What is necessary to generate information (tables or graphs) about:
* Traffic monitoring:
* Use of duplicate IP addresses.
* Identification of local hosts in "promiscuous mode".
* Misconfiguration of software applications, by analyzing protocol traffic data.
* Service misuse detection
Identification of hosts that do not make use of specified proxies.
* Protocol misuse
Identification of hosts that use unnecessary protocols.
* Identification of subnet routers
Detection of misconfigured workstations acting as routers.
* Excessive network bandwidth utilization.
* Network optimization and planning, and
* Detection of network security violations.
Thanks,
MSN Messenger: converse com os seus amigos online. Instale gr�tis. Clique aqui. _______________________________________________ Ntop mailing list [EMAIL PROTECTED] http://listgateway.unipi.it/mailman/listinfo/ntop
