The sys admin’s daily grind: OpenNetAdmin

Hooked on Tables

Article from Issue 132/2011
Author(s):

Last month, the Havege daemon helped organize the chaos in this column. Today, Charly attempts to organize the network – a tale of suffering in three chapters.

People who want to keep track of the continually growing number of network objects have a whole world of software products at their disposal. These products are generically referred to as IPAM (IP Address Management) tools, and none of them is really popular. Admins initially resist using them before finally giving in. This process typically takes several years and is divided into three levels.

Level one: The network is still pristine. Administrators have set it up themselves and are familiar with every single server, router, and switch – in fact they are on a first-name basis with everything on the net: They even know the IP addresses by heart.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Charly's Column: GestióIP

    A tidy house, a tidy mind they say, and I’ll leave it up to you to consider what being disorganized might mean. Anybody who has tried to manage hundreds of IP addresses using just a sheet of paper or a spreadsheet will probably appreciate some help.

  • Charly’s Column: PortSentry

    To celebrate 10 years of his column, Charly sets up a sensitive detector that measures the cosmic background radiation of the Internet.

  • Charly's Column: Netdiscover

    This month, sys admin Charly grabs the fairly ancient Netdiscover wardriving tool and takes care of his neighbors' WiFi networks.

  • Charly's Column: GeoIP Lookup

    The global village is big enough to want to find out where your friend and enemies have set up camp. Charly offers a quick IP-based introduction to geography.

  • Charly's Column

    Users log on to services such as SSH, ftp, SASL, POP3, IMAP, Apache htaccess, and many more using their names and passwords. These popular access mechanisms are a potential target for brute-force attacks. An attentive bouncer will keep dictionary attacks at bay.

comments powered by Disqus

Direct Download

Read full article as PDF:

057-057_charly.pdf (1.39 MB)

News

njobs Europe
What:
Where:
Country:
Njobs Netherlands Njobs Deutschland Njobs United Kingdom Njobs Italia Njobs France Njobs Espana Njobs Poland
Njobs Austria Njobs Denmark Njobs Belgium Njobs Czech Republic Njobs Mexico Njobs India Njobs Colombia