What is necessary to generate information (tables or graphs) about:
� traffic monitoring:
� Use of duplicate IP addresses.
� Identification of local hosts in "promiscuous mode".
� Misconfiguration of software applications, by analyzing protocol traffic data.
� Service misuse detection
Identification of hosts that do not make use of specified proxies.
� Protocol misuse
Identification of hosts that use unnecessary protocols.
� Identification of subnet routers
Detection of misconfigured workstations acting as routers.
� Excessive network bandwidth utilization.
� network optimization and planning, and
detection of network security violations.
Thanks,
MSN Messenger: converse com os seus amigos online. Instale gr�tis. Clique aqui. _______________________________________________ Ntop mailing list [EMAIL PROTECTED] http://listgateway.unipi.it/mailman/listinfo/ntop
