In this case, we are choosing to monitor the interface number 2. To set the interface to use, add the -i=2. Now that you know which interfaces you have, we need to define which interface you want to monitor. It displays the available network interfaces at the bottom of the file. The next method is using the ntopng -h command. Yours may be different, so make sure to change it appropriately. Type the command on your terminal, and it will display which interface your network is using: Moreover, token authentication uses encrypted, machine- generated code to verify the user identity.The first configuration involves determining which network interface you are using. Does not require providing others with personal passwords and can be considered a better security measure. Once the token has been issued, it can be used instead of usual login credentials, also,in case of necessity it can be offered to other users. In the end the server generates a secured, signed token for the user for unlimited duration. Right after comes the verification – by checking inserted credentials, the system (server) determines if the user could obtain the permission to have the access to the resource. Token based authentication is a protocol which allow users to enter their username and password to verify their identity and in return to obtain an access token.Īt first,there is a request to the server that the user makes inserting login credentials. The logic behind the token - based authentication is simple. It can be seen as a key that allows a user to authenticate and prove it’s identity. On a Linux client, it is possible to test the connection to the LDAP server with the following commands.Ī security token is a “trusted tool“ to enter a restricted resource. See the readme at the end of this section LDAP Admin Group: the value for the “memberOf” user attribute used to identifyĪdmin users (with privileges).LDAP User Group: the value for the “memberOf” user attribute used to identify.LDAP Search Path: this indicates the root path where users and groups informationĪre located and is used by ntopng during the login.If anonymous binding is disabled, then explicit LDAP Anonymous Binding: based on the LDAP server configuration, performingĪn LDAP binding request (needed to communicate with the LDAP server) may or.Ports 389 and 636 are theĭefault ports for ldap and ldaps, respectively. LDAP Server Address: the address of the LDAP server.LDAP Accounts Type: can be used to choose for the POSIX based accounts or the.Re-authenticate again, regardless of their residual session duration. The active sessions at midnight, simply by toggling the preference The administrator can also decide to terminate all It is up to the administrator to choose a duration thatĬan guarantee enough security, depending on the environment of the Indeed, aĬompromised session could be used by an attacker for the wholeĭuration time. The shorter the sessionĭuration, the more secure the ntopng accesses are. The session duration is configurable as shown in the following pictureĪnd can go from 1 minute up to 7 days. Longer recognize it, requiring the web user to re-authenticate again. To the session duration, the session is terminated and ntopng will no Will be transparent to the web user and handled behind the scenes.Īuthenticated sessions have a duration. This means that cookie handling and session transmission Session handling is generally done automatically by the web browser of Seeing the session, will recognize the user and consider he/she as Inside another HTTP cookie along with every request made. Web user will be able to transmit the received session back to ntopng Send it to the web user inside an HTTP cookie. Successful authentication, ntopng creates an authenticated session and Only authenticated users can access the ntopng web GUI. Physical Interfaces Aggregation: Interface Views
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |