Sponsored Content
Special Forums UNIX and Linux Applications Infrastructure Monitoring Monitoring VMWare servers with Nagios? Post 302797431 by jmedenf on Monday 22nd of April 2013 02:27:41 PM
Old 04-22-2013
Try bypassing the firewall to see if that is the problem.
 

8 More Discussions You Might Find Interesting

1. Infrastructure Monitoring

Installing Nagios on Solaris for Network and Server Monitoring

Nagios is a free, open source enterprise-class network and server monitoring system that can benefit your IT infrastructure. Bill Bradford describes how to install and set up Nagios on a Solaris 10 system. For this example Bill uses Solaris 10 update 6 running in 32-bit mode on a VMware virtual... (0 Replies)
Discussion started by: Linux Bot
0 Replies

2. Infrastructure Monitoring

Nagios monitoring question

All, Looking for a nagios plugin which can do the monitoring of a file which has a value and alert if the value in the file goes more than 100 or so. Any help is appreciated. (0 Replies)
Discussion started by: uxadmin007
0 Replies

3. Infrastructure Monitoring

Nagios monitoring for switches.

Hi, I have configured check_snmp plugin and using the plugin i am able to monitor the uptime of the switch. But the following fails # /usr/local/nagios/libexec/check_snmp -H 10.10.10.1 -C ready -o ifOperStatus.1 -r 1 -m RFC1213-MIB SNMP CRITICAL - *down(2)* | # Any suggestions ? (1 Reply)
Discussion started by: uxadmin007
1 Replies

4. Infrastructure Monitoring

freeBSD CPU monitoring using nagios

Hi all, I am not being able to monitor CPU of freeBSD machine from my CentOS server. I have used check_aix_cpu but always gives garbage value, seems wrong in scripting. i want to monitor CPU usage of my freeBSD machine from my centOS server. I am able to monitor many services of that machine... (0 Replies)
Discussion started by: gsuwal
0 Replies

5. Infrastructure Monitoring

Noc for multiple nagios servers

I am trying to gather ideas for building a NOC setup that will be able to monitor 12 separate nagios servers there are located in different datacenters and are accessed via a ssh tunnel. Anyone have any ideas on the best setup for this? (0 Replies)
Discussion started by: eugenes18t
0 Replies

6. AIX

Is nagios monitoring tool supported on AIX 7.1 ?

Hi, is any one using nagios monitoring solution on AIX ? if yes, is it supported on AIX 7.1 TL 03 as well ? I tried to search online and unix.com , could not find it. Thank you (5 Replies)
Discussion started by: aaron8667
5 Replies

7. Infrastructure Monitoring

Nagios exchane DB monitoring

Hello All, I have urgent requirement to monitor Exchange Database (TESTDB) disk space and it is under Disk3 partition. Currently installed NSClient++ in Exchange server. We have Nagios Xi installed in another server. Can you let me know what are configuration files that I need to modify. ... (0 Replies)
Discussion started by: bsivavani
0 Replies

8. Infrastructure Monitoring

How to monitoring windows process using nagios CheckProcState?

Hello, I am trying to get correct syntax to monitoring process running on windows server using CheckProcState. when i am trying below command whether notepad.exe running or not. its showing process running. Could you please provide me correct syantx. /usr/local/nagios/libexec/check_nrpe -H... (0 Replies)
Discussion started by: ghpradeep
0 Replies
fwb_ipt(1)							 Firewall Builder							fwb_ipt(1)

NAME
fwb_ipt - Policy compiler for iptables SYNOPSIS
fwb_ipt -fdata_file.xml [-4] [-6] [-V] [-dwdir] [-i] [-ooutput.fw] [-Ofw1_id,fw1_output.fw[,fw2_id,fw2_output.fw]] [-v] [-xc] [-xnN] [-xpN] [-xt] object_name DESCRIPTION
fwb_ipt is a firewall policy compiler component of Firewall Builder (see fwbuilder(1)). Compiler reads objects definitions and firewall description from the data file specified with "-f" option and generates resultant iptables script. The script is written to the file with the name the same as the name of the firewall object, plus extension ".fw". The data file and the name of the firewall objects must be specified on the command line. Other command line parameters are optional. OPTIONS
-4 Generate iptables script for IPv4 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these rules. Options "-4" and "-6" are exclusive. If neither option is used, compiler tries to generate both parts of the script, although generation of the IPv6 part is controlled by the option "Enable IPv6 support" in the "IPv6" tab of the firewall object advanced settings dialog. This option is off by default. -6 Generate iptables script for IPv6 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these rules. -f FILE Specify the name of the data file to be processed. -o output.fw Specify output file name -O fw1_id,fw1_output.fw[,fw2_id,fw2_output.fw] The argument is a comma separated list of firewall object IDs and corresponding output file names. This option is used by fwbuilder GUI while compiling firewall clusters. -d wdir Specify working directory. Compiler creates file with iptables script in this directory. If this parameter is missing, then ipta- bles script will be placed in the current working directory. -v Be verbose: compiler prints diagnostic messages when it works. -V Print version number and quit. -i When this option is present, the last argument on the command line is supposed to be firewall object ID rather than its name -xc When output file name is determined automatically (i.e. flags -o or -O are not present), the file name is composed of the cluster name and member firewall name rather than just member firewall name. This is used mostly for testing when the same member firewall object can be a part of different clusters with different configurations. -xt This flag makes compiler treat all fatal errors as warnings and continue processing rules. Generated configuration script most likely will be incorrect but will include error message as a comment; this flag is used for testing and debugging. -xp N Debugging flag: this causes compiler to print detailed description of the policy rule number "N" as it precesses it, step by step. -xn N Debugging flag: this causes compiler to print detailed description of the NAT rule number "N" as it precesses it, step by step. URL
Firewall Builder home page is located at the following URL: http://www.fwbuilder.org/ BUGS
Please report bugs using bug tracking system on SourceForge: http://sourceforge.net/tracker/?group_id=5314&atid=105314 SEE ALSO
fwbuilder(1), fwb_ipf(1), fwb_pf(1) FWB
fwb_ipt(1)
All times are GMT -4. The time now is 06:10 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy