What is necessary to generate information (tables or graphs) about:  
� traffic monitoring:  
             � Use of duplicate IP addresses.  
             � Identification of local hosts in "promiscuous mode".  
             � Misconfiguration of software applications, by analyzing
protocol traffic data.  
             � Service misuse detection  
               Identification of hosts that do not make use of specified
proxies.  
             � Protocol misuse  
               Identification of hosts that use unnecessary protocols.  
             � Identification of subnet routers  
               Detection of misconfigured workstations acting as routers.  
             � Excessive network bandwidth utilization.  
� network optimization and planning, and  
 detection of network security violations.

Thanks,

     Falc�o              
_______________________________________________
Ntop mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to