Sponsored Content
Special Forums IP Networking I would like to monitor network traffic for a computer on my network Post 302998094 by cb88 on Thursday 25th of May 2017 12:42:28 AM
Old 05-25-2017
Quote:
Originally Posted by Corona688
pentium 4 is a bit old, unless it has 1g ram or more.
It's still more than 1-2 orders of magnitude faster than the original Pi. And probably 2-5x faster than a Pi2.

That said you could get a $2 USB Ethernet adapter on ebay ... and plug it into the pi and experiment with that. The Pi will probably show your internet down since it's peripherals all hang off it's overloaded USB bus.

The P4 ought to handle it with ease... as far as that goes lots of people have used much slower machines for routers/firewalls. Rather than using wireshark which is a rather heavy handed but comprehensive solution, you just do as suggested here with dnsmasq How to log all my DNS queries? - Unix & Linux Stack Exchange

And filter the log for dnsmasq output.... just about as good as wireshark and probably more performant than running without the system as now your dns queries are cached by a local machine. The TCPDUMP answer there is also good.

If you get it working on the P4 getting a mini PC is probably a decent idea... as the power savings alone will pay for itself. A P4 computer costs between $100-300 a year to leave running vs the mini PC costing about 10 bucks a year.

Last edited by cb88; 05-25-2017 at 01:49 AM..
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

monitoring network traffic

there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat thanks (6 Replies)
Discussion started by: yls177
6 Replies

2. Cybersecurity

How to capture network traffic

Hi, Can someone give me the clue on how to capture network traffic at gateway. Thanx (2 Replies)
Discussion started by: kayode
2 Replies

3. Programming

Help in developing a Network Appliation to monitor pc in a network

I am developing a Network Appliation to monitor computers in a network. Specs are App monitors the current web page viewed in each system App also can shutdown the computer in the network App can show all process run by each computer in the network I am now confused how to start my... (2 Replies)
Discussion started by: valaparambil88
2 Replies

4. Infrastructure Monitoring

Network Traffic

Hi all, Got a strange one here, well not so much strange, different :-) I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies

5. HP-UX

Monitoring traffic in the network

I Colleagues, Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me. Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies

6. Red Hat

How to monitor network device traffic using MRTG?

How to monitor network device traffic using MRTG? How can I add network devices in MRTG configuration to monitor? (2 Replies)
Discussion started by: manalisharmabe
2 Replies

7. UNIX Desktop Questions & Answers

While Connecting to Google networking. Error = Unusual traffic from your computer network.

Hello, I am working in office, where, more than 60 clients machines (only 16 machines are on windows) are there and one server Centos Server, I have configured clients with server, so that internet will be used form only one IP. Only 1 ip is assigned, but now a days, my client machines are... (2 Replies)
Discussion started by: RedRocks!!
2 Replies

8. Infrastructure Monitoring

How do I know what traffic is in network port?

If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ? ps. because I always found the network is very slow , so I would like what the network port is doing . Thanks Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies

9. UNIX for Advanced & Expert Users

How to throttle network traffic?

Hi All I am resilience testing an application that is spread across multiple servers. One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond.... I... (3 Replies)
Discussion started by: bbq
3 Replies
BIND8_QUERY2DLF.IN(1)					  LogReport's Lire Documentation				     BIND8_QUERY2DLF.IN(1)

NAME
bind8_query2dlf - convert BIND8 querylogs to dlf SYNOPSIS
bind8_query2dlf DESCRIPTION
This script converts each line in a bind8 querylog to a dns dlf record. BIND generates these logs when something like logging { channel query_logging { file "/var/log/named_querylog" versions 3 size 100M; print-time yes; // timestamp log entries }; category queries { query_logging; }; }; is in bind's named.conf. This will save up to three logfiles of maximum 100 megabytes in the directory /var/log. These logfiles look like: 10-Apr-2000 00:01:20.307 XX /10.2.3.4/1.2.3.in-addr.arpa/SOA/IN 10-Apr-2000 00:01:20.308 XX+/10.4.3.2/host.foo.com/A/IN EXAMPLES
To process a log as produced by bind8: $ bind8_query2dlf < dns-query bind8_query2dlf will be rarely used on its own, but is more likely called by lr_log2report: $ lr_log2report bind8_query < /var/log/dns-query SEE ALSO
http://www.logreport.org/doc/gen/dns/bind8.php bind9_query2dlf(1) VERSION
$Id: bind8_query2dlf.in,v 1.6 2006/07/23 13:16:33 vanbaal Exp $ COPYRIGHT
Copyright (C) 2000-2001 Stichting LogReport Foundation LogReport@LogReport.org This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with http://www.gnu.org/copyleft/gpl.html. AUTHOR
Edwin Groothuis, now maintained by Joost van Baal Lire 2.1.1 2006-07-23 BIND8_QUERY2DLF.IN(1)
All times are GMT -4. The time now is 01:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy