line for tracing, to know what is the path that is taken and the variable values but i think i need a totaly different approach
    also there are some sqls in this system that is very long, some of them is joining more than 10 tables at the same time, any hint to understand what this sql is doing?
    any help is appreciated.

    There is a trace facility for PL/SQL, but if you use it find a GUI interface. Trying to get it to work in SQL*PLUS standalone was painful. I think its supported by the major GUI tools like TOAD and PL/SQL developer but have not used it myself.
    Other tools you can work with to help you debug and tune PL/SQL include Oracle trace (which analyzes SQL for efficiency, with an interpreter called tkprof) and DBMS_PROFILER. DBMS_PROFILER requires some initial set-up but can analyze PL/SQL code line by line and if used carefully function as a sort of limited trace.
    Good luck!

  • How to get the server port and id from the Initialcontext

    hi
    i know that i can get the server port and id where the jndi service is listening from the InitialContext ( when i create InitialContext ic = new InitialContext(); from within a EJB. ). Does this work on any application server and where (at what position is for example the port) in the Enumeration at the ic are the different things put?

    I would usually just get the PROVIDER_URL property from the InitialContext and use that to determine the location of the naming service:
    String providerURL = (String)ic.getEnvironment().get(Context.PROVIDER_URL);You'll then need to parse that string to obtain the port and the server name. For example:
    // Assume that the provider URL is of form "protocol://server:port"
    int serverStartIndex = providerURL.indexOf("://" + 3);
    int serverEndIndex = providerURL.indexOf(:, serverStartIndex);
    String server = providerURL.substring(serverStartIndex, serverEndIndex);
    String port = providerURL.substring(serverEndIndex + 1);It's a fairly universal approach but there'll doubtlessly be some special cases (for example, the provider URL could be null and the InitialContextFactory class defaults it).
    You might have to adjust the server/port parsing stuff a bit as I just made that up and your URL might not conform to the pattern I described.
    Hope this helps.

  • How to set up full access and limited access wireless networks to laptops

    Dear Apple,
    I just received my Apple 1 TB Time Capsule. Can someone please help me with a network configuration I want to set up?
    I have a cable modem, and, three computers: a G4 iMAC (system 10.5.5), an Apple MacBook (system 10.5.5), and, a PC laptop.
    The Time Capsule is connect directly to the cable modem.
    Regarding the computers:
    (1) I want the G4 iMAC to connect directly, via an Ethernet cable, to the Time Capsule, WITH FULL ALLOWED ACCESS to the Time Capsule and to the back-up function of the Time Machine feature, and, with allowed access to my HP inkjet printer (class 6110);
    (2) I also want the MacBook laptop to wirelessly link to the Time Capsule via the Airport utility on the laptop, and, WITH FULL ALLOWED ACCESS to the Time Capsule and to the back-up function of the Time Machine feature (using WPA/WPA2 security, and, without the network name visible to third parties), and, WITH allowed access to my HP inkjet printer (class 6110);
    (3) I want the PC laptop to wirelessly link to the Time Capsule (using WEP security), but WITHOUT ACCESS to the Time Machine, WITHOUT access to the back-ups on the iMAC, WITHOUT access to the back-ups on the MacBook, and, WITHOUT access to the inkjet printer --- I only want the PC to use the Time Capsule as a WIRELESS ROUTER so that the PC laptop can access the internet.
    (4) And, finally, I want to specify (Time-Capsule/Time-Machine/server ) access ONLY to the iMAC and the MacBook, so that others cannot gain any access.
    I specifically need help to set up and configure the Time Capsule so that the PC laptop, as stated above, should have limited access to the Time Capsule --- namely, only to access the internet, and, not even be aware of stored data on the Time Capsule, not even be aware of the inkjet printer, and, not even see my WPA network name when the PC scans for wireless devices.
    I also want the iMAC and the MacBook to have access to each other’s data stored on the Time Capsule (like a common server).
    I have an old D-Link DI-624 wireless router that I used before buying the Time Capsule, which is available, if needed. Hopefully, I can configure the Time Capsule so that I would not need the old D-Link.
    Thank you in advance,
    David.

    The basic method for remote access is not changed.
    http://gigaom.com/apple/access-your-time-capsule-over-the-internet/
    You have a few issues.
    The really big one.. the school firewall should not let you connect to home.
    Check the IT admin at your school but if they allow anything but a few protocols like http and https through, they are not doing their job. You cannot afford in a large network to have every Tom Dick and Harry access any open device.. that can introduce viruses and trojans into the network behind the firewall.
    The general method for remote access on large networks is vpn and the TC offers no vpn connection.. just AFP.
    If you intend using 3G wireless stick or the like then you can get access.
    The next issue is static public IP or how to find the TC.. you need some way to find the IP if your ISP does not offer static ip, and the tc has no dyndns client. Since Apple shut down new users for mobileme and will close that service there is no method to find the TC IP without owning your own domain. You would be better placing the TC in bridge behind a router that does offer dyndns and port forward AFP (TCP 548) to it.

  • Iphone 4 was water damaged has had new battery as wasnt charging and new docking port and it comes on to apple logo now then off after 10 to 15 secs and reboots any help please

    water damage iphone 4 was coming on when plugged in but not charging and not holding any power so changed battery it then worked untill battery power ran out and would not charge so changed the docking port and now it comes on with apple symbol and switches back off after 10 to 15 seconds like its rebooting and then just keeps repeating any help please

    Help with what? Apple does not repair iPhones, they replace them. Apple does not sell parts. There are no legitimate sources for iPhone parts.
    Talk to whoever did the initial repair.  Odds are the logic board is damaged.  It's probably time for a new phone.
    Your phone is no longer eligible for a discounted out of warranty replacement.

  • How can i load a swf AND connect to a network location?

    I'm working on a fairly large framework application that
    consists of a large number of seperate files (swfs, stylesheets,
    xml etc etc) all being loaded in and then connecting to a remote
    server.
    My problem is that when i compile all my library swfs with
    -use-network=false all is well - until i try a
    NetConnection.connect() call, when i get told i can't connect to an
    internet url from a local-with-filesystem swf.
    Ok, so i created a .cfg file and placed it in the
    FlashPlayerTrust directory, indicating that i'm giving permission
    for everything in my 'deploy' directory to be trusted - which
    should allow it to do anything it like (load files AND connect to
    the network). But after doing that i no longer get any sandbox but
    my NetStatusEvent is never fired! I receive neither a success or
    failure message from the NetConnection... it just sits there and
    nothing happens...
    Can anyone point me in the right direction, there seems to be
    precious little information about situations like this, just a lot
    of people asking similar questions...
    Thanks
    T

    like i said in the original post the framework is a series of
    libraries, they're loaded at runtime depending on what's required.
    if i have the netconnection in a single swf it'll work in the
    standalone player or in IE or FF.... it'll work if i launch it
    locally and connect to a remote server, or when i put it on the
    server and access it through a browser.
    it's when it goes into one of the libraries that it fails -
    so a base swf loads a configuration file which tells it which
    libraries it'll need, one of those libraries contains the
    netconnection code - and the NetStatusEvent of the NetConnection is
    never fired - so i neither succeed nor fail in my connection
    attempt
    T

  • How to detect ipaddresses of other systems in a given network Interface ??

    Guys ... I know only the Network Interface and I want to know the IPAddresses that have been assigned to the other systems on that Network Interface .. I m making an application on packet sniffing..
    I want to show the list of hosts on a given Network Interface or device when a User selects one..
    but I just can't seem to find a method ...
    I know this is kinda easy .. but plz help me out..
    eg:- The User selects Nvidia Ethernet device...
    then i want to display all the computers that are connected to the Nvidia Ethernet device ..
    in short , I want to know ip addresses of other systems on a network ........

    itssumitrai wrote:
    Well... yeah I m making use of jpcap ..
    and yeah just as windows generates a list of computers on a network , I wanna show
    the list of computers along with their Ip addresses reachable vi a network interface ....
    Certainly there would be a way to access that very information using the Windows OS API.
    And plz .. its pretty clear what i want to do .. just help me out instead of finding mistakes in terms ....Help...
    Unless you are the owner of that network then I suggest that you get permission in writing (pen and ink rather than email) before doing whatever it is that you want (unless you use the windows API).
    People have been fired, expelled and had civil/criminal legal proceedings against them for network scanning even when they thought they had permission.

  • How to trace MAC  Address Of a Machine with PL/SQL

    As MAC Address Of a Machine is Unique, for security, how to use trace the MAC Address of a machine on a WAN/LAN and record it in the database.Please note that it is important part of Audit Trail

    MAC ADDRESS is unique, whereas IP Address is variable. Experienced user can very easily change (fake) MAC address.
    Maybe you will be surprised it is trivial as changing of IP.
    You may be able to build a component that is external to the database that can determine a MACOn linux (for example) you could use "arping" command or retrive MAC adressess from arp cache using "arp" command. arp cache stores MAC adresess of all computers which are or was connected to machine. These commands can run only privileged user (root) but you could give execute privilege for specific user (oracle) via "sudo". You can execute this commands using external procedure or call it from Java stored procedure.
    It think tracking of IP will be enough beause IP must be unique on network (or in specific subnet).
    So MAC tracking is waste of time (IMHO).

  • How do I share address book and calendars with other iCloud users?

    I guess the title of the discussion question says it all.
    My wife, and other family members want to SHARE Contacts, Calendars etc... with other iCloud users.
    Simple task... most people would want to do it...
    But... I can't find an easy answer... how do I do it?

    Roger, thanks... I had continued my search and found this information on the discussion.
    Now, my biggest concern is the ADDRESS BOOK... I'd like to publish, specific GROUPS within my master Address Book to other iCloud users... with either Read Only, or Read Write permisions.
    Do you have any knowledge or suggestion on how that can be accomplished in iCloud?
    It seems as though this would be FOUNDATIONAL in iCloud if APPLE expects it to be a USABLE SERVICE.
    Thanks for your help...

  • How do I reinstall Address Book and iCal in Lion?

    Title says it all. I deleted iCal and Address Book long ago with AppZapper. Now that I have an iPhone, I actually have need of those apps. Problem is, I have Lion, and thus do not have an install disk. How would I go about reinstalling those apps in Lion?

    Reinstalling Lion/Mountain Lion Without Erasing the Drive
    Boot to the Recovery HD: Restart the computer and after the chime press and hold down the COMMAND and R keys until the menu screen appears. Alternatively, restart the computer and after the chime press and hold down the OPTION key until the boot manager screen appears. Select the Recovery HD and click on the downward pointing arrow button.
    Repair the Hard Drive and Permissions: Upon startup select Disk Utility from the main menu. Repair the Hard Drive and Permissions as follows.
    When the recovery menu appears select Disk Utility. After DU loads select your hard drive entry (mfgr.'s ID and drive size) from the the left side list.  In the DU status area you will see an entry for the S.M.A.R.T. status of the hard drive.  If it does not say "Verified" then the hard drive is failing or failed. (SMART status is not reported on external Firewire or USB drives.) If the drive is "Verified" then select your OS X volume from the list on the left (sub-entry below the drive entry,) click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the main menu.
    Reinstall Lion/Mountain Lion: Select Reinstall Lion/Mountain Lion and click on the Continue button.
    Note: You will need an active Internet connection. I suggest using Ethernet if possible because it is three times faster than wireless.

  • How to determine IP address of client request in CORBA

    Hello
    does anyone know of a way to determine which peer is making the invocation of a method in CORBA?
    I need to find a way to determine the IP address of the calling peer, but at the server-side and NOT by passing the IP address as an argument with a method invocation like the following method:
    void foo(in string ipAddress);
    The above method declaration is in the .idl file.
    Thank you in advance

    There's no portable way to do this and I don't know if / how it's possible with the Sun ORB (the one available in the J2SE).
    It is possible with the latest versions of JacORB (www.jacorb.org) - a free LGPL Java ORB. The feature is undocumented (as yet) but if you can decompose unit test code you can see how it works in the code in this directory:
    http://www.jacorb.org/cgi-bin/cvsweb/JacORB/test/regression/src/org/jacorb/test/transport/

  • How do I restore address book and emails lost when I upgraded to current version?

    First, I am not a tech savvy guy, so please be patient with me.
    Last Friday, my email stopped. Message on the screen said "Inbox is full. Delete unwanted messages to make room" etc.
    First, I went to Help/Tools and upgraded to the newest version. That did not solve the problem.
    I couldn't find anything on Mozilla/Thunderbird site that seemed to fit the problem, so I contacted my service provider, XMission.
    After trying several things, and guiding me through several things that I did not really understand (see 1st line above), he then guided me to the Mozilla web site and had me download a new version from there. (His explanation was that probably there was something in my longtime Mozilla/Thunderbird installation that had become corrupted). So I did that.
    We finished about 2 AM, and the "Inbox" appeared to be working, and all of a sudden email from last Friday through to early this morning appeared in the inbox. So I thought the problem was solved.
    Alas, this morning, when I got looking through things, I discover that my address book is gone, and all my archive files, going back several years. I contacted XMission again, and they told me I had been contact Mozilla.

    yeah, about time you stopped following their bad advice anyway. The fix was originally simple. Now not so much.
    So 20 question time. I am asking each question for a reason. please answer them all.
    In the windows start menu... type %appdata%\thunderbird\profiles and press enter
    In the explorer windows that opens, what folders are shown? (Names please)
    On Thunderbirds help menu select troubleshooting information and click the show folder against profiles.
    What folder does explorer open into this time? (it will be one of those you listed before I hope.)
    Is there only a few incoming emails in your inbox in the mail profile your currently using? (I hope so.)

Maybe you are looking for

  • I need to change the decimal sign from a ,  to a . in a worksheet - please help!!

    Im fresh from a Windows background and struggling to get started on the NUMBERS program - I need to change the ,  to a . for decimal numbers (the NUMBERS program does not seem to recognise the . but when I change the separator to a ,  it works - prob

  • My mp3 gt pro hear radiao noe side gt sound n music both side gt so

    y hear music both side gt sound when i hear radio one side gt sound n other side dun haf sound i using creative muvo N200 how 2 slove e problem can tell mi pls

  • How to set a page item to either of two sources?

    Hello Folks, I would like some advice with the following: On P1 there is a text field, say p1_text. The users enters a value into p1_text. This is validated. If the p1_text value validates OK, and the next button is pressed, there is a branch to page

  • Exceptuions table name

    hi, I have created a mapping and in the configuration I have set the "Exceptions table name" parameter to "schema_name.exception_table". What does this mean.....is it that all the records that caused exception are dumped into this "exception_table".

  • Index management in TREX

    Hello all, We have a webshop running and are using TREX for the product catalog. The catalog is replicated from ECC using program ISA_CATALOG_REPLICATION. Something seems to have gone wrong since there are a lot of indexes on TREX where there should