McAfee VSF09EMB1RAA User Guide - Page 109

Tracing Internet traffic

Page 109 highlights

Chapter 20 Introduction 107 Tracing Internet traffic Firewall offers a number of options for tracing Internet traffic. These options let you geographically trace a network computer, obtain domain and network information, and trace computers from the Inbound Events and Intrusion Detection Events logs. Geographically trace a network computer You can use Visual Tracer to geographically locate a computer that is connecting or attempting to connect to your computer, using its name or IP address. You can also access network and registration information using Visual Tracer. Running Visual Tracer displays a world map which displays the most probable route of data taken from the source computer to yours. 1 Ensure that the Advanced Menu is enabled, and then click Tools. 2 On the Tools pane, click Visual Tracer. 3 Type the computer's IP address, and click Trace. 4 Under Visual Tracer, select Map View. Note: You cannot trace looped, private, or invalid IP address events. Obtain computer registration information You can obtain a computer's registration information from SecurityCenter using Visual Trace. Information includes the domain name, the registrant's name and address, and the administrative contact. 1 Ensure that the Advanced Menu is enabled, and then click Tools. 2 On the Tools pane, click Visual Tracer. 3 Type the computer's IP address, and then click Trace. 4 Under Visual Tracer, select Registrant View. Obtain computer network information You can obtain a computer's network information from SecurityCenter using Visual Trace. Network information includes details about the network on which the domain resides. 1 Ensure that the Advanced Menu is enabled, and then click Tools. 2 On the Tools pane, click Visual Tracer. 3 Type the computer's IP address, and then click Trace. 4 Under Visual Tracer, select Network View.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

Chapter 20
Introduction
107
Tracing Internet traffic
Firewall offers a number of options for tracing Internet traffic.
These options let you geographically trace a network computer,
obtain domain and network information, and trace computers
from the Inbound Events and Intrusion Detection Events logs.
Geographically trace a network computer
You can use Visual Tracer to geographically locate a computer
that is connecting or attempting to connect to your computer,
using its name or IP address. You can also access network and
registration information using Visual Tracer. Running Visual
Tracer displays a world map which displays the most probable
route of data taken from the source computer to yours.
1
Ensure that the Advanced Menu is enabled, and then click
Tools
.
2
On the Tools pane, click
Visual Tracer
.
3
Type the computer's IP address, and click
Trace
.
4
Under
Visual Tracer
, select
Map View
.
Note
: You cannot trace looped, private, or invalid IP address
events.
Obtain computer registration information
You can obtain a computer's registration information from
SecurityCenter using Visual Trace. Information includes the
domain name, the registrant's name and address, and the
administrative contact.
1
Ensure that the Advanced Menu is enabled, and then click
Tools
.
2
On the Tools pane, click
Visual Tracer
.
3
Type the computer's IP address, and then click
Trace
.
4
Under
Visual Tracer
, select
Registrant View
.
Obtain computer network information
You can obtain a computer's network information from
SecurityCenter using Visual Trace. Network information includes
details about the network on which the domain resides.
1
Ensure that the Advanced Menu is enabled, and then click
Tools
.
2
On the Tools pane, click
Visual Tracer
.
3
Type the computer's IP address, and then click
Trace
.
4
Under
Visual Tracer
, select
Network View
.