What is necessary to generate information (tables or graphs) about:  
  traffic monitoring:  
               Use of duplicate IP addresses.  
               Identification of local hosts in "promiscuous mode".  
               Misconfiguration of software applications, by analyzing
protocol traffic data.  
               Service misuse detection  
               Identification of hosts that do not make use of specified
proxies.  
               Protocol misuse  
               Identification of hosts that use unnecessary protocols.  
               Identification of subnet routers  
               Detection of misconfigured workstations acting as routers.  
               Excessive network bandwidth utilization.  
  network optimization and planning, and  
 detection of network security violations.

Thanks,

     Falc�o              
_______________________________________________
Ntop mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to