enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. RANCID (software) - Wikipedia

    en.wikipedia.org/wiki/RANCID_(software)

    RANCID (Really Awesome New Cisco confIg Differ) is a network management application released under a BSD-style license. [1] RANCID uses Expect to connect to the routers, send some commands and put the results in files.

  3. List of SIP software - Wikipedia

    en.wikipedia.org/wiki/List_of_SIP_software

    PF, built-in OpenBSD firewall PF can handle the NAT through the "static-port" directive and the bandwidth control through the built-in queuing system of SIP connections pfSense , a firewall / router distribution based on FreeBSD and PF ; has QoS that properly tags VoIP traffic and a SIP proxy package that is available for NATed endpoints.

  4. List of router and firewall distributions - Wikipedia

    en.wikipedia.org/wiki/List_of_router_and...

    GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Effectively at end of life. OpenWrt: Active: Linux: x86, x86-64, MIPS, ARM, PowerPC, AVR32, CRIS, m68k, SPARC, SuperH, Ubicom32, etc. GPL V2: Free: Linux distribution with a focus on CPE-routers and

  5. NetFlow - Wikipedia

    en.wikipedia.org/wiki/NetFlow

    NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination traffic, class of service, and the causes of congestion.

  6. Syslog - Wikipedia

    en.wikipedia.org/wiki/Syslog

    To display and monitor the collected logs one needs to use a client application or access the log file directly on the system. The basic command line tools are tail and grep . The log servers can be configured to send the logs over the network (in addition to the local files).

  7. List of PTP implementations - Wikipedia

    en.wikipedia.org/wiki/List_of_PTP_implementations

    The Linux PTP Project – an implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. [94]

  8. Management information base - Wikipedia

    en.wikipedia.org/wiki/Management_information_base

    A management information base (MIB) is a database used for managing the entities in a communication network. Most often associated with the Simple Network Management Protocol (SNMP), the term is also used more generically in contexts such as in OSI/ISO Network management model. While intended to refer to the complete collection of management ...

  9. Snort (software) - Wikipedia

    en.wikipedia.org/wiki/Snort_(software)

    The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans. [11] Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection. [12]