Search results
Results from the WOW.Com Content Network
RANCID (Really Awesome New Cisco confIg Differ) is a network management application released under a BSD-style license. [1] RANCID uses Expect to connect to the routers, send some commands and put the results in files.
PF, built-in OpenBSD firewall PF can handle the NAT through the "static-port" directive and the bandwidth control through the built-in queuing system of SIP connections pfSense , a firewall / router distribution based on FreeBSD and PF ; has QoS that properly tags VoIP traffic and a SIP proxy package that is available for NATed endpoints.
GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Effectively at end of life. OpenWrt: Active: Linux: x86, x86-64, MIPS, ARM, PowerPC, AVR32, CRIS, m68k, SPARC, SuperH, Ubicom32, etc. GPL V2: Free: Linux distribution with a focus on CPE-routers and
NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination traffic, class of service, and the causes of congestion.
To display and monitor the collected logs one needs to use a client application or access the log file directly on the system. The basic command line tools are tail and grep . The log servers can be configured to send the logs over the network (in addition to the local files).
The Linux PTP Project – an implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. [94]
A management information base (MIB) is a database used for managing the entities in a communication network. Most often associated with the Simple Network Management Protocol (SNMP), the term is also used more generically in contexts such as in OSI/ISO Network management model. While intended to refer to the complete collection of management ...
The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans. [11] Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection. [12]