04-01-2014
(The grep is a bit loose.) Maybe it is a proxy, router or firewall. A proxy hides and handles many users' browser connections. A common home/wifi router uses one IP for all the 192.168.*.* hosts behind it. A firewall can support several kinds of proxy-like features. OF course, a browser not using http/1.0 persistent can have many connections, but they are transient.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
In my organization in order for anyone to go to any Unix server they have to go through "SERVER A" and login as themselves.
Then people are free to go enywhere they please.
For example:
SERVER A, loggs in as himself
telnets to SERVER B, loggs in as guest
telnets to SERVER C, loggs in as... (8 Replies)
Discussion started by: jraitsev
8 Replies
2. UNIX for Dummies Questions & Answers
Can someone please explain the difference between a connection and a thread. Any explanation will help!
Thanks (3 Replies)
Discussion started by: suntan
3 Replies
3. UNIX for Dummies Questions & Answers
Hello there, just a quick question.....Can someone please explain the concept that enables you to establish a connection using the same userId
Thanx (1 Reply)
Discussion started by: BigTool4u2
1 Replies
4. UNIX for Dummies Questions & Answers
Say, for instance, that you are running a website. You are playing around, using netstat, etc. You notice all the people whom are connected to the site. You then wonder if there is a way to kill one or more of these connections. However, they are not PIDs so could you use the kill command? I was... (1 Reply)
Discussion started by: Phobos
1 Replies
5. HP-UX
Hello All,
I have 2 qries about X connections on HP-UX :
1.How/where to determine whether "X connections" to the server are controlled.
2. How/where to determine whether "X11 connection" are tunnelled via ssh.
3. How/where to determine the "Time in minutes before unattended X terminals... (0 Replies)
Discussion started by: abhayh
0 Replies
6. SCO
Hi There
Is there a maximum number of concurrent incoming uucp connections to a server?
SCO Openserver 5.07
Is there a parameter in some config file where this can be changed?
Thanx (5 Replies)
Discussion started by: wjace
5 Replies
7. Red Hat
Hi,
I am running JBOSS 6 ona RHEL5 server put it continuously crashes due to the number of CLOSE_WAIT connections on port 8080.
How can I kill the several hundred CLOSE_WAIT connections without killing the actual live "LISTENING" connection?
R,
D. (2 Replies)
Discussion started by: Duffs22
2 Replies
8. AIX
I am using AIX 5.3, its a application server, i am giving the support of OS & Hardware only, now i want to check how many connections are connected to my server, means how many people using my server.:confused: (4 Replies)
Discussion started by: reply.ravi
4 Replies
9. Solaris
Hi All!
Please help me with this situation:
I have 3 servers configured with the following network 10.100.48.xx and I have configured on the passwordless connection, and it is working fine.
Now the app vendor ask me to configure a 2nd IP address on each of the 3 servers with a different IP... (4 Replies)
Discussion started by: fretagi
4 Replies
10. UNIX for Advanced & Expert Users
I have a static IP 47.21.154.146 and two computers which I wish to talk to each other. The two IPs are 198.168.1.5 and 198.168.1.6.
How do I do it. For example ls from one computer to the other.
TIA (8 Replies)
Discussion started by: Meow613
8 Replies
LEARN ABOUT DEBIAN
welf_proxy2dlf
WELF_PROXY2DLF.IN(1) LogReport's Lire Documentation WELF_PROXY2DLF.IN(1)
NAME
welf_proxy2dlf - convert logs in WebTrends Enhanced Log Format to proxy DLF
SYNOPSIS
welf_proxy2dlf file
DESCRIPTION
welf_proxy2dlf converts firewall logs in the WebTrends Enhanced Log Format into the proxy DLF.
That format is defined at the following URL: http://www.netiq.com/partners/technology/welf.asp
This converter also supports the SonicWall extensions.
A list of firewall products that supports that format can be found at the following URL: http://www.netiq.com/products/fwr/compatible.asp
EXAMPLES
To process a log as produced by a WebTrends proxy:
$ welf_proxy2dlf < welf-proxy.log
welf_proxy2dlf will be rarely used on its own, but is more likely called by lr_log2report:
$ lr_log2report welf_proxy < /var/log/welf-proxy.log
IMPLEMENTATION NOTES
Welf log files contains information about many applications: proxies, packet filters, IDS. IDS and packet filters information is handled by
the firewall superservice, whereas the proxy information is handled by the proxy supersevice.
This converter will only convert records with a proto, src and dst field. All other records are ignored (they won't be ignored by the
firewall superservice).
SEE ALSO
Lire::WELF(3) welf2dlf(1)
AUTHORS
Francis J. Lacoste <flacoste@logreport.org>
VERSION
$Id: welf_proxy2dlf.in,v 1.8 2006/07/23 13:16:36 vanbaal Exp $
COPYRIGHT
Copyright (C) 2001 Stichting LogReport Foundation LogReport@LogReport.org
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with
http://www.gnu.org/copyleft/gpl.html.
Lire 2.1.1 2006-07-23 WELF_PROXY2DLF.IN(1)