Difference between revisions of "Monitoring"

From neil.tappsville.com
Jump to navigationJump to search
m
m
Line 1: Line 1:
 +
 +
==Check Firewall==
 +
 +
* UDP
 +
<pre>
 +
[ ~]$ nc -v -u -z -w 3 targethost 25826
 +
Ncat: Version 7.50 ( https://nmap.org/ncat )
 +
Ncat: Connected to 192.168.1.2:25826.
 +
Ncat: UDP packet sent successfully
 +
Ncat: 1 bytes sent, 0 bytes received in 2.03 seconds.
 +
[ ~]$ nc -v -u -z -w 3 targethost 25828
 +
Ncat: Version 7.50 ( https://nmap.org/ncat )
 +
Ncat: Connected to 192.168.1.2:25828.
 +
Ncat: Connection refused.
 +
</pre>
 +
  
 
===WAN monitoring - Ethernet OAM - Y.1731===  
 
===WAN monitoring - Ethernet OAM - Y.1731===  

Revision as of 04:29, 12 May 2020

Check Firewall

  • UDP
[ ~]$ nc -v -u -z -w 3 targethost 25826
Ncat: Version 7.50 ( https://nmap.org/ncat )
Ncat: Connected to 192.168.1.2:25826.
Ncat: UDP packet sent successfully
Ncat: 1 bytes sent, 0 bytes received in 2.03 seconds.
[ ~]$ nc -v -u -z -w 3 targethost 25828
Ncat: Version 7.50 ( https://nmap.org/ncat )
Ncat: Connected to 192.168.1.2:25828.
Ncat: Connection refused.


WAN monitoring - Ethernet OAM - Y.1731

Essentially a formalised version of Cisco SAA probes You really want to use the two way delay probes but this requires hardware at both ends with accurate clocks and support for it.