Smokeping_probes_TelnetIOSPing man page on Alpinelinux

Man page or keyword search:  
man Server   18016 pages
apropos Keyword Search (all sections)
Output format
Alpinelinux logo
[printable version]

Smokeping_probes_TelnetIOSPing(3)  SmokePing Smokeping_probes_TelnetIOSPing(3)

NAME
       Smokeping::probes::TelnetIOSPing - Cisco IOS Probe for SmokePing

SYNOPSIS
	*** Probes ***

	+TelnetIOSPing

	forks = 5
	offset = 50%
	packetsize = 56
	step = 300
	timeout = 15

	# The following variables can be overridden in each target section
	iospass = password # mandatory
	iosuser = user # mandatory
	pings = 5
	psource = 192.168.2.129
	source = 192.168.2.1 # mandatory

	# [...]

	*** Targets ***

	probe = TelnetIOSPing # if this should be the default probe

	# [...]

	+ mytarget
	# probe = TelnetIOSPing # if the default probe is something else
	host = my.host
	iospass = password # mandatory
	iosuser = user # mandatory
	pings = 5
	psource = 192.168.2.129
	source = 192.168.2.1 # mandatory

DESCRIPTION
       Integrates Cisco IOS as a probe into smokeping.	Uses the telnet
       protocol to run a ping from an IOS device (source) to another device
       (host).	This probe basically uses the "extended ping" of the Cisco
       IOS.  You have the option to specify which interface the ping is
       sourced from as well.

VARIABLES
       Supported probe-specific variables:

       forks
	   Run this many concurrent processes at maximum

	   Example value: 5

	   Default value: 5

       offset
	   If you run many probes concurrently you may want to prevent them
	   from hitting your network all at the same time. Using the probe-
	   specific offset parameter you can change the point in time when
	   each probe will be run. Offset is specified in % of total interval,
	   or alternatively as 'random', and the offset from the 'General'
	   section is used if nothing is specified here. Note that this does
	   NOT influence the rrds itself, it is just a matter of when data
	   acqusition is initiated.  (This variable is only applicable if the
	   variable 'concurrentprobes' is set in the 'General' section.)

	   Example value: 50%

       packetsize
	   The (optional) packetsize option lets you configure the packetsize
	   for the pings sent.

	   Default value: 56

       step
	   Duration of the base interval that this probe should use, if
	   different from the one specified in the 'Database' section. Note
	   that the step in the RRD files is fixed when they are originally
	   generated, and if you change the step parameter afterwards, you'll
	   have to delete the old RRD files or somehow convert them. (This
	   variable is only applicable if the variable 'concurrentprobes' is
	   set in the 'General' section.)

	   Example value: 300

       timeout
	   How long a single 'ping' takes at maximum

	   Example value: 15

	   Default value: 5

       Supported target-specific variables:

       iospass
	   The iospass option allows you to specify the password for the
	   username specified with the option iosuser.

	   Example value: password

	   This setting is mandatory.

       iosuser
	   The iosuser option allows you to specify a username that has ping
	   capability on the IOS Device.

	   Example value: user

	   This setting is mandatory.

       pings
	   How many pings should be sent to each target, if different from the
	   global value specified in the Database section. Note that the
	   number of pings in the RRD files is fixed when they are originally
	   generated, and if you change this parameter afterwards, you'll have
	   to delete the old RRD files or somehow convert them.

	   Example value: 5

       psource
	   The (optional) psource option specifies an alternate IP address or
	   Interface from which you wish to source your pings from.  Routers
	   can have many many IP addresses, and interfaces.  When you ping
	   from a router you have the ability to choose which interface and/or
	   which IP address the ping is sourced from.  Specifying an
	   IP/interface does not necessarily specify the interface from which
	   the ping will leave, but will specify which address the packet(s)
	   appear to come from.	 If this option is left out the IOS Device
	   will source the packet automatically based on routing and/or
	   metrics.  If this doesn't make sense to you then just leave it out.

	   Example value: 192.168.2.129

       source
	   The source option specifies the IOS device to which we telnet.
	   This is an IP address of an IOS Device that you/your server:
		1)  Have the ability to telnet to      2)  Have a valid
	   username and password for

	   Example value: 192.168.2.1

	   This setting is mandatory.

AUTHORS
       John A Jackson <geonjay@infoave.net>

       based HEAVILY on Smokeping::probes::IOSPing by

       Paul J Murphy <paul@murph.org>

       based on Smokeping::probes::FPing by

       Tobias Oetiker <tobi@oetiker.ch>

NOTES
   IOS configuration
       The IOS device should have a username/password configured, as well as
       the ability to connect to the VTY(s).  eg:

	   !
	   username smokeping privilege 5 password 0 SmokepingPassword
	   !
	   line vty 0 4
	    login local
	    transport input telnet
	   !

       Some IOS devices have a maximum of 5 VTYs available, so be careful not
       to hit a limit with the 'forks' variable.

   Requirements
       This module requires the Net::Telnet module for perl.  This is usually
       included on most newer OSs which include perl.

   Debugging
       There is some VERY rudimentary debugging code built into this module
       (it's based on the debugging code written into Net::Telnet).  It will
       log information into three files "TIPreturn", "TIPoutlog", and
       "TIPdump".  These files will be written out into your current working
       directory (CWD).	 You can change the names of these files to something
       with more meaning to you.

   Password authentication
       You should be advised that the authentication method of telnet uses
       clear text transmissions...meaning that without proper network security
       measures someone could sniff your username and password off the
       network.	 I may attempt to incorporate SSH in a future version of this
       module, but it is very doubtful.	 Right now SSH adds a LOT of
       processing overhead to a router, and isn't incredibly easy to implement
       in perl.

       Having said this, don't be too scared of telnet.	 Remember, the
       original IOSPing module used RSH, which is even more scary to use from
       a security perspective.

   Ping packet size
       The FPing manpage has the following to say on the topic of ping packet
       size:

       Number of bytes of ping data to send.  The minimum size (normally 12)
       allows room for the data that fping needs to do its work (sequence
       number, timestamp).  The reported received data size includes the IP
       header (normally 20 bytes) and ICMP header (8 bytes), so the minimum
       total size is 40 bytes.	Default is 56, as in ping. Maximum is the
       theoretical maximum IP datagram size (64K), though most systems limit
       this to a smaller, system-dependent number.

2.6.9				  2014-05-15 Smokeping_probes_TelnetIOSPing(3)
[top]

List of man pages available for Alpinelinux

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net