What is necessary to generate information (tables or graphs) about:
� traffic monitoring:
� Use of duplicate IP addresses.
� Identification of local hosts in "promiscuous mode".
� Misconfiguration of software applications, by analyzing
protocol traffic data.
� Service misuse detection
Identification of hosts that do not make use of specified
proxies.
� Protocol misuse
Identification of hosts that use unnecessary protocols.
� Identification of subnet routers
Detection of misconfigured workstations acting as routers.
� Excessive network bandwidth utilization.
� network optimization and planning, and
detection of network security violations.
Thanks,
Falc�o
_______________________________________________
Ntop mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop