|
NAMESmokeping::probes::TelnetIOSPing - Cisco IOS Probe for SmokePingSYNOPSIS*** Probes *** +TelnetIOSPing forks = 5 offset = 50% packetsize = 56 step = 300 timeout = 15 # The following variables can be overridden in each target section /^influx_.+/ = influx_location = In the basement iospass = password # mandatory iosuser = user # mandatory pings = 5 psource = 192.168.2.129 source = 192.168.2.1 # mandatory vrf = VRF1 # [...] *** Targets *** probe = TelnetIOSPing # if this should be the default probe # [...] + mytarget # probe = TelnetIOSPing # if the default probe is something else host = my.host /^influx_.+/ = influx_location = In the basement iospass = password # mandatory iosuser = user # mandatory pings = 5 psource = 192.168.2.129 source = 192.168.2.1 # mandatory vrf = VRF1 DESCRIPTIONIntegrates Cisco IOS as a probe into smokeping. Uses the telnet protocol to run a ping from an IOS device (source) to another device (host). This probe basically uses the "extended ping" of the Cisco IOS. You have the option to specify which interface the ping is sourced from as well.VARIABLESSupported probe-specific variables:
Supported target-specific variables:
AUTHORSJohn A Jackson <geonjay@infoave.net>based HEAVILY on Smokeping::probes::IOSPing by Paul J Murphy <paul@murph.org> based on Smokeping::probes::FPing by Tobias Oetiker <tobi@oetiker.ch> NOTESIOS configurationThe IOS device should have a username/password configured, as well as the ability to connect to the VTY(s). eg:! username smokeping privilege 5 password 0 SmokepingPassword ! line vty 0 4 login local transport input telnet ! Some IOS devices have a maximum of 5 VTYs available, so be careful not to hit a limit with the 'forks' variable. RequirementsThis module requires the Net::Telnet module for perl. This is usually included on most newer OSs which include perl.DebuggingThere is some VERY rudimentary debugging code built into this module (it's based on the debugging code written into Net::Telnet). It will log information into three files "TIPreturn", "TIPoutlog", and "TIPdump". These files will be written out into your current working directory (CWD). You can change the names of these files to something with more meaning to you.Password authenticationYou should be advised that the authentication method of telnet uses clear text transmissions...meaning that without proper network security measures someone could sniff your username and password off the network. I may attempt to incorporate SSH in a future version of this module, but it is very doubtful. Right now SSH adds a LOT of processing overhead to a router, and isn't incredibly easy to implement in perl.Having said this, don't be too scared of telnet. Remember, the original IOSPing module used RSH, which is even more scary to use from a security perspective. Ping packet sizeThe FPing manpage has the following to say on the topic of ping packet size:Number of bytes of ping data to send. The minimum size (normally 12) allows room for the data that fping needs to do its work (sequence number, timestamp). The reported received data size includes the IP header (normally 20 bytes) and ICMP header (8 bytes), so the minimum total size is 40 bytes. Default is 56, as in ping. Maximum is the theoretical maximum IP datagram size (64K), though most systems limit this to a smaller, system-dependent number.
Visit the GSP FreeBSD Man Page Interface. |