background preloader

Five free network analyzers worth any IT admin's time

Five free network analyzers worth any IT admin's time
If you work on a network, you then know the value of information. Solid information leads to a strong and worry-free network (or at least as worry-free as you can manage). In order to gather that information, you need the right tools. The tools I speak of are network analyzers. Once you start looking, you can find analyzers of every shape, size, and price. But for most network admins, the free tools do a solid-enough job to get you the information you need. But which of these tools are the best? This blog post is also available as a TechRepublic Photo Gallery. Five Apps 1. Wireshark is one of the most powerful network protocol analyzers on the market (free or paid). NAST (Network Analyzer Sniffer Tool) is an ncurses-based tool that has, admittedly, not been under development for quite some time. 3. Zenmap is the official GUI for the Nmap Security Scanner. 4. 5. JDSU Network Analyzer Fast Ethernet has a long name and is long in features. Bottom line Also read:

Related:  Tools and Utilitiesnetwork traffic analysisSecurityNetworking

6 free network vulnerability scanners Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself. Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them.

Blog In past we have written about net-sniff-ng and we have used it in tandem with Xplico. In recent days Daniel Borkmann has released a new version of net-sniff-ng, in this new version there are many improvements and new feature. With the last version 0.5.6 net-sniff-ng can be used with Xplico without apply any patch. So we recommend to all Xplico users to use the last version of net-sniff-ng.

Understanding and selecting authentication methods If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays in a security plan. Computer/network security hinges on two very simple goals:Keeping unauthorized persons from gaining access to resourcesEnsuring that authorized persons can access the resources they needThere are a number of components involved in accomplishing these objectives. One way is to assign access permissions to resources that specify which users can or cannot access those resources and under what circumstances. (For example, you may want a specific user or group of users to have access when logged on from a computer that is physically on-site but not from a remote dial-up connection.)

Working with Open Shortest Path First (OSPF) Routing Protocol Because Open Shortest Path First (OSPF) is an open standard protocol, many people have contributed to its design and thousands upon thousands of people have reviewed it. In this section,some functional components of this interior gateway protocol (IGP) and its use in your networks will be highlighted. Because every IGP behaves slightly differently from other IGPs, you should be familiar with a few OSPF terms that are used with the protocol before jumping into the configuration commands. This section attempts to clarify the major terms and concepts you should be familiar with. OSPF as a link-state protocol In link-state protocols, the link part of the protocol is the interface on the router, while the state is how it relates to its neighbors, which would include its address and network information.

OUI Lookup Tool Riverbed is Wireshark's primary sponsor and provides our funding. They also make great products. I have a lot of traffic... ANSWER: SteelCentral™ Packet Analyzer PE $29.95/yr • Visually rich, powerful LAN analyzer• Quickly access very large pcap files• Professional, customizable reports• Advanced triggers and alerts• Fully integrated with Wireshark and AirPcap™ No, really, I have a LOT of traffic… simple usage of tcpdump May 23rd, 2007 mysurface Posted in Network, tcpdump | Hits: 609099 | 31 Comments » This is what I learn from geek00l today. Tcpdump is a really great tool for network security analyst, you can dump packets that flows within your networks into file for further analysis. With some filters you can capture only the interested packets, which it reduce the size of saved dump and further reduce loading and processing time of packets analysis. This post will only covers the fundamental of tcpdump usage, bare in mind tcpdump can do much much more than what I illustrate here.

CCIE Security - Cisco Networking Certification Courses Expert Level Knowledge and Experience Cisco Certified Internetwork Expert (CCIE) is the highest level of technical networking certification offered by Cisco. Put your knowledge and experience to the test. Achieve Cisco CCIE certification and accelerate your career. The Cisco Certified Internetwork Expert (CCIE) certification is accepted worldwide as the most prestigious networking certification in the industry. How to Use Microsoft NPS for Wireless Authentication with a Ruckus ZoneDirector I’ve already discussed using a FreeRADIUS server for wireless authentication, so now I’m going to address using Microsoft NPS, Microsoft’s implementation of RADIUS. The main reason to do this would be Active Directory integration, but other organizations may have other reasons. NPS is bundled with all versions of Windows Server starting with Server 2008.