![]() ![]() Inability to map user traffic to actions performed or user s interests. Windows PCs are not first-class citizens. Unable to monitor intra-virtual machines (VMs) traffic (no cloud-friendly). GRE, PPP, GTP) are not always handled, so that we don t know what happens inside tunnels. Cloud services access can t be monitored with simple periodic pings as provides IPs are often unresponsive and change according to our location 10ġ1 Limitations of (Many) Monitoring Systems Visibility limited to packet header (payload agnostic). HTTPS is not checked so often it flows unrestricted. HTTP) protocols can be used to tunnel nonhypertext services (e.g. Traditional firewalls are becoming blind as: Generic (e.g. Mobile users, intra-vm data exchange, or cloud services are often invisible to network monitoring systems. 9ġ0 Network Health Monitoring is Complex Traditional network monitoring systems can limit their supervision activities to home networks. ![]() Use open-source to spread the software, and let the community test it on unchartered places. Use commodity hardware for producing affordable, long-living (no vendor lock), scalable (use new hardware by the time it is becoming available). Leverage on modern multi-core/numa architectures in order to promote scalability. 8ĩ ntop s Approach to Traffic Monitoring Ability to capture, process and (optionally) transmit traffic at line rate, any packet size. Promote open-source software, while protecting selected IPRs. Provide users comprehensive and accurate traffic reports able to offer at a fraction of price what many commercial products do together. Go beyond standard metrics and increase traffic visibility by analyzing key protocols in detail. 7Ĩ ntop Goals Provide better, yet price effective, traffic monitoring solution by enabling users to have increased traffic visibility. Often people believe in speed=hardware, so they buy hardware probes that are unlike to provide timely answers to continuously evolving monitoring needs. Cisco TelePresence) and not what the user needs. Commercial probes monitor what the vendor wants (e.g. Consequences: Monitoring evolution is capped by hardware vendors. 6ħ Problem Statement Today the market is partially driven by hardware manufacturers that manufacture costly, limited (usually no analysis beyond packet header) and often not extensible solutions. ntop tried to fill the lack of simple traffic monitoring application releasing the original ntop application aimed at simplifying the analysis of network traffic. The explosion of the Internet(working) reduced the number of vendors but increased the number of monitoring devices and protocols. 5Ħ Problem Statement In 90s standard-based (e.g. 4ĥ About Our software is powering many commercial products. Today our products range from traffic monitoring, high-speed packet processing, deeppacket inspection, and IDS/IPS acceleration. ntop (circa 1998) is the first app we released and it is a web-based network monitoring application. ![]() 2Ĥ About Private company devoted to development of open source network traffic monitoring applications. 1 Monitoring Network Traffic using ntopng Luca DeriĢ Outlook What are the main activities of ? ntop s view on network monitoring. ![]()
0 Comments
Leave a Reply. |