What is necessary to generate information (tables or graphs) about: 

* Traffic monitoring: 

             * Use of duplicate IP addresses. 

             * Identification of local hosts in "promiscuous mode". 

             * Misconfiguration of software applications, by analyzing protocol traffic data. 

             * Service misuse detection 

               Identification of hosts that do not make use of specified proxies. 

             * Protocol misuse 

               Identification of hosts that use unnecessary protocols. 

             * Identification of subnet routers 

               Detection of misconfigured workstations acting as routers. 

             * Excessive network bandwidth utilization. 

* Network optimization and planning, and 

* Detection of network security violations.

 

Thanks,

 

     Falc�o 


MSN Messenger: converse com os seus amigos online. Instale gr�tis. Clique aqui. _______________________________________________ Ntop mailing list [EMAIL PROTECTED] http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to