What is necessary to generate information (tables or graphs) about:
traffic monitoring:
Use of duplicate IP addresses.
Identification of local hosts in "promiscuous mode".
Misconfiguration of software applications, by analyzing
protocol traffic data.
Service misuse detection
Identification of hosts that do not make use of specified
proxies.
Protocol misuse
Identification of hosts that use unnecessary protocols.
Identification of subnet routers
Detection of misconfigured workstations acting as routers.
Excessive network bandwidth utilization.
network optimization and planning, and
detection of network security violations.
Thanks,
Falc�o
_______________________________________________
Ntop mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop