{"id":6052,"date":"2015-05-28T09:19:55","date_gmt":"2015-05-28T09:19:55","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=6052"},"modified":"2021-03-04T12:24:26","modified_gmt":"2021-03-04T12:24:26","slug":"7-best-tools-for-network-administration","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/","title":{"rendered":"7 Best Tools for Network Administration"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"432\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/05\/1deb0776ba6936cece16bcf3f8a9c528.png\" alt=\"\" class=\"wp-image-6053\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/05\/1deb0776ba6936cece16bcf3f8a9c528.png 1000w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2015\/05\/1deb0776ba6936cece16bcf3f8a9c528-300x130.png 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span>Introduction<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p style=\"text-align: justify;\">There are plenty of tools available that allow us to do all types of network administration work. Today, we\u2019ll see some handy and the most useful tools that let network administrator to debug, understand and configure networks a bit easily. The goal is to make inventory of essentials to have in toolbox when there is need of debugging or network configuration.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#Introduction\" >Introduction<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#Tools\" >Tools<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#1_Go_Deep_with_WireShark\" >1) Go Deep with WireShark<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#2_Putty\" >2) Putty<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#3_Traceroute\" >3) Traceroute<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#4_Supervision\" >4) Supervision<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#5_Metrology\" >5) Metrology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#6_Nmap\" >6) Nmap<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#7_Ping\" >7) Ping<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tools\"><\/span>Tools<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>So let\u2019s begin, here is a list of tools that network admins do not separate when they put their network administrator\u2019s hat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Go_Deep_with_WireShark\"><\/span>1) Go Deep with WireShark<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">A great open source as well as cross-platform tool, it is basically a network protocol analyzer also called as Sniffer. It allows examining data from a live network or from a capture file stored. We can interactively browse the capture data, explore all the layers of packages and able to see all of their content. It is a very useful tool when we are protecting network from malicious attack. It also has several interesting features such as the ability to apply filters to quantities of captured packets. For example, to display only connections or exchanges between IPs indicated that in a specified language.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Wireshark also has a function \u201cFollow TCP Stream\u201d that tracks live interaction and TCP connections between two machines in a single window, then contents of packets being translated and formatted dynamically. There are many tools like Wireshark, but Wireshark offer numerous options and each has many features such as graphical command line, including features such as tcpdump CLI, or tshark.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Putty\"><\/span>2) Putty<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">There is no need to mention popularity of this tool among administrators separately. This is very simple tool to use and also essential for network administration. It\u2019s a basic tool for remote configuration of different elements. It initializes SSH connections, telnet, or series. In addition, it is a tool with a simple executable exe file that does not even need any installation, also very light weight. It provides several configuration tabs with other options that are kind accessories. Some of these parameters still greatly increase its functionality and capabilities.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Note: one of the missing features of Putty is the ability to manage multiple views within the same window. However, there is a small application that performs this function and enables us to manage, resize and split terminals of Putty.<\/p>\n\n\n\n<p>Also Read: <strong><a href=\"http:\/\/www.esds.co.in\/kb\/creating-putty-shortcuts-in-windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to create Putty shortcuts in Windows?<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Traceroute\"><\/span>3) Traceroute<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">Available of Windows, Linux, Mac OS and IOS Cisco, is a tool that allows following the path of whole package throughout its adventure in a network. This is a handy debugging tool in case of malfunctions and network configuration to see if routing configurations are correctly applied. The operation of Traceroute is quite simple and interesting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Supervision\"><\/span>4) Supervision<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">Supervision is a suite of tools that is a tool in itself, but it\u2019s a process that is widely used in network administrations because it allow to be informed of the status of machine and active elements of the network in real time and also send alerts.<\/p>\n\n\n\n<p style=\"text-align: justify;\">It is a tool that quickly becomes indispensible for medium and large networks. Among the most used tools, note: Nagios and Shinken. There mode owner PRTG, which is also talk about it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Metrology\"><\/span>5) Metrology<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">Some people get confuse between Metrology and Supervision so here we will see what differentiate them from each other. Unlike, Supervision, Metrology will not perform to send an alert or establishment of the state of a host or service at time T, but will have to lead the graph plotting describing metrics (values) of a flow, the use of a resource, etc\u2026<\/p>\n\n\n\n<p style=\"text-align: justify;\">Metrology enables the establishment of a base-line, which is a reference line of network status at a time T or during a so-called reference period. This usually allows detecting unusual behavior of the network during peak load, performance losses, etc\u2026 Among the Metrology tools one might note Cacti and Munin specifically, which probably the best known in free mode.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Nmap\"><\/span>6) Nmap<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">This is a free tool widely used in defense of network attack. As its name suggests, it has the function nmap discovery and mapping of networks through more or less extensive requests to a network or to a specific host. For example, it\u2019s very useful to know, which ports are open on a host and therefore how it seen from the outside, but also know by what protocol we can go on such manager such as SSH, Telnet, etc\u2026 Nmap mostly used from the command line, but there is also a GUI version available on both Windows and Linux.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Ping\"><\/span>7) Ping<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p style=\"text-align: justify;\">Ping is one of the first orders to which one learns to use when starting machine and its use is still common during all these of years of practice. This is one the first tests we do when we try to verify that a network link is operational between two hosts. Its use is very similar on all OS.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p style=\"text-align: justify;\">These are the 7 essential networking tools that widely used by network admins when they put network administrator\u2019s hat. What about you? Apart from this list what tools you would consider or regularly use when configuring or troubleshooting a network?<\/p>\n\n\n\n<p>Also Read: <strong><a href=\"http:\/\/www.esds.co.in\/kb\/top-10-tools-for-linux-system-admins\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top 10 tools for Linux System Admins<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction There are plenty of tools available that allow us to do all types of network administration work. Today, we\u2019ll see some handy and the most useful tools that let network administrator to debug, understand and configure networks a bit easily. The goal is to make inventory of essentials to have in toolbox when there&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/7-best-tools-for-network-administration\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":24,"featured_media":6053,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[2634,1299,2635],"class_list":["post-6052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-centers","tag-network-administration","tag-network-administration-tools","tag-networking-tools-list"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=6052"}],"version-history":[{"count":22,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6052\/revisions"}],"predecessor-version":[{"id":11889,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6052\/revisions\/11889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/6053"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=6052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=6052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=6052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}