Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:dpi_components:dpiui:user_guide:lawful_interception:network_audit [2022/07/10 19:24] – mzhalilova | en:dpi:dpi_components:dpiui:user_guide:lawful_interception:network_audit [2024/09/26 15:29] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== Network audit ====== |
- | {{indexmenu_n> | + | {{indexmenu_n> |
To go to the section, click the LAWFUL INTERCEPTION menu item, then click the NETWORK AUDIT menu item. | To go to the section, click the LAWFUL INTERCEPTION menu item, then click the NETWORK AUDIT menu item. | ||
- | {{ }} | + | {{ en: |
===== Profiles ===== | ===== Profiles ===== | ||
Line 11: | Line 11: | ||
In the window that opens, enter the parameters. | In the window that opens, enter the parameters. | ||
- | {{ }} | + | {{ en: |
Basic parameters: | Basic parameters: | ||
Line 21: | Line 21: | ||
==== Hosts ==== | ==== Hosts ==== | ||
- | {{ }} | + | {{ en: |
**1. Scan the list**. This option allows the user to get a list of hosts of a given network. | **1. Scan the list**. This option allows the user to get a list of hosts of a given network. | ||
Line 56: | Line 56: | ||
==== Ports ==== | ==== Ports ==== | ||
- | {{ }} | + | {{ en: |
**1.TCP SYN scan**. By default and the most popular type of scanning. | **1.TCP SYN scan**. By default and the most popular type of scanning. | ||
Line 83: | Line 83: | ||
==== Order ==== | ==== Order ==== | ||
- | {{ }} | + | {{ en: |
**1. Quick scan.** | **1. Quick scan.** | ||
Line 96: | Line 96: | ||
==== Service ==== | ==== Service ==== | ||
- | {{}} | + | {{ en: |
**1. Service definition**. Examine open ports to determine service/ | **1. Service definition**. Examine open ports to determine service/ | ||
Line 109: | Line 109: | ||
==== OS ==== | ==== OS ==== | ||
- | {{}} | + | {{ en: |
**1. OS definition**. The option enables the function of determining the operating system. | **1. OS definition**. The option enables the function of determining the operating system. | ||
Line 118: | Line 118: | ||
==== Firewall ==== | ==== Firewall ==== | ||
- | {{}} | + | {{ en: |
**1.Fragment packages**. When this option is set, all types of scanning (including various types of pinging) will use small fragmented IP packets. | **1.Fragment packages**. When this option is set, all types of scanning (including various types of pinging) will use small fragmented IP packets. | ||
Line 130: | Line 130: | ||
**5. Change the source address**. To use this option, you need an IP address as a parameter to specify the interface that you want to use to send packets. | **5. Change the source address**. To use this option, you need an IP address as a parameter to specify the interface that you want to use to send packets. | ||
- | ==== Various | + | ==== Misc ==== |
- | {{}} | + | {{ en: |
**1. Enable IPv6 scanning**. | **1. Enable IPv6 scanning**. | ||
Line 140: | Line 140: | ||
==== Time ==== | ==== Time ==== | ||
- | {{}} | + | {{ en: |
**1. Temporary template**. The paranoid and sneaky modes are designed to bypass IDS. Polite (polite) mode reduces the intensity of scanning in order to reduce the consumption of bandwidth and machine resources. Normal the mode is set by default, so the -T3 option does nothing. Aggressive mode increases the intensity of scanning, assuming that the user uses a fairly fast and reliable network. Finally, insane mode assumes that the user uses an extremely fast network and is willing to sacrifice accuracy for speed. | **1. Temporary template**. The paranoid and sneaky modes are designed to bypass IDS. Polite (polite) mode reduces the intensity of scanning in order to reduce the consumption of bandwidth and machine resources. Normal the mode is set by default, so the -T3 option does nothing. Aggressive mode increases the intensity of scanning, assuming that the user uses a fairly fast and reliable network. Finally, insane mode assumes that the user uses an extremely fast network and is willing to sacrifice accuracy for speed. | ||
Line 150: | Line 150: | ||
**4. Waiting time**. This option regulates the waiting time for a response to a request. | **4. Waiting time**. This option regulates the waiting time for a response to a request. | ||
- | ==== Add underProfile ==== | + | ===== Add underProfile |
To add a scan subprofile, click on the button **"Add a subprofile" | To add a scan subprofile, click on the button **"Add a subprofile" | ||
- | {{}} | + | {{ en: |
- | ==== Start or stop scanning ==== | + | ===== Start or stop scanning |
To start scanning a profile, select a profile from the list and click on the **" | To start scanning a profile, select a profile from the list and click on the **" | ||
You can also launch the selected profile using the button located to the left of each profile in the list.\\ | You can also launch the selected profile using the button located to the left of each profile in the list.\\ | ||
To stop the running profile scan, click on the **" | To stop the running profile scan, click on the **" | ||
- | {{}} | + | {{ en: |
- | ==== Update the list ==== | + | ===== Update the list ===== |
To update the list of profiles, click on the **" | To update the list of profiles, click on the **" | ||
- | {{ }} | + | {{ en: |
- | ====Edit a list item==== | + | ===== Delete a list item ===== |
- | To change the profile settings or under the profile, click on the **" | + | |
- | + | ||
- | {{}} | + | |
- | + | ||
- | ==== Delete a list item ==== | + | |
To delete an item from the list, click on the **" | To delete an item from the list, click on the **" | ||
- | {{}} | + | {{ en: |
===== Scan result ===== | ===== Scan result ===== | ||
This block consists of two segments that are responsible for the status of the checked nodes. | This block consists of two segments that are responsible for the status of the checked nodes. | ||