Fingbox User Manual
Fingbox User Manual
8/21/2014
TABLE OF CONTENTS
1
2
Introduction ............................................................................................................................ 3
Features ................................................................................................................................ 4
2.1
Synchronization and backup .......................................................................................... 4
2.2
Remote discovery and monitoring .................................................................................. 4
2.3
Web access to your networks ........................................................................................ 4
2.4
Real time alerting ........................................................................................................... 4
2.5
Merge Networks with multiple Access Points ................................................................. 5
2.6
Remote Wake On LAN ................................................................................................... 6
3
Security .................................................................................................................................. 7
4
Access from a mobile device ................................................................................................. 8
5
Access from a web browser .................................................................................................. 9
5.1
Web Application ............................................................................................................. 9
5.2
Network list panel ......................................................................................................... 10
5.3
Network content panel .................................................................................................. 10
5.3.1
The list view .......................................................................................................... 10
5.3.2
The map view ........................................................................................................ 11
5.3.3
The toolbar ............................................................................................................ 11
5.4
The network details page ............................................................................................. 13
5.4.1
The toolbar ............................................................................................................ 13
5.4.2
The ministats panel ............................................................................................... 14
5.5
The host details page ................................................................................................... 14
5.5.1
The TCP service panel .......................................................................................... 15
5.6
The settings panel ........................................................................................................ 15
6
Sentinels .............................................................................................................................. 17
6.1
Configuration ................................................................................................................ 17
6.1.1
Step by step: what do you want to do? ................................................................. 18
6.1.2
Step by step: Fingbox account .............................................................................. 18
6.1.3
Step by step: network details ................................................................................ 19
6.1.4
Step by step: summary ......................................................................................... 20
6.2
Service start up ............................................................................................................ 20
6.2.1
Windows ................................................................................................................ 21
6.2.2
Linux ...................................................................................................................... 21
6.2.3
Mac OS ................................................................................................................. 22
6.2.4
Raspian ................................................................................................................. 22
6.2.5
Manual start .......................................................................................................... 23
6.3
Monitoring ..................................................................................................................... 23
6.4
Removing a monitored network .................................................................................... 24
1 Introduction
Fingbox is a cloud system to monitor and manage your networks, based on Fing mobile and
desktop Apps. It's a secure, cross-platform, comprehensive solution to discover, monitor,
analyze and customize your networks, from anywhere. Intuitive and powerful, Fingbox will
increase the operational efficiency of your business and reduce IT maintenance cost.
Any computer, smartphone and tablet become a powerful tool to manage your networks and
contribute new data. Your account can be accessed from Fing apps and through an easy-touse web user interface.
All network settings and customizations are automatically synchronized across all your
devices. By installing Fing on a desktop workstation and logging into your account, you can
perform operations on remote networks through the Fingbox cloud.
2 Features
2.1 Synchronization and backup
When a network is added to a Fingbox account, you get automatic synchronization and
backup of networks status, customizations, and logs across as many devices as you want.
With the increasing number of personal mobile devices, you would be free of the hassle of
reporting any change back from one to another. Even if your device is lost, damaged or
stolen, your data is safe on our Servers.
Pick the tool you choose it's best for your work today, and you'll be free to change it
tomorrow. No other monitoring tool gives you this flexibility on such a great spectrum of
platforms.
You decide what networks to move into the account and what networks to keep on your local
device, because its your data, and you shall always be in control of what to upload in the
cloud.
Let Fingbox do the heavy lifting, and get alerts in real-time about events in your networks.
Just enable the feature for the networks and devices you want to monitor, and you will
receive a notification when a new host is detected - perfect for intrusion detection - and host
state change notifications - like a server turning off. The notification will report any changes
in the last time frame, with convenient link to the affected devices. Just tap on the links and
you will be able to see the full log of changes for that device, or the entire network if you
need!
Alert on new nodes in network: go to the network details and enable it. An alert is
sent every time a new unknown device comes online in your network. This is great to
detect network intrusions.
Alert on state change: go to the node details and enable it. An alert is sent every time
alert-enabled nodes change state. This is great for monitoring when a server shuts
down or reboots.
TCP service monitoring: an alert is sent every time your crucial services go down and
come back online. Great to detect service outages like a web server going down.
This feature is available only to PRO subscriptions.
3 Security
We take security seriously and take numerous measures to make sure your data is fully
protected.
All your data is encrypted and all your private information is protected on our secure servers.
Access to your information is restricted, so no one other than you can view your networks,
not even us. All communication channels between the Fingbox Servers and Fing Clients
(Apps, Sentinels, Browser) are encrypted via HTTPS or SSL.
In addition, we use advanced encryption to store your profile information and monitored
networks in the Fingbox Secure Storage, with the industry-strong 256-bit SSL suite
encryption algorithms.
With Fingbox security is all over the place, and you can trust us with your data.
Both areas have a dedicated toolbar to interact with the view below.
On the left side, the network list panel, showing the networks in your account. At the center,
the content panel, reporting essential data about the selected network. It is also used to
display account settings.
When a page is dedicated to a specific network, node or activity, the window is rearranged in
a simpler layout with just a toolbar on top and a content area.
The toolbar operates on just the specific element that is being displayed to customize the
settings and perform actions. A Back icon allows going back to the previous level of detail,
up to the Main Window.
10
Use this action to logout from your Account: the working session will expire
and you will be redirected to the login page.
The list reports all the networks currently added into your account. Every network is
represented by an icon, its name, the address expressed as IP address/mask (CIDR
notation), the date and time of last change date and the number of active devices vs. the
total number of devices found.
The icon represents the different types of network that Fingbox supports:
Wi-Fi:
Ethernet:
discovery
IP:
Merged:
those types
A network that is actively monitored by a Sentinel reports a green Monitored tag below
networks address. If the updates from the sentinel have timed out (based on the discovery
timeout that you have applied for the network), an orange Not Responding tag is displayed.
Non-responding networks are usually an indication of missing connectivity and network
failure.
11
The default view is the List View, which displays the list of hosts in the network. The most
relevant details of the hosts, like the number of devices and the most frequent type of
devices, are summarized in the header.
For every host, the icon, host best name (evaluated among DNS name, NetBIOS name
and custom name), IP and MAC addresses, device manufacturer and host tags are
displayed.
If the network identifies elements by MAC address, then it may happen that a single network
bridge respond to several IP addresses. In that case, a small badge marked +N will be
displayed, reporting the number of additional IP addresses connected with the same device.
As a convenience, if the host has notification alerts enabled, a special orange tag Alerted is
displayed.
A grayed-out row represents hosts that have been found in the network, but were not
responding during the latest discovery. Clicking on one row will display the
Search
Box
Searches the hosts matching the given criteria. Clicking on the search box will
enlarge the text area.
Just type any free-text and then ENTER. Fingbox will match the text with any
property of the hosts - like name, mac address, vendor, IP address - and display in
the table only the matching nodes. The match is always case-insensitive.
Searching on specific properties is supported as well, using appropriate keywords.
You may search by:
host state, e.g. state:up or state:down
IP address, e.g. ip:196.22.43.21
host name, e.g. name:webserver
note, e.g. note:No password
location, e.g. location:34th Street, New York, NY
12
13
14
you cannot customize the single devices the bridge is connected to.
The opposite is the identification by IP Address: every IP becomes a host that can
be edited; the downside is that unstable IP assignments coming from a DHCP will
mess up your customizations.
Networks discovered using the network-layer discovery engine will always identify
by IP Address.
15
Do not send
the alerts are temporarily disabled
16
It allows also to configure the order in which networks are listed in the Network List panel: by
Name, by the time of the last change (most-recently change will be on top), by the time of
the last discovery (most-recently discovered will be on top).
17
6 Sentinels
Fingbox Sentinels remotely monitor your networks. Discoveries, events and alerts are
automatically pushed to the cloud using a secure connection.
Once deployed, a Sentinel will constantly monitor your network. Changes are synchronized
into your Fingbox account, providing real time updates to Fing on Android, iOS and the Web.
Moreover, when you configure alerts on the network and related hosts, you'll receive realtime email notifications of the changes.
Sentinels are part of Fing 2.x for Windows, Mac, Linux and Raspberry. You may start
monitoring a network in two very simple steps.
6.1 Configuration
First, you need to install Fing on your computer/server where you have administrative rights.
This means that on Windows Vista and Windows 7 you must make sure to run it as
Administrator, or to have the UAC (User Access Control) turned off.
On Linux and OS X, you must make sure to run it with sudo or as root.
The configuration of the network discovery and linked Fingbox Account is a one-time-only
guided procedure.
On Windows, you may select Overlook Fing from the Start Menu, or open a Command
Prompt and type:
fing interactive
You'll be prompted to enter the target network details. A valid Fingbox account will be
requested and validated against our servers.
The Fingbox Sentinel works using HTTPS so you should make it possible for outgoing
HTTPS (TCP port 80 and 443) to fingbox.com to take place. Fingbox Sentinels doe also
support HTTP proxy, which can be configured in the Fing configuration file (fing.properties).
Once the interactive configuration procedure is complete, a Fingbox profile is saved to an
encrypted file on your local file system in Sentinel configuration folder; on Windows you have
18
a link to Sentinel folder from Start Menu shortcuts, while on OS X and Linux you it's placed
in the folder mentioned below.
The created profiles are then placed in the Sentinel configuration folder:
On Windows you have a link to from Start Menu / Overlook Fing
On Linux/MAC you can find it at /var/data/fing/sentinel
The Sentinel service automatically runs each profile found in the above folder.
Please note that you can skip the following sections and directly try the interactive procedure
of configuring your sentinel, as its a guided procedure. However, if you dont feel confident,
just read the systematic chapters below to understand what youll be asked by the sentinel
configuration facility.
If you want to skip this, just jump to Service start up chapter.
You must enter your email address, press enter, then your password, and again enter.
Please note that when you are entering your password you are not going to read the
characters on the screen, as they are being hidden for privacy reasons.
The configuration program connects to one of our remote servers and checks your account.
The outcome is dumped on screen, showing your account details, as per example below.
19
Logging in to FingBox... OK
FingBox details:
Account:
johndoe@mydomain.com (John Doe)
Account type: PROFESSIONAL until 2014/05/22
In most cases, you will just type the letter of the corresponding network that you want the
sentinel to monitor. E.g. in the case you chose the first one, you just type letter a and enter.
If you are interested in monitoring a non-local network, like a WAN or a VPN, just can write it
directly at the prompt, e.g.:
> west-site.mydomain.com/24
Please enter a name to identify the network.
Leave blank for default: 192.168.1.0/24
>
You are then prompted to enter a custom network name, but you can leave the default one.
Then you must provide the monitoring refresh interval in minutes. Home account owners
have a limit down to 10 minutes interval, while professional accounts can rely on much lower
granularity.
20
FingBox configuration:
Account:
johndoe@mydomain.com (John Doe)
Account type: PROFESSIONAL until 2014/05/22
Network:
192.168.1.0/24 (Ethernet)
Network name: west-site
Refresh:
10 minutes
NUI:
eth-90E6BAD87156-192.168.1.0-24
Conf file:
west-site.fingbox
Automatic configuration dumped above. Choose No to customize Fingbox
NUI/file.
Do you want to keep it, (Y)es or (N)o?
In the common case, you will answer y to question to commit the configuration and you can
skip the rest of the chapter, jumping straight on the Service start up section.
You should answer n and customize the NUI if you are configuring a network that was
previously being monitored by another server/computer. NUI is Network Unique Identifier
and in Fingbox is used, as the name says, to uniquely identify a network in your account.
If you are in the case above, of deploying a sentinel in a new server but willing to keep all
existing configuration, you should now go to the Web User Interface, select the network and
go to the network panel details; there you find a line providing you the needed information:
NUI: eth-90E6BAD87156-192.168.1.0-24 (Support Code #234815042)
Copy the NUI and use it to configure the sentinel; the support code is not needed here, it is
used instead in cases you need us to investigate specific issues and our support team need
to read your network details to debug the issue.
Using the NUI of an existing Fingbox network makes sure that there wont be any duplication
and the newly installed sentinel will update the same network.
Windows service
Linux/Unix System V init service (RedHat/Centos/RPM-based)
Upstart service (Ubuntu/Debian-based)
OSX Launchd (Mac OS)
Raspian (Raspberry Pi)
Manually started
21
6.2.1 Windows
On Windows, the interactive procedure of creating a profile also manages the service
installation and startup. Just answer yes when requested to register and start the Fingbox
sentinel service. Thats all.
6.2.2 Linux
On Linux the Sentinel service can be installed, according to the target platform:
Linux/Unix System V init service (RedHat/Centos/RPM-based)
Upstart service (Ubuntu/Debian-based)
6.2.2.1 System V
The following section applies to Linux distributions supporting System V init.d
Red-hat, Centos, and other RPM based distributions support it.
Copy or link the init.d script from /usr/lib/fing/init.d/fingbox-sentinel to your /etc/init.d folder.
Then add to your services with:
stop:
restart:
22
Copy the upstart script from /usr/lib/fing/upstart/fingbox-sentinel.conf to your /etc/init folder.
To manage the service with upstart:
start:
stop:
6.2.3 Mac OS
The Sentinel is compatible with OSX Launchd, as follows.
Copy or link the launchd script from /usr/lib/fing/launchd/com.overlooksoft.FingSentinel.plist
to your /Library/LaunchDaemons folder.
To copy:
sudo cp /usr/lib/fing/launchd/com.overlooksoft.FingSentinel.plist
/Library/LaunchDaemons
To unload:
6.2.4 Raspian
The following section applies Raspberry pi distribution supporting System V init.d
Raspbian based distributions support it.
Copy or link the init.d script from /usr/lib/fing/init.d/fingbox-sentinel.raspberry to your
/etc/init.d/fingbox-sentinel
Make sure you have installed chkconfig:
23
stop:
service fingbox-sentinel stop
restart:
service fingbox-sentinel restart
fing --sentinel
On OS X and Linux:
The command runs Fing in Fingbox Sentinel mode, thus it's neverending; if you close, kill or
interrupt it, you are actually stopping the sentinel.
6.3 Monitoring
24
By default the Sentinel doesnt log, but it can be easily enabled by means of a configuration
setting: in fing.properties configuration file:
On Windows you have a link to from Start Menu / Overlook Fing / Fing configuration
On other platforms it is placed in /etc/fing
Edit configuration as follows:
overlook.fing.logging.enabled = true
overlook.fing.logging.level = INFO
Tuning
In some rare cases, you should tune the fing discovery engine to better fit your needs.
Discovery engine configuration is placed in fing configuration folder, in discovery.properties
file; you can tune default profiles to change the engine behavior.
E.g. if you experience some frequent up/down state change, you could want to increase the
timeouts and discovery thresholds for data-link discovery engine:
# native (data-link) discovery configuration for default profile
profile.default.data-link.round.interval = 60000
profile.default.data-link.packet.interval = 6
profile.default.data-link.timeout = 3000
profile.default.data-link.retries = 3