What is necessary to generate information (tables or graphs) about: 

� traffic monitoring: 

             � Use of duplicate IP addresses. 

             � Identification of local hosts in "promiscuous mode". 

             � Misconfiguration of software applications, by analyzing protocol traffic data. 

             � Service misuse detection 

               Identification of hosts that do not make use of specified proxies. 

             � Protocol misuse 

               Identification of hosts that use unnecessary protocols. 

             � Identification of subnet routers 

               Detection of misconfigured workstations acting as routers. 

             � Excessive network bandwidth utilization. 

� network optimization and planning, and 

 detection of network security violations.

 

Thanks,

 

     Falc�o             


MSN Messenger: converse com os seus amigos online. Instale gr�tis. Clique aqui. _______________________________________________ Ntop mailing list [EMAIL PROTECTED] http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to