What about setting up an outbound "allow all" filter that logs "accepts"? This would give you the Source IP address, Destination IP address, Source port (probably not too useful), and Destination port (which will tell you what service).
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Mike Schrauder Sent: Monday, January 31, 2000 9:20 AM To: [EMAIL PROTECTED] Subject: SNMP, help a newbie please Send postings to: [EMAIL PROTECTED] Access the list archives at: http://www.gnatbox.com/gb-users/ ---------------------------------- The powers that be would like to log where everyone goes on the net. Not to be big brother, but just to enforce policy only if necessary. If we just say "we can track you", that will eliminate abuse 99% of the time. But if we have an "incident"... We would like to see if any of you gurus out there are using the snmp trapping. Can this log (using dns) where people are going outbound from the PRO? Any help, pointers, observations greatly appreciated. One other thing. Are there any security risks to running over the GB? Thanks. Mike Schrauder MIS, Specialty Blades, Inc. [EMAIL PROTECTED] ICQ 3317912 P540.245.1006 F540.248.4400 ---------------------------------------------- To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe gb-users your_email_address in the body of the message
