How to Implement Remote Network Monitoring?

Oct 13
13:17

2014

Jhon Lutera

Jhon Lutera

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

Remote network monitoring works by combining publicly available information, the challenge, with a secret known only to the user to produce the proper response. This means that remote network monitoring is implemented using one of the major security concepts, Something You Know (SYK).

mediaimage

The secret is called a passphrase,How to Implement Remote Network Monitoring? Articles and when it is combined with the challenge in either the MD4 or MD5 algorithms, it produces the password or response. The challenge is in the form of the iteration number and a string of characters called a seed. Your seed is not considered a secret, but having all your seeds be unique between systems is important. If you choose your dog's name as a seed on one system, you should not reuse this seed on another system. Your secret (your password) can be the same on all systems, provided that your seed is different.

Different hardware architectures and OS versions have a variety of network monitoring implementations. When you connect to a system running network monitoring, you are prompted for your username. The system responds with an iteration number and your seed. You must then calculate the required response by typing the iteration number, your seed, and your secret password at a trusted piece of hardware, such as a calculator that supports MD4/MD5 or a piece of calculator software.The calculator computes the required response, and you type that response as your password. The challenge and required response change every time you successfully log in. When the user connects to the remote system, the login program provides the iteration number and seed for this user. Using the seed and iteration value supplied in the challenge, the user must then calculate his or her one-time password and log in. In this example, password echoing was enabled so that the password that was provided could be seen.You must take several actions in order to secure a system with REMOTE NETWORK MONITORING. These are the following:

  • Get the right code for the system.
  • Get the needed calculators for the clients.
  • Compile and install a network monitoring components.
  • Have users initialize their keys.
  • Enable remote network monitoring.

Now you can turn your focus to the steps involved in installing remote network monitoring. The operation of the one-time password system involves two sides: the client and the host. On the client side, the appropriate one-time password must be generated. On the host side, the server must verify the one-time password and permit the secure changing of the user's secret pass-phrase. There are a number of IT services companies which will inform you about where to obtain the source and compile it, how to implement the server side, and how to put all the pieces together.