Preferences |
╟Σσ±ⁿ ┬√ ∞εµσ≥σ Φτ∞σφΦ≥ⁿ ∩α≡α∞σ≥≡√ Φφ≥σ≡⌠σΘ±α ∩≡επ≡α∞∞√ :
- Colors palette - ∩αδΦ≥≡α ÷Γσ≥εΓ (±≥αφΣα≡≥φα windows'±Ωα , τσδσφεσ φα ≈σ≡φε∞, µσδ≥εσ φα ±Φφσ∞, πεδ≤ßεσ φα ±Φφσ∞)
- Fonts- °≡Φ⌠≥ ≥σΩ±≥α Γ εΩφα⌡ ± Φφ⌠ε≡∞α÷ΦσΘ Φ ⌠εφ≥ Σδ telnet ΩδΦσφ≥α
- Help language - τ√Ω ∩ε∞ε∙Φ (help language) (╨≤±±ΩΦΘ, └φπδΦΘ±ΩΦΘ, ╚±∩αφ±ΩΦΘ)
- Tab position
∞εµφε Γ√ß≡α≥ⁿ πΣσ ß≤Σ≤≥ ≡ατ∞σ∙α≥± ταΩδαΣΩΦ ±≥≡αφΦ÷ : ±Γσ≡⌡≤ (Top) ΦδΦ ΓφΦτ≤ (Bottom) εΩφα.
- Auto save options of main window pages
┼±δΦ ΓΩδ■≈σφα ²≥α ε∩÷Φ ≥ε ∩≡Φ φαµα≥ΦΦ Ωφε∩ΩΦ [Start] ≤≥ΦδΦ≥α τα∩ε∞Φφασ≥
±ΓεΦ ∩α≡α∞σ≥≡√, φα∩≡Φ∞σ≡ Φ∞ ⌡ε±≥α. IP-Monitor τα∩ε∞Φφασ≥ ≡ατ∞σ≡√ ±ΓεΦ⌡ ∩εΣεΩεφ.
╚ ∩≡Φ ±δσΣ≤■∙σ∞ τα∩≤±Ωσ ∩≡επ≡α∞∞α Γε±±≥αφαΓδΦΓασ≥ τα∩ε∞φσφφ√σ τφα≈σφΦ .
- Auto save current page
┼±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩≡επ≡α∞∞α ß≤Σσ≥ τα∩ε∞Φφα≥ⁿ (Φ ∩≡Φ ±δσΣ≤■∙σ∞ τα∩≤±Ωσ Γ√ßΦ≡α≥ⁿ) αΩ≥ΦΓφ≤■ ≤≥ΦδΦ≥≤.
- Kept in lists recent addresses
σ±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩≡επ≡α∞∞α ß≤Σσ≥ τα∩ε∞Φφα≥ⁿ ΓΓσΣσφφ√σ Γα∞Φ αΣ≡σ±α Γ ±∩Φ±Ωα⌡.
- Clear old info
σ±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩≡Φ φαµα≥ΦΦ φα Ωφε∩Ω≤ Start ±≥α≡εσ ±εΣσ≡µΦ∞εσ
εΩφα ß≤Σσ≥ ≤Σαδ ≥±
- Scroll down
∩ε ταΓσ≡°σφΦΦ ≡αßε≥√ ≤≥ΦδΦ≥√ ∩σ≡σ∞σ∙ασ≥± Γ φΦτ εΩφα
- Minimize to tray ε≥Γσ≈ασ≥ τα ∞ΦφΦ∞Φτα÷Φ■ IP-Tools Γ tray.
- Always top
σ±δΦ ΓΩδ■≈Φ≥ⁿ ≥ε IP-Tools ß≤Σσ≥ Γ±σπΣα ∩εΓσ≡⌡ Σ≡≤πΦ⌡ εΩεφ, Σαµσ σ±δΦ αΩ≥ΦΓφα Σ≡≤πα ∩≡επ≡α∞∞α.
|
Interface |
Interface options:
- Toolbar position
╧εΩατα≥ⁿ ∩αφσδⁿ Φφ±≥≡≤∞σφ≥εΓ (toolbar) ±Γσ≡⌡≤/±φΦτ≤ ΦδΦ ±εΓ±σ∞ σσ φσ ∩εΩατ√Γα≥ⁿ.
- Tabs position
╥εµσ ±α∞εσ Σδ ταΩδαΣεΩ ±≥≡αφΦ÷ (≤≥ΦδΦ≥).
- Allow page multiline
┼±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ταΩδαΣΩΦ ±≥≡αφΦ÷ (≤≥ΦδΦ≥) ∩≡επ≡α∞∞√ ∩≡Φ φσεß⌡εΣΦ∞ε±≥Φ
ß≤Σ≤≥ ≡ατ∞σ∙α≥± Γ φσ±ΩεδⁿΩε ±≥≡ε≈σΩ. └ σ±δΦ φσ ΓΩδ■≈Φ≥ⁿ ≥ε
ταΩδαΣΩΦ ß≤Σ≤≥ Γ εΣφ≤ ±≥≡ε≈Ω≤ φε ± Ωφε∩ε≈Ωα∞Φ Σδ ±Ω≡εδΦφπα.
- Status bar
╧εΩατα≥ⁿ/±∩≡ ≥α≥ⁿ ±≥≡εΩ≤ ±ε±≥ε φΦ (status bar).
- Show ScanList dialog when user marks "Use list" option
═σΩε≥ε≡√σ ≤≥ΦδΦ≥√ (NetBIOS, Lookup, Γ±σ ±Ωαφσ≡√) ∞επ≤≥ ≡αßε≥α≥ⁿ ±ε ±∩Φ±Ωα∞Φ αΣ≡σ±εΓ.
┼±δΦ ┬√ ΓΩδ■≈Φ≥σ ²≥≤ ε∩÷Φ■, IP-Tools ß≤Σσ≥ ∩εΩατ√Γα≥ⁿ ΣΦαδεπ ± ²≥Φ∞ ±∩Φ±Ωε∞ αΣ≡σ±εΓ ΩαµΣ√Θ ≡ατ ΩεπΣα
┬√ ß≤Σσ≥σ ΓΩδ■≈α≥ⁿ ε∩÷Φ■ "Use list".
|
HTML Colors |
═α±≥≡εΘΩα ÷Γσ≥εΓ Σδ HTML ε≥≈σ≥εΓ Φ δεπ ⌠αΘδεΓ.
|
Sound |
└ φα ²≥εΘ ±≥≡αφΦ÷σ ταΣα■≥± τΓ≤ΩεΓ√σ ²⌠⌠σΩ≥√ Σδ ≡ατφ√⌡ ±εß√≥ΦΘ
(ταΓσ≡°σφΦσ ≡αßε≥√ ≤≥ΦδΦ≥α∞Φ, Φτ∞σφσφΦσ ±≥α≥≤±α Ωεφ≥≡εδΦ≡≤σ∞επε ⌡ε±≥α, ...)
|
Connections |
╧α≡α∞σ≥≡√ ≤≥ΦδΦ≥√ "Connections"
Auto refresh
┼±δΦ ²≥α ε∩÷Φ ΓΩδ■≈σφα ≥ε ≈σ≡στ ταΣαφφεσ ┬α∞Φ Γ≡σ∞ ∩≡επ≡α∞∞α εßφεΓδ σ≥ Φφ⌠ε≡∞α÷Φ■ ε ±εσΣΦφσφΦ ⌡.
Save to log file
▌≥α ε∩÷Φ ε≥Γσ≈ασ≥ τα τα∩Φ±ⁿ Φ±≥ε≡ΦΦ Γ±σ⌡ ±εσΣΦφσφΦΘ (ΦδΦ ε≥Ω≡√≥Φ ∩ε≡≥εΓ) Γ ≤Ωαταφφ√Θ ┬α∞Φ δεπ ⌠αΘδ.
- Display host names
╧εΩατ√Γα≥ⁿ Φ∞ ⌡ε±≥α Γ∞σ±≥ε IP αΣ≡σ±α
Display port names
┼±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε IP-Tools Γ∞σ±≥ε φε∞σ≡α ∩ε≡≥α ß≤Σσ≥ ∩εΩατ√Γα≥ⁿ σπε Φ∞
(Φ∞ ßσ≡σ≥± Φτ ±∩Φ±Ωα ∩ε≡≥εΓ - ⌠αΘδ servises.lst)
Filter
╟Σσ±ⁿ ∞εµφε ≤Ωατα≥ⁿ ΩαΩΦσ ≥Φ∩√ ∩ε≡≥εΓ Φ ±ε±≥ε φΦ ∩εΩατ√Γα≥ⁿ Γ ±∩Φ±Ωσ.
TCP ΦδΦ UDP, ∩ε≡≥√ ± ≤µσ ≤±≥αφεΓδσφφ√∞Φ ±εσΣΦφσφΦ ∞Φ ΦδΦ ∩ε≡≥√ Ωε≥ε≡√σ
µΣ≤≥ ±εσΣΦφσφΦ , Φ ≥.Σ.
Address filter
└ ²≥ε ⌠Φδⁿ≥≡ ∩ε αΣ≡σ±α∞, Φ∞σσ≥ ≥≡Φ Γα≡Φαφ≥α : "Not filtered" - ε≥Ωδ■≈σφ,
"Include filter" - ∩εΩατ√α≥ⁿ Γ±σ ±εσΣΦφσφΦ Ωε≥ε≡√σ Γ⌡εΣ ≥ Γ ταΣαφφ√Θ ±∩Φ±εΩ αΣ≡σ±εΓ,
"Exclude filter" - ∩εΩατ√Γα≥ⁿ Γ±σ ±εσΣΦφσφΦ Ω≡ε∞σ ≥σ⌡ Ωε≥ε≡√σ Γ⌡εΣ ≥ Γ ταΣαφφ√Θ ±∩Φ±εΩ.
┬ ±∩Φ±Ωσ αΣ≡σ±εΓ ∞εµφε ταΣαΓα≥ⁿ ΩαΩ ∩ε εΣφε∞≤ αΣ≡σ±≤ Γ ±≥≡εΩσ, ≥αΩ Φ ΣΦα∩ατεφ αΣ≡σ±εΓ, φα∩≡Φ∞σ≡ "194.16.15.1 - 194.16.15.48".
Apply for
└ τΣσ±ⁿ ∞εµφε ≤Ωατα≥ⁿ Σδ ΩαΩΦ⌡ αΣ≡σ±εΓ ∩≡Φ∞σφ ≥ⁿ ⌠Φδⁿ≥≡ : Σδ IP αΣ≡σ±εΓ ≤Σαδσφφ√⌡ ∞α°Φφ (Remote IP), Σδ αΣ≡σ±εΓ Γα°σΘ ∞α°Φφ√ (Local IP) ΦδΦ Σδ ≥επε Φ Σ≡≤πεπε (Both).
|
NB Scanner |
Options for NB Scanner :
Ping before scan resources
σ±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩σ≡σΣ ±ΩαφΦ≡εΓαφΦσ∞ Γ√Σσδσφφ√⌡ ≡σ±≤≡±εΓ ∩≡επ≡α∞∞α ∩≡ε∩Φφπ≤σ≥
∞α°Φφ≤ ∩ε IP αΣ≡σ±≤ Φ σ±δΦ φσ ΣεµΣσ≥± ε≥Γσ≥α ≥ε ∩σ≡σΘΣσ≥ Ω ±δσΣ≤■∙σ∞≤ αΣ≡σ±≤.
╧α≡α∞σ≥≡√ ∩ΦφπεΓαφΦ ±∞. φα ±≥≡αφΦ÷σ Ping/Trace
- Skip address if no answer
═σ ±ΩαφΦ≡εΓα≥ⁿ αΣ≡σ±α Ωε≥ε≡√σ φσ ε≥Γσ≥ΦδΦ φα ping
Get host name before scan
α σ±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩≡σµΣσ ≈σ∞ ±ΩαφΦ≡εΓα≥ⁿ ≡σ±≤≡±√ ∩≡επ≡α∞∞α ∩ε∩√≥ασ≥±
≤τφα≥ⁿ Φ∞ ∞α°Φφ√ ∩ε IP αΣ≡σ±≤. ┼±δΦ ²≥ε φσ ≤Σα±≥± Φ ε∩÷Φ "Skip address if cannot resolve"
ΓΩδ■≈σφα ≥ε ≡σ±≤≡±√ ±ΩαφΦ≡εΓα≥± φσ ß≤Σ≤≥, ∩≡επ≡α∞∞α ∩σ≡σΘΣσ≥ Ω
±δσΣ≤■∙σ∞≤ αΣ≡σ±≤ Φτ ±∩Φ±Ωα.
- Skip address if cannot resolve
Enable this option to skip addresses which cannot be resolved to host names
- Detect OS
╧≡Φ ΓΩδ■≈σφφεΘ ε∩÷ΦΦ IP-Tools ß≤Σσ≥ ∩√≥α≥ⁿ± ε∩≡σΣσδΦ≥ⁿ ≥Φ∩ ε∩σ≡α÷ΦεφφεΘ ±Φ±≥σ∞√ φα ≤ΣαδσφφεΘ ∞α°Φφσ.
╨αßε≥ασ≥ σ±δΦ ┬√ τα∩≤±Ωασ≥σ IP-Tools φα Windows NT/2000, φσ ≡αßε≥ασ≥ φα Windows 9x/ME
- Scan resources
╚±Ωα≥ⁿ Γ√Σσδσφφ√σ ≡σ±≤≡±√ φα ≤ΣαδσφφεΘ ∞α°Φφσ: ΣΦ±ΩΦ, ∩≡Φφ≥σ≡α
- Sound when resource found
╟Σσ±ⁿ ε∩≡σΣσδ σ≥± τΓ≤ΩεΓεΘ ⌠αΘδ (wav, mid, etc) Ωε≥ε≡√Θ IP-Tools ß≤Σσ≥ ∩≡εΦπ≡√Γα≥ⁿ ΩεπΣα φαΘΣσ≥ ΩαΩεΘ δΦßε ≡σ±≤≡±
|
SNMP Scanner |
Here you may administer SNMP Scanner settings.
Prior to scanning
Following options specify which preliminary checks should be made before performing basic SNMP requests:
- Ping before scanning resources
If enabled, IP-Tools tries to ping the host prior to performing SNMP requests. If the host does not respond
and "Skip address that is not responding" option is enabled, the program proceeds to the next host on the list.
For ping options see the Ping/Trace page in the Options dialog.
- Skip address that is not responding
Enable this option to skip hosts that do not respond to echo packets
- Get host name before scanning
If enabled, IP-Tools tries to resolve the IP address into a host name prior to performing SNMP requests. If name resolution fails and "Skip address that cannot be resolved" option is enabled, the program proceeds to the next host on the list.
- Skip address that cannot be resolved
Enable this option to skip addresses that cannot be resolved to host names
Scan options
Here you may specify parameters of basic SNMP queries:
- Port
Specify the port number on which the host (SNMP agent) is listening for incoming UDP packets. Default and
standard value is 161
- Timeout
This is the amount of time in milliseconds the program will wait for a response from the server before
considering the request as failed (if "Retries" parameter is greater than 1, scanner may perform several
requests).
- Retries
Specifies the communications retry count.
- Community strings
This option lists strings to utilize as SNMP community names while communicating with the hosts. To add new
string - click "Add item" button or press Insert key. To edit existing string - select the string in the
list and click "Edit item" button or double click on the string. To remove item - select the string and
click "Remove item" button. If you want to temporarily exclude some items from scanning process, unmark
the line.
You may select as many community strings as you wish. Remember though, the more strings you add, the longer
it could take for the scanner to discover network. SNMP Scanner tries to detect correct community string
for each device starting at the top of the list, so you should place the most commonly used community strings
at the very top of the list. You can rearrange the order of the community strings using the "Up" and "Down"
buttons.
Request additional information
In addition to standard requests that provide information about System ID, UpTime, Interfaces, etc, you may setup
IP-Tools to retrieve additional information. You may ask utility to request the value of any counter(s) supported
by SNMP agent.
To add a request field - click "Add item" button or press Insert key. In the popup dialog you should provide OID
(OBJECT IDENTIFIER) of the counter and the name of the field (name that will be displayed as column header in the
scanner utility, HTML report, etc). E.g. OID 1.3.6.1.2.1.4.1.0 addresses the counter that indicates whether host
is acting as an IP gateway or not.
To edit the field - select the item in the list and click "Edit item" button or double click on the item.
To remove item - select the line and click "Remove item" button. If you want to temporarily exclude some
requests from scanning process, unmark the line.
|
Port Scanner |
Options for ports Scanner :
Get host name before scanning ports
σ±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩≡σµΣσ ≈σ∞ ±ΩαφΦ≡εΓα≥ⁿ ∩ε≡≥√ ∩≡επ≡α∞∞α ∩ε∩√≥ασ≥±
≤τφα≥ⁿ Φ∞ ∞α°Φφ√ ∩ε IP αΣ≡σ±≤, Φ σ±δΦ ²≥ε φσ ≤Σα±≥± ≥ε ∩ε≡≥√ ±ΩαφΦ≡εΓα≥± φσ ß≤Σ≤≥,
∩≡επ≡α∞∞α ∩σ≡σΘΣσ≥ Ω ±δσΣ≤■∙σ∞≤ αΣ≡σ±≤ Φτ ±∩Φ±Ωα
- Skip address if cannot resolve
Enable this option to skip addresses which cannot be resolved to host names
Ping before scanning ports
α σ±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩σ≡σΣ ±ΩαφΦ≡εΓαφΦσ∞ ∩ε≡≥εΓ ∩≡επ≡α∞∞α ∩≡ε∩Φφπ≤σ≥
∞α°Φφ≤ ∩ε IP αΣ≡σ±≤ Φ σ±δΦ φσ ΣεµΣσ≥± ε≥Γσ≥α ≥ε ∩σ≡σΘΣσ≥ Ω ±δσΣ≤■∙σ∞≤ αΣ≡σ±≤
╧α≡α∞σ≥≡√ ∩ΦφπεΓαφΦ ±∞. φα ±≥≡αφΦ÷σ Ping/Trace
- Skip address if no answer
╧≡ε∩≤±Ωα≥ⁿ αΣ≡σ±α Ωε≥ε≡√σ φσ ε≥Γσ≥ΦδΦ φα ping
Show port names
┼±δΦ ΓΩδ■≈Φ≥ⁿ ²≥≤ ε∩÷Φ■ ≥ε ∩≡Φ ±ΩαφΦ≡εΓαφΦΦ ≡ Σε∞ ± φε∞σ≡ε∞ ∩ε≡≥α ß≤Σσ≥ Γ√ΓεΣΦ≥± σπε Φ∞ .
Show port descriptions
╧εΩατ√Γα≥ⁿ ε∩Φ±αφΦσ ∩ε≡≥εΓ.
IP-Tools ∞εµσ≥ ∩ε±√δα≥ⁿ Σαφφ√σ Γ ∩ε≡≥(√) Ωε≥ε≡√σ ε≥Ω≡√≥√ φα ≤ΣαδσφφεΘ ∞α°Φφσ Φ ∩εΩατ√Γα≥ⁿ ε≥Γσ≥ ε≥ ≤ΣαδσφφεΘ ∞α°Φφ√.
Show remote service messages
σ±δΦ ∩ε±≥αΓΦ≥ⁿ τΣσ±ⁿ παδε≈Ω≤ ≥ε ∩≡επ≡α∞∞≤ φσ ß≤Σσ≥ ±≡ατ≤ ∩ε±δσ ±εσΣΦφσφΦ
≡Γα≥ⁿ connect, α ∩εΣεµΣσ≥ ε≥Γσ≥α ε≥ φαΘΣσφφεΘ ∞α°Φφ√. ╞Σα≥ⁿ ß≤Σσ≥ ≤Ωαταφφεσ Γ
±δσΣ≤■∙σ∞ ∩εδσ Γ≡σ∞ .
Time for wait message
┬ε≥ ≥≤≥ Φ ≤Ωατ√Γασ≥± ±ΩεδⁿΩε Γ≡σ∞σφΦ ∩ε±δσ ΩεφφσΩ≥α µΣα≥ⁿ ±εεß∙σφΦ ε≥ ±σ≡Γσ≡α.
Send string to remote host
┬ ²≥ε∞ ∩εδσ ταΣασ≥± ±≥≡εΩα Ωε≥ε≡≤■ ∩≡επ≡α∞∞α ∞εµσ≥ ∩ε±δα≥ⁿ ±σ≡Γσ≡≤.
╩≡ε∞σ ≥επε ┬√ Σεδµφ√ ταΣα≥ⁿ ±∩Φ±εΩ ∩ε≡≥εΓ Σδ ±ΩαφΦ≡εΓαφΦ . ┬√ ∞εµσ≥σ ταΣα≥ⁿ ²≥ε≥ ±∩Φ±εΩ ΩαΩ ≥σΩ±≥εΓ≤■ ±≥≡εΩ≤
(φα∩≡Φ∞σ≡ "21, 25, 43-80, 110-139"), ΦδΦ ε≥∞σ≥Φ≥ⁿ ∩ε≡≥√ Γ ±∩Φ±Ωσ φα ±≥≡αφΦ÷σ "Ports".
|
Ports |
═α ²≥εΘ ±≥≡αφΦ÷σ ┬√ ∞εµσ≥σ ταΣα≥ⁿ ±∩Φ±εΩ ∩ε≡≥εΓ Σδ ±ΩαφΦ≡εΓαφΦ Ports Scanner'ε∞.
╤∩Φ±εΩ ∞εµφε ταΣαΓα≥ⁿ ∩≡ε±≥αΓδ παδε≈ΩΦ Γετδσ φ≤µφ√⌡ ∩ε≡≥εΓ ΦδΦ ΓΩδ■≈Φ≥ⁿ
ε∩÷Φ■ "Use list" Φ φα∩Φ±α≥ⁿ ±∩Φ±εΩ φ≤µφ√⌡ ∩ε≡≥εΓ, φα∩≡Φ∞σ≡ ≥αΩ "21,25,80-110".
What is a Port ?
The TCP port number identifies a process or application inside the computer.
Any application or process that uses TCP for its transport is assigned a
unique identification number called a TCP port. These ports are numbered
beginning with zero. Port numbers for client applications are dynamically
assigned by the operating system when there is a request for service. Port
numbers for server applications are preassigned by the IANA
(Internet Assigned Numbers Authority) and do not change.
A server application or process that uses TCP as a transport has at least
one preassigned port number. For example, the preassigned port numbers for
FTP server services are 20 (data) and 21 (control).
|
UDP Scanner |
UDP Scanner's options:
Get host name before scanning ports
If enabled, IP-Tools tries to resolve the IP address into a host name before scanning its ports. If
resolution fails and "Skip address if cannot be resolved" option is enabled, the program goes to the
next host in list.
- Skip address if cannot be resolved
Enable this option to skip addresses that cannot be resolved to host names.
Ping before scanning ports
If enabled, IP-Tools tries to ping the host before scanning its ports. If the host does not respond and
"Skip address if not responding" option is enabled, the program goes to the next host in list. You can
setup ping parameters on the Ping/Trace page in the Options dialog.
- Skip address if not responding
Enable this option to skip hosts that do not respond to echo packets.
Show hosts with open ports only
If this option is enabled, IP-Tools will not display any information for hosts with undetected open ports.
- Show port names
If enabled, meaningful port names are displayed beside port numbers.
Show service reply
With this option enabled IP-Tools will display reply time or data received from the hosts for each active
UDP service detected. Using "Display", "From", and
"Till" parameters of the UDP check you can choose what
information IP-Tools should display for each type of UDP service (e.g. DNS, SNMP, etc)
- Show port descriptions
If enabled, a short description of each port is displayed.
Timeout
Specify the amount of time (in milliseconds) that IP-Tools should wait for a response from the host.
Retries
If IP-Tools does not receive answer from a host, it can send request again. Use this option to set the
number of times IP-Tools will resend the data to the server before consider that tested port is not in use.
Services to scan (UDP checks):
Use this list to select one or more UDP services to scan. You can mark/unmark services one by one or use special
buttons (located in the right bottom corner) to mark all services, unmark all services, or invert selections for
whole list.
IP-Tools contains list of some popular UDP services (Echo, Daytime, Chargen, Time, DNS, etc). If you need to
check UDP service that is not in the list, you can add new item. To create "check" for UDP service, click
"Add service" button and fill up following fields in the "UDP Service check" dialog:
Port
Specify the port number on which the host is listening to incoming UDP packets. E.g. TFTP servers use port
#69, SNTP servers use port #123, Daytime servers use port #13, etc.
- Service name
Short name of the service
- Description
One line description of the service
Packet to send
Enter the packet data that should be sent to the host. Because of the fact that most UDP services accept
binary data, you may need to use sequences formatted %XX where XX is a hexadecimal code of a character
(byte). E.g. HELLO%0D%0A would send HELLO followed by a character ASCII 13 (line feed) and ASCII 10
(new line).
Filter
By default IP-Tools displays any service the answer received from. But you can specify special filters for any
service "check". If data received from the service will not satisfy filter conditions, service will not be
considered as active one, and will not be listed in a list of active UDP services.
Choose one of the conditions to consider service's response as "good":
- any reply | service that sends any data in response to request packet will be considered as active |
- reply contains | service will be considered as the active one, only when reply contains specified data (defined in "Compare with" field). |
- reply doesn't contain | service will be considered as the active one, only when reply does not contains specified data (defined in "Compare with" field). |
- reply equal to | service will be considered as the active one, only when reply equal to specified data (defined in "Compare with" field). |
- reply not equal to | service will be considered as the active one, only when reply not equal to specified data (defined in "Compare with" field). |
Compare with
IP-Tools can compare data that was received from the server with specified string. As well as in
"Packet to send" field you can use sequences formatted %XX where XX is a hexadecimal code of a
character (byte). E.g. "%02public%00"
Display
When "Show service reply" option is enabled, this parameter defines what information will be displayed when
active UDP service detected. Choose one of the following options:
- Reply time
- Reply as text
- Reply as binary data
From/Till
Specify what part of the received data should be displayed. For example if you want to see 1st 5 bytes of the
service response, set "From" parameter to 1 and set "Till" parameter to 5. If you want to see service reply
starting from 10th symbol till 50th, set "From" and "Till" parameters to 10 and 50 correspondingly.
Examples:
To check TFTP service, fill up parameters with following values:
- Port: 69
- Filter: any reply
- Packet to send: %00%01filename%00%00netascii%00
where filename is the name of the file on the server. We recommend providing incorrect (fake) name of the file (in this case server will not start file transfer and you will avoid unnecessary network traffic).
To check SNTP service fill up test parameters with following values:
- Port: 123
- Filter: any reply
- Packet to send: %0B%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00
Yes, so long string, packet must contain 48 bytes, otherwise server will not respond.
|
Ping/Trace |
╥≤≥ ταΣα■≥± ∩α≡α∞σ≥≡√ Σδ ≤≥ΦδΦ≥√ Trace Φ Σδ Γ±σ⌡ ≤≥ΦδΦ≥ Ωε≥ε≡√σ
Φ±∩εδⁿτ≤■≥ ping (Ω≡ε∞σ Hosts Monitor'a, ≥αΩ ΩαΩ Γ ∞εφΦ≥ε≡σ
∩α≡α∞σ≥≡√ ≥σ±≥α ε∩≡σΣσδ ■≥± ε≥Σσδⁿφε Σδ ΩαµΣεπε Ωεφ≥≡εδΦ≡≤σ∞επε ⌡ε±≥α).
- "Packets to send"
ε∩≡σΣσδ σ≥ ΩεδΦ≈σ±≥Γε ∩ε±√δασ∞√⌡ ECHO ∩αΩσ≥εΓ
- "Packet Size"
ταΣασ≥ ≡ατ∞σ≡ ECHO ∩αΩσ≥α
- "TimeOut"
ε∩≡σΣσδ σ≥ timeout Φφ≥σ≡Γαδ Γ ∞ΦδΦ±σΩ≤φΣα⌡
- "Time to Live"
τφα≈σφΦσ TTL Σδ ∩ε±√δασ∞√⌡ ∩αΩσ≥εΓ
- "Number of Hops"
specifies maximum number of hops to search for target
- "Show Hosts Description"
═α≈Φφα ± 0.09 Γσ≡±ΦΦ ∩≡επ≡α∞∞α ∞εµσ≥ Γ√ΣαΓα≥ⁿ Φφ⌠ε≡∞α÷Φ■ ε Σε∞σφα⌡, ⌡ε±≥α⌡, etc.
(±≥≡αφΦ÷√ LookUp, Scanner, ScanPorts, Trace ± ΓΩδ■≈σφφεΘ ε∩÷ΦσΘ Use DNS).
┼±δΦ ²≥α ε∩÷Φ ΓΩδ■≈σφα ≥ε ≡ Σε∞ ± ΩαµΣ√∞ Φ∞σφσ∞ ⌡ε±≥α ß≤Σσ≥ Φφ⌠ε≡∞α÷Φ ≥Φ∩α :
... www.chat.ru (Russia)
... www.gazprom.ru (Join-stock company GAZPROM, town Moscow, Russia)
... mainboss.xaxa.BD (Bangladesh)
|
WhoIs |
IP-Tools ±εΣσ≡µΦ≥ Γ±≥≡εσφφ√Θ ±∩Φ±εΩ WhoIs ±σ≡Γσ≡εΓ Σδ Γ±σ⌡ top level Σε∞σφεΓ.
═ε ┬√ ∞εµσ≥σ ±ετΣα≥ⁿ Γα° ±εß±≥Γσφφ√Θ ±∩Φ±εΩ, ∩≡Φ≈σ∞ Φφ⌠ε≡∞α÷Φ Φτ ┬α°σπε ±∩Φ±Ωα Φ∞σσ≥ ∩≡Φε≡Φ≥σ≥ Γ√°σ ≈σ∞ Φτ Γφ≤≥≡σφφσπε ±∩Φ±Ωα
(≥εσ±≥ⁿ IP-Tools ß≤Σσ≥ Φ±Ωα≥ⁿ ±σ≡Γσ≡ Γε Γφ≤≥≡σφφσ∞ ±∩Φ±Ωσ ≥εδⁿΩε σ±δΦ φσ φαΘΣσ≥ Γ ┬α°σ∞).
─δ ΩαµΣεπε ²δσ∞σφ≥α ±∩Φ±Ωα ε∩≡σΣσδ σ≥± :
Domain - Σε∞σφ, φα∩≡Φ∞σ≡ ".com", or ".ibm.com"
Comment - φσεß τα≥σδⁿφεσ ∩εδσ, ∩≡ε±≥ε Ωε∞∞σφ≥α≡ΦΘ ≥Φ∩α "University of Victoria"
WhoIs server - αΣ≡σ± WhoIs ±σ≡Γσ≡α (IP αΣ≡σ± ΦδΦ Σε∞σφφεσ Φ∞ )
Port - φε∞σ≡ ∩ε≡≥α (±≥αφΣα≡≥φ√Θ Σδ WhoIs ±σ≡Γσ≡εΓ - ∩ε≡≥ #43).
Max domain depth - ...
Server can return info about IP addresses - ∩ε±≥αΓⁿ≥σ ≥≤≥ παδε≈Ω≤ σ±δΦ WhoIs ±σ≡Γσ≡ φα⌡εΣΦ≥ Φφ⌠ε≡∞α÷Φ■ φσ ≥εδⁿΩε ∩ε Σε∞σφφε∞≤ Φ∞σφΦ φε Φ ∩ε IP αΣ≡σ±≤
You could be a part of the community process to build up the WhoIs Server list.
Send to us your custom list, your list will be merged with contributions from other users, and an updated list will be sent back to you.
Use "Update" button to proceed this operation.
|
NS Lookup |
∩ε ≤∞εδ≈αφΦ■ ≤≥ΦδΦ≥α Lookup Φ±∩εδⁿτ≤σ≥ Windows API Φ default DNS ±σ≡Γσ≡ φε
Γ IP-Tools 2.0 ΦδΦ Γ√°σ ┬√ ∞εµσ≥σ ∩σ≡σΩδ■≈Φ≥ⁿ ²≥≤ ≤≥ΦδΦ≥≤ Γ ≡σµΦ∞
"Advanced Name Server Lookup". ┬ ²≥ε∞ ±δ≤≈ασ ┬√ ±∞εµσ≥σ Φτ∞σφΦ≥ⁿ:
- DNS ±σ≡Γσ≡
- ∩ε≡≥ Φ ∩≡ε≥εΩεδ (TCP, UDP)
- ≥αΘ∞α≤≥ Φ ΩεδΦ≈σ±≥Γε ∩ε∩√≥εΩ ∩εδ≤≈Φ≥ⁿ ε≥Γσ≥ ε≥ ±σ≡Γσ≡α
- ≥Φ∩ τα∩≡ε±α: A, ANY, CNAME, HINFO, MX, NS, PTR, SOA, ΦδΦ TXT
- ΓΩδ■≈Φ≥ⁿ ΦδΦ ε≥Ωδ■≈Φ≥ⁿ ≡σΩ≤≡±Φ■
- ≡σµΦ∞ Γ√ΓεΣα Φφ⌠ε≡∞α÷ΦΦ: Full, Medium, ΦδΦ Compact
IP-Tools ∩εΣΣσ≡µΦΓασ≥ ±δσΣ≤■∙Φσ ≥Φ∩√ τα∩Φ±σΘ:
- A - a host address
- NS - an authoritative name server
- MD - a mail destination
- MF - a mail forwarder
- CNAME - the canonical name for an alias
- SOA - marks the start of a zone of authority
- MB - a mailbox domain name
- MG - a mail group member
- MR - a mail rename domain name
- WKS - a well known service description
- PTR - a domain name pointer
- HINFO - host information
- MINFO - mailbox or mail list information
- MX - mail exchange
- TXT - text strings
|
HTTP |
On this page you can define parameters of HTTP requests performed by HTTP utility.
Request
Choose type of the HTTP request:
- HEADER : request for HTTP header. Server will return status information about the document (HTTP header) but will not transfer data. It allows you to check web server functionality with minimum network traffic but you cannot check the content of the web page.
- GET: request the page specified by URL parameter. Server will return status information (HTTP header) and data.
- POST: send data (defined in "Post data" field) to the web server to be processed in some way, like by a CGI script. In this case URL is not a resource to retrieve; it's usually a program to handle the data you are sending. The HTTP response is normally the program output, not a static file. The most common use of POST is to submit HTML form data to CGI scripts.
Post data
If the URL is for a POST request, enter the post variables as
name1=value1&name2=value2. This option is used
to verify that a form is working correctly by performing the same request which occurs when a user submits a
form.
Follow redirect
This parameter determines the IP-Tools' behavior, when the server issues a redirect. When the option is enabled
IP-Tools follows redirect and retrieves new URL, specified by server.
Authorization
- User name
If the URL specified requires a name and password for access, enter the user name in this box.
- Password
If the URL specified requires a name and password for access, enter the password in this box.
Proxy
Optionally, a proxy server can be used to access the URL. Setup following parameters:
- Proxy address
Provide a domain name or IP address of the proxy server
- Proxy port
Specify TCP port used by proxy server
Proxy authorization
- User name
If the proxy server requires a name and password for access, enter the user name in this box.
- Password
If the proxy server requires a name and password for access, enter the password in this box.
Agent
Some server-based scripts can check agent's name and return different information for different HTTP
agents (e.g. generate different HTML pages for Internet Explorer or Netscape). You can change this parameter
to check functionality of the script in different modes.
Timeout
Specify the number of seconds that the IP-Tools should wait for a page to complete downloading before
timing-out. If the Timeout property is set to 0, IP-Tools will use default Windows timeout specified for
TCP protocol.
Display HTTP header and HTML tags
With this option enabled IP-Tools displays all data received from the server as it is. If you disable the
option, IP-Tools will not display HTTP header and will remove all HTML tags from the response.
Allow per-session cookies
With this option enabled IP-Tools remembers cookies received from the server, and sends them back in case of
redirection to another URL.
This option can be useful when you need to check some access-restricted resources. Often web-based
authorization systems use cookies to identify user. How it usually works:
- user opens login page, enters login and password, and clicks "Login" button;
- browser sends POST or GET request to a server with data entered by user;
- server checks login/password and (in case data are correct) assings session ID for the user;
- server sends cookie that contains ID to user's browser, and redirects user to another page;
- browser must store cookie and send it back to server every time it (browser) requests access-restricted pages
So, IP-Tools can work like your browser and (just for example) login to your mailbox to check whether you
have the new messages.
|
IP-Monitor |
═α±≥≡εΘΩΦ IP-Monitor'α : Φφ≥σ≡Γαδ εßφεΓδσφΦ Φφ⌠ε≡∞α÷ΦΦ, ÷Γσ≥α ⌠εφα Φ π≡α⌠ΦΩεΓ,
ΩεδΦ≈σ±≥Γε δΦφΦΘ Γ ∞α±°≥αßφ√⌡ ±σ≥Ωα⌡ Φ ≥.Σ.
|
Host Monitor |
Options for HostMonitor utility:
Style :
Report - ∩εΩατ√Γα≥ⁿ ∞αδσφⁿΩ≤■ ΦΩεφΩ≤ Φ Σσ≥αδⁿφ≤■ Φφ⌠ε≡∞α÷Φ■ ε ΩαµΣε∞ ⌡ε±≥σ.
List - ∩εΩατ√Γα≥ⁿ ∞αδσφⁿΩ≤■ ΦΩεφΩ≤ Φ Φ∞ ⌡ε±≥α
Icon - ∩εΩατ√Γα≥ⁿ ßεδⁿ°√σ ΦΩεΩΦ Φ Φ∞ ⌡ε±≥α
Small Icon - ∩εΩατ√Γα≥ⁿ ∞αδσφⁿΩ≤■ ΦΩεφΩ≤ Φ Φ∞ ⌡ε±≥α (∩ε⌡εµσ φα List, φε ∩ε Σ≡≤πε∞≤ π≡≤∩∩Φ≡≤■≥± ²δσ∞σφ≥√)
Show grid lines
╧≡Φ ΓΩδ■≈σφφεΘ ε∩÷ΦΦ IP-Tools ß≤Σσ≥ ≡Φ±εΓα≥ⁿ ±σ≥Ω≤ ≡ατΣσδ ■∙≤■ ²δσ∞σφ≥√.
Start/Stop mode :
start upon loading - ∩ε±δσ ταπ≡≤τΩΦ IP-Tools τα∩≤±≥Φ≥ ∞εφΦ≥ε≡
stop upon loading - φσ τα∩≤±Ωα≥ⁿ ∞εφΦ≥ε≡ ∩ε±δσ ταπ≡≤τΩΦ
restore last status - Γε±±≥αφεΓΦ≥ⁿ ±≥α≥≤± Ωε≥ε≡√Θ ß√δ Γ ∞ε∞σφ≥ ταΓσ≡°σφΦ ≡αßε≥√
Refresh after edit :
Always check status after editing host properties
Ask about check
Does not refresh status after an edit
|
Host Monitor: Log settings |
HostMonitor's options, log file settings:
Log file
Save to specific file
Automatically change the name every month (MMYYYY-Log.ext)
Automatically change the name every day (DDMMYYYY-Log.ext)
Log is disabled
┼±δΦ ┬√ Γ√ß≡αδΦ ≡σµΦ∞ αΓ≥ε∞α≥Φ≈σ±ΩεΘ ±∞σφ√ Φ∞σφΦ δεπ ⌠αΘδα, ≥ε Γ Φ∞σφΦ ⌠αΘδα ┬√ ∞εµσ≥σ ταΣαΓα≥ⁿ ±∩σ÷Φαδⁿφ√σ ∞αΩ≡ε±√.
IP-Tools Γε±∩≡ΦφΦ∞ασ≥ ≥σΩ±≥ επ≡αφΦ≈σφφ√Θ ±Φ∞Γεδα∞Φ ∩≡ε÷σφ≥α '%' ΩαΩ ∞αΩ≡ε± (∩σ≡σ∞σφφ≤■),
τα∞σφ 'DD' φα φε∞σ≡ Σφ (≈Φ±δε), 'MM' - φε∞σ≡ ∞σ± ÷α, 'YY' - πεΣ (2 ∩ε±δσΣφΦσ ÷Φ⌠≡√ πεΣα), 'YYYY' - πεΣ (4 ÷Φ⌠≡√).
╧≡Φ∞σ≡√ :
c:\ip-tools\log\%ddmmyy%.dbf - IP-Tools ß≤Σσ≥ Γσ±≥Φ δεπ Γ Ωα≥αδεπσ "c:\ip-tools\log\" Φ ∞σφ ≥ⁿ Φ∞ δεπ ⌠αΘδα ΩαµΣ√Θ Σσφⁿ.
%yyyy%.htm - Γσ±≥Φ δεπ Γ ≥σΩ≤∙σ∞ Ωα≥αδεπσ (Ω±≥α≥Φ φσ ±≥εΦ≥ ≥αΩ Σσδα≥ⁿ, ≥αΩ ΩαΩ ≥σΩ≤∙ΦΘ Ωα≥αδεπ ∩ε±≥ε φφε ∞σφ σ≥± ) Φ ∞σφ ≥ⁿ Φ∞ δεπ ⌠αΘδα ΩαµΣ√Θ πεΣ.
Save mode
Save all information
Save only if a host changes status
┼±δΦ ┬√ Γ√ßσ≡σ≥σ ε∩÷Φ■ "Save all information" ≥ε IP-Tools ß≤Σσ≥ τα∩Φ±√Γα≥ⁿ Γ δεπ ≡στ≤δⁿ≥α≥√ Γ±σ⌡ ≥σ±≥εΓ, φσταΓΦ±Φ∞ε ε≥ ≥επε, Φτ∞σφΦδ± ±≥α≥≤± ⌡ε±≥α ΦδΦ φσ≥.
▌≥ε≥ ≡σµΦ∞ ∩εδστσφ σ±δΦ ┬α∞ φ≤µφα Σσ≥αδⁿφα Φφ⌠ε≡∞α÷Φ ε Γ≡σ∞σφΦ Σε±≥≤∩α Ω ⌡ε±≥≤.
═ε ± Σ≡≤πεΘ ±≥ε≡εφ√ Γ ²≥ε∞ ±δ≤≈ασ δεπ ⌠αΘδ ß≤Σσ≥ ß√±≥≡ε ≡α±≥Φ Γ ≡ατ∞σ≡α⌡.
╧≡Φ Γ√ß≡αφφεΘ ε∩÷ΦΦ "Save only if a host changes status" IP-Tools ß≤Σσ≥ τα∩Φ±√Γα≥ⁿ ≥εδⁿΩε Φτ∞σφσφΦ Γ ±≥α≥≤±σ (ΩεπΣα ⌡ε±≥ "≤∞σ≡" ΦδΦ "εµΦδ").
Log file format
Text file
HTML file
Note:
╦επ Γ ⌠ε≡∞α≥σ HTML Φ±∩εδⁿτ≤σ≥ ßεδⁿ°σ ΣΦ±ΩεΓεπε ∩≡ε±≥≡αφ±≥Γα (εΩεδε 800 ßαΘ≥ φα ΩαµΣ≤■ τα∩Φ±ⁿ) ≈σ∞ ≥σΩ±≥εΓ√Θ ⌠αΘδ (εΩεδε 80 ßαΘ≥ φα τα∩Φ±ⁿ).
═ε HTML δεπ Ωεφσ≈φε ßεδσσ φαπδ Σφ√Θ Φ σ±δΦ IP-Tools ß≤Σσ≥ τα∩Φ±√Γα≥ⁿ δεπ Γ Ωα≥αδεπ ┬α°σπε Web ±σ≡Γσ≡α, ≥ε δεπ ∞εµφε δσπΩε ∩≡ε±∞ε≥≡σ≥ⁿ ε≥Ω≤Σα ≤πεΣφε.
|
Trap Watcher |
Here you may specify general Trap Watcher settings and provide special processing options for all or some messages.
E.g. you may log all messages but send an e-mail only when message from specific device is received. Or you may
display all messages on screen and log [Link Down] and [Link Up] messages.
Settings:
Receive traps on UDP port #
This option specifies the UDP port number, which IP-Tools utilizes to listen for incoming messages. Default setting is 162.
Display
This option allows you to specify how many latest messages should be displayed on screen. Also you may specify what messages should be displayed:
- Display all received traps
All received messages will be displayed
- Display filtered traps only
Only messages that meet conditions of the filter will be displayed
- Display all traps, mark filtered
All received messages will be displayed, messages that meet conditions of the filter
will be marked by color (you can choose any color you want)
By clicking on "Date" column header you may change sorting mode for messages; newest messages could appear at the
top or bottom of the list.
Log
IP-Tools can log all or some specific messages into log file or files. Choose one of the following options:
- Log all traps
All received messages will be stored
- Log filtered traps
Only messages that meet conditions of the specified filter will be stored
- Disable logging
No messages will be stored in the log
IP-Tools may store information in Text or HTML format. If you provide path to the file with extension HTM or HTML,
IP-Tools will create HTML log file. Otherwise log will be in text format.
You may use special macro variables in the file name. This option allows you to create
separate log files for various messages. E.g. If you use %TrapHost% variable in the file name, IP-Tools will
create separate log file for each host from which a trap messages was received.
Execute external command
Here you may specify command that will be executed when any or specified message is received. Choose one of the following options:
- For all traps
Execute command in respond to every new message
- For filtered traps
Execute command in respond to messages that meet conditions of the filter
- Do not execute
Do not execute external programs
and provide command line to execute. You may use special macro variables in the command
line. When IP-Tools launches external application in response to received trap message, it substitutes macro
variable with its value pertinent to the trap message being received.
Macros:
Macro variables
You may use special variables in the log file name or in the command line to launch external applications:
%TrapHost% | Represents IP address of the host that have sent the message |
%TrapType% | Represents type of the trap. It provides information about generic type and enterprise specific number. Generic type could be one of the following: Cold Start, Warm Start, Link Down, Link Up, Auth Failure, EGP Loss and Specific. Enterprise specific number is only applicable when generic trap type is Enterprise Specific, otherwise enterprise specific number is 0 |
%TimeTicks% | Represents time ticks. Time ticks is the time interval (measured in hundredth of seconds) since the initialization (boot, start-up) of the entity that have sent the trap. |
%Enterprise% | Enterprise field contains an OBJECT IDENTIFIER which names the device that sends the trap |
Each trap message may contain one or several variables that provide information about the event. Following macro variables allow you to pass that information to external applications. |
%MibOid% | Represents variable name (OID) |
%MibType% | Type of the variable |
%MibValue% | Variable value |
%MibRelative% |
Relative value of the variable. This macro is applicable when you check incoming trap messages for some
specific variable and compare current value of the variable with its previous value (see
"Message contains OID" option in the Trap Filter dialog).
%MibRelative% may represent:
simple difference between current and previous value (if you use "increases by", "decreases by" or "changes by" compare option)
relative difference as a percentage of previous value (if you use "increases by (%)", "decreases by (%)" or "changes by (%)" compare option)
average increase/decrease of the counter per second since previous message (if you use "increases /sec", "decreases /sec" or "changes /sec" compare option)
|
When IP-Tools launches external application in response to received trap message, it substitutes macro variable
with the value of the appropriate message parameter.
E.g. to send an e-mail with information about traps you may use command line similar to this one:
"c:\program files\IP-Tools\samples\SendMail.exe" "To=admin@mycompany.com" "Subject=SNMP trap message from %TrapHost%"
"Body=OID: %MibOID% ^M Value: %MibValue%" StartAfterLoad
Using variables in the log file name allows you to store different messages in separate log files. E.g. If you
use %TrapHost% variable in the file name, IP-Tools will create separate log file for each host from which a
trap messages was received.
Filter:
You may setup filter and provide special processing for some messages. E.g. you may log all messages but send
an e-mail only when message from specific device is received. Or you may display all messages on screen and log
[Link Down] and [Link Up] messages.

In the Trap Filter dialog you may define one or more conditions to filter some specific events. Message passes the
filter only when it matches ALL specified requirements:
SNMP device
Match against the source device - device that have sent message. You can provide list of IP addresses and choose one of the following options:
Any | messages from any device will be accepted |
Any from the following | messages only from specified devices will be accepted |
Any except the following | messages from any devices except specified will be accepted |
List editing tips
To add new items to the end of the list go to the last existing line and press Down Arrow key.
Press INSERT key to insert new item.
Press CTRL+DEL to remove item.
Press F2 to edit item.
Trap type (generic)
Match against the generic type of the trap:
Any | select this option to accept messages of any type. |
Any from the following |
if you want to accept just some type of messages, select this option and mark one or several possible event
types: Cold Start, Warm Start, Link Down, Link Up, Authentication Failure, EGP Neighbor Loss, Enterprise Specific
- ╤old Start - the sender is reinitializing and its configuration may change
- Warm Start - the sender is reinitializing but its configuration will not change
- Link Down - failure in one of the agent's links
- Link Up - one of the agent's links has come up
- Authentication Failure - the agent received a protocol message improperly authenticated
- EGP Neighbor Loss - an Exterior Gateway Protocol neighbor is down
- Enterprise Specific - the trap is identified as not being one of the basic traps
|
Trap type (specific)
You can provide list of enterprise specific codes (numbers) and choose one of the following options:
Any | accept messages of any type |
Any from the following | accept only messages that have one of the specified enterprise specific types |
Any except the following | accept messages with any enterprise specific type except those that are specified in the list |
List editing tips
To add new items to the end of the list go to the last existing line and press Down Arrow key.
Press INSERT key to insert new item.
Press CTRL+DEL to remove item.
Press F2 to edit item.
Enterprise
Enterprise field of the trap contains an OBJECT IDENTIFIER, which names the device that sends the trap. Here you may provide list of OIDs and choose one of the following options:
Any | do not check Enteprise field of the traps |
Any from the following | accept only messages from listed devices. |
Any except the following accept | all messages except from the devices on the list |
Message contains OID
This option allows you to check incoming trap messages for some specific variable and
compare its value to some constant (string or numeric)
compare current value of the variable with previous value of this variable
Just provide OID (OBJECT IDENTIFIER) of the variable and choose one of the following compare conditions:
is < than | message fits the condition when value of the variable is less than specified number |
is > than | message fits the condition when value of the variable is greater than specified number |
is = to | message fits the condition when value of the variable is equal to specified number or string |
is <> from | message fits the condition when value of the variable is not equal to specified number or string |
contains | message fits the condition when value of the variable contains specified string |
does not contain | message fits the condition when value of the variable does not contain specified string |
Also Trap Watcher has 9 conditions that allows you to check how new value had changed versus its previous value: |
increases by | trap message fits the condition when new value is greater then the old one by specified number or more |
decreases by | message fits the condition when new value is less then old one by specified number or more |
changes by | message fits the condition when absolute difference between new and old value is equal or greater then specified number |
increases by (%) | message fits the condition when new value had increased by specified (or greater) percentage versus the old one |
decreases by (%) | message fits the condition when new value had decreased by specified (or greater) percentage versus the old one |
changes by (%) | message fits the condition when an absolute difference between new and old values measured as a percentage of an old value is equal or greater then specified percentage number |
increases /sec | message fits the condition when average increase of the counter (per second) is greater than the specified limit ((current value - old value)/elapsed time >= specified limit) |
decreases /sec | message fits the condition when average decrease of the counter (per second) is greater than the specified limit ((old value - current value)/elapsed time >= specified limit) |
changes /sec | message fits the condition when average absolute difference (change) of the counter (per second) is greater than the specified limit (abs(current value - old value)/elapsed time >= specified limit) |
If you use relative compare modes (increases by, changes by, decreases by (%), increases /sec, etc)
and various network sources can send the same variable, you should restrict the filter to accept SNMP Trap
messages from a single source only. Otherwise IP-Tools could compare messages received from different sources
(that usually does not make any sense).
|
Scan List |
╟Σσ±ⁿ Γ√ ∞εµσ≥σ ταΣα≥ⁿ ±∩Φ±εΩ αΣ≡σ±εΓ Ωε≥ε≡√σ ß≤Σ≤≥ Φ±∩εδⁿτεΓα≥ⁿ ±Ωαφσ≡√
(NB Scanner, SNMP Scanner, Name Scanner, Port Scanner, UDP Scanner, Ping Scanner, LookUp) ∩≡Φ
ΓΩδ■≈σφφεΘ ε∩÷ΦΦ "From List". ╩≡ε∞σ IP αΣ≡σ±εΓ Γ√ ∞εµσ≥σ ταΣα≥ⁿ ΣΦα∩ατεφ
αΣ≡σ±εΓ (≈σ≡στ ±Φ∞Γεδ '-') α ≥αΩµσ Φ∞σφα ⌡ε±≥εΓ.
╧≡Φ∞σ≡ :
;-----------------------------------------------------------------
199.66.10.12
133.65.12.250 - 133.65.13.17
200.32.12.188 - 200.32.12.95 ; ≥σΩ±≥ ∩ε±δσ ';' Φπφε≡Φ≡≤σ≥±
200.32.12.122 - 200.32.12.25
199.66.10.12
www.chat.ru ; Σδ ε≥Σσδⁿφεπε Ωε∞∩ⁿ■≥σ≡α ┬√ ∞εµσ≥σ ≤Ωατα≥ⁿ σπε Φ∞
www.garris.com - www.yahoo.com ; - ε°Φßε≈φα ±≥≡εΩα !
199.66.10.15
;-----------------------------------------------------------------
|