home *** CD-ROM | disk | FTP | other *** search
Text File | 1997-09-26 | 301.3 KB | 10,755 lines |
-
-
-
-
-
-
- Network Working Group R. Enger
- Request for Comments: 1470 ANS
- FYI: 2 J. Reynolds
- Obsoletes: 1147 ISI
- Editors
- June 1993
-
-
- FYI on a Network Management Tool Catalog:
- Tools for Monitoring and Debugging TCP/IP Internets
- and Interconnected Devices
-
- Status of this Memo
-
- This memo provides information for the Internet community. It does
- not specify an Internet standard. Distribution of this memo is
- unlimited.
-
- Abstract
-
- The goal of this FYI memo is to provide an update to FYI 2, RFC 1147
- [1], which provided practical information to site administrators and
- network managers. New and/or updated tools are listed in this RFC.
- Additonal descriptions are welcome, and should be sent to: noctools-
- entries@merit.edu.
-
- Introduction
-
- A static document cannot incorporate references to the latest tools
- nor recent revisions to the older catalog entries. To provide a more
- timely and responsive information source, the NOCtools catalog is
- available on-line via the Internet and Usenet.
-
- news comp.networks.noctools
- ftp wuarchive.wustl.edu:/doc/noctools
-
- Because of publication delays and other factors, some of the entries
- in this catalog may be out of date. The reader is urged to consult
- the on-line service to obtain the most up-to-date information.
-
- The index provided in this document reflects the current contents of
- the on-line documentation.
-
- The NOCtools2 Working Group of the Internet Engineering Task Force
- (IETF) has compiled this revised catalog. Future revisions will be
- incorporated into the on-line NOCtools catalog. The reader is
- encouraged to submit new or revised entries for (near-immediate)
- electronic publication.
-
-
-
- NOCTools2 Working Group [Page 1]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- The tools described in this catalog are in no way endorsed by the
- IETF. For the most part, we have neither evaluated the tools in this
- catalog, nor validated their descriptions. Most of the descriptions
- of commercial tools have been provided by vendors. Caveat Emptor.
-
- Acknowledgements
-
- This catalog is the result of work on the part of the NOCTools2
- Working Group of the User Services Area of the IETF. The following
- individuals made especially notable contributions: Chris Myers,
- Darren Kinley, Gary Malkin, Mohamed Ellozy, and Mike Patton.
-
- Current Postings
-
- The current contents of the NOCtools catalog may be retrieved via
- anonymous FTP from wuarchive.wustl.edu. The entries are stored as
- individual files in the directory /doc/noctools.
-
- "No-Writeups" Appendix
-
- This section contains references to tools which are known to exist,
- but which have not been fully cataloged. If anyone wishes to author
- an entry for one of these tools please contact us at:
-
- noctools-request@merit.edu
-
- Keep in mind that if these or other tools are included in the future,
- they will be available in the on-line version of the catalog.
-
- Each mention is separated by a <form-feed> for improved readability.
- If you intend to actually print-out this section of the catalog, then
- you should probably strip-out the <ff>.
-
- How to Submit/Update an Entry
-
- 1) review the template included below to determine what
- information you will need to collect,
- 2) review the keywords to see what your indexing options are,
- 3) assemble (update) catalog entry to include results of
- 1) and 2).
- 4) Submit your entry using either of the following two methods:
-
- a) Post your submission to: comp.internet.noctools.submissions
- b) Email your submission to: noctools-entries@merit.edu
-
- New entries will be circulated automatically upon reception. As time
- permits, the NOCtools editors will review recent submissions and
- incorporate them into the master indexes. Enquiries regarding the
-
-
-
- NOCTools2 Working Group [Page 2]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- status of a submission should be E-Mailed to:
-
- noctools-request@merit.edu
-
- Those submitting an entry to the catalog should insure that any E-
- mail addresses provided are correct and functional. Either the
- catalog editors or prospective users of your tool may wish to reach
- you.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 3]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- TEMPLATE
-
- NAME
- <tool-name>
-
-
- KEYWORDS
- [<keyword-A1>[,<keyword-A2>[,...,<keyword-An>]]];
- [<keyword-B1>[,<keyword-B2>[,...,<keyword-Bn>]]];
- [<keyword-C1>[,<keyword-C2>[,...,<keyword-Cn>]]];
- [<keyword-D1>[,<keyword-D2>[,...,<keyword-Dn>]]];
- [<keyword-E1>[,<keyword-E2>[,...,<keyword-En>]]].
-
-
- ABSTRACT
- <summary of the tool>
- <summary of the tool>
- <summary of the tool>
-
-
- MECHANISM
- <high level technical details of how it works>
- <high level technical details of how it works>
- <high level technical details of how it works>
-
-
- CAVEATS
- <any warnings or cautions>
- <any warnings or cautions>
- <any warnings or cautions>
-
-
- BUGS
- <any warnings or cautions>
- <any warnings or cautions>
- <any warnings or cautions>
-
-
- LIMITATIONS
- <any warnings or cautions>
- <any warnings or cautions>
- <any warnings or cautions>
-
-
- HARDWARE REQUIRED
- <list any hardware requirements>
- <list any hardware requirements>
- <list any hardware requirements>
-
-
-
- NOCTools2 Working Group [Page 4]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- <list any software requirements>
- <list any software requirements>
- <list any software requirements>
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- <How to acquire the tool.>
- <Location/Contact Info to access/obtain tool>
-
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- <Contact info for person responsible for catalog entry>
-
-
- DATE OF MOST RECENT UPDATE TO THIS CATALOG ENTRY
- <YYMMDD>
-
- Keywords
-
- This catalog uses "keywords" for terse characterizations of the
- tools. Keywords are abbreviated attributes of a tool or its use. To
- allow cross-comparison of tools, uniform keyword definitions have
- been developed, and are given below. Following the definitions,
- there is an index of catalog entries by keyword.
-
- Keyword Definitions
-
- The keywords are always listed in a prefined order, sorted first by
- the general category into which they fall, and then alphabetically.
- The categories that have been defined for management tool keywords
- are:
-
- o the general management area to which a tool
- relates or a tool's functional role;
-
- o the network resources or components that are
- managed;
-
- o the mechanisms or methods a tool uses to
- perform its functions;
-
- o the operating system and hardware environment
- of a tool; and
-
- o the characteristics of a tool as a hardware
- product or software release.
-
-
-
-
- NOCTools2 Working Group [Page 5]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- The keywords used to describe the general management area or
- functional role of a tool are:
-
- Alarm
- a reporting/logging tool that can trigger on specific
- events within a network.
-
- Analyzer
- a traffic monitor that reconstructs and interprets pro-
- tocol messages that span several packets.
-
- Benchmark
- a tool used to evaluate the performance of network com-
- ponents.
-
- Control
- a tool that can change the state or status of a remote
- network resource.
-
- Debugger
- a tool that by generating arbitrary packets and moni-
- toring traffic, can drive a remote network component to
- various states and record its responses.
-
- Generator
- a traffic generation tool.
-
- Manager
- a distributed network management system or system com-
- ponent.
-
- Map
- a tool that can discover and report a system's topology
- or configuration.
-
- Reference
- a tool for documenting MIB structure or system confi-
- guration.
-
- Routing
- a packet route discovery tool.
-
- Security
- a tool for analyzing or reducing threats to security.
-
- Status
- a tool that remotely tracks the status of network com-
- ponents.
-
-
-
- NOCTools2 Working Group [Page 6]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Traffic
- a tool that monitors packet flow.
-
- The keywords used to identify the network resources or components
- that a tool manages are:
-
- Bridge
- a tool for controlling or monitoring LAN bridges.
-
- CHAOS
- a tool for controlling or monitoring implementations of
- the CHAOS protocol suite or network components that use
- it.
-
- DECnet
- a tool for controlling or monitoring implementations of
- the DECnet protocol suite or network components that
- use it.
-
- DNS
- a Domain Name System debugging tool.
-
- Ethernet
- a tool for controlling or monitoring network components
- on ethernet LANs.
-
- FDDI
- a tool for controlling or monitoring network components
- on FDDI LANs or WANs.
-
- IP
- a tool for controlling or monitoring implementations of
- the TCP/IP protocol suite or network components that
- use it.
-
- OSI
- a tool for controlling or monitoring implementations of
- the OSI protocol suite or network components that use
- it.
-
- NFS
- a Network File System debugging tool.
-
- Ring
- a tool for controlling or monitoring network components
- on Token Ring LANs.
-
-
-
-
-
- NOCTools2 Working Group [Page 7]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SMTP
- an SMTP debugging tool.
-
- Star
- a tool for controlling or monitoring network components
- on StarLANs.
-
- The keywords used to describe a tool's mechanism are:
-
- CMIS
- a network management system or component based on
- CMIS/CMIP, the Common Management Information System and
- Protocol.
-
- Curses
- a tool that uses the "curses" tty interface package.
-
- Eavesdrop
- a tool that silently monitors communications media
- (e.g., by putting an ethernet interface into "promiscu-
- ous" mode).
-
- NMS
- the tool is a component of or queries a Network Manage-
- ment System.
-
- Ping
- a tool that sends packet probes such as ICMP echo mes-
- sages; to help distinguish tools, we do not consider
- NMS queries or protocol spoofing (see below) as probes.
-
- Proprietary
- a distributed tool that uses proprietary communications
- techniques to link its components.
-
- RMON
- a tool which employs the RMON extensions to SNMP.
-
- SNMP
- a network management system or component based on SNMP,
- the Simple Network Management Protocol.
-
- Spoof
- a tool that tests operation of remote protocol modules
- by peer-level message exchange.
-
- X
- a tool that uses X-Windows.
-
-
-
- NOCTools2 Working Group [Page 8]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- The keywords used to describe a tool's operating environment are:
-
- DOS
- a tool that runs under MS-DOS.
-
- HP
- a tool that runs on Hewlett-Packard systems.
-
- Macintosh
- a tool that runs on Macintosh personal computers.
-
- OS/2
- a tool that runs under the OS/2 operating system.
-
- Standalone
- an integrated hardware/software tool that requires only
- a network interface for operation.
- Sun
- a tool that runs on Sun Microsystems platforms.
- (binary distribution built for use on a Sun.)
-
- UNIX
- a tool that runs under 4.xBSD UNIX or related OS.
-
- VMS
- a tool that runs under DEC's VMS operating system.
-
- The keywords used to describe a tool's characteristics as a hardware
- or software acquisition are:
-
- Free
- a tool is available at no charge, though other restric-
- tions may apply (tools that are part of an OS distribu-
- tion but not otherwise available are not listed as
- "free").
-
- Library
- a tool packaged with either an Application Programming
- Interface (API) or object-level subroutines that may be
- loaded with programs.
-
- Sourcelib
- a collection of source code (subroutines) upon which
- developers may construct other tools.
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 9]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Tools Indexed by Keywords
-
- Following is an index of the most up-to-date catalog entries sorted
- by keyword, which is available via:
-
- news comp.networks.noctools.tools
- ftp wuarchive.wustl.edu:/doc/noctool
-
- This index can be used to locate the tools with a particular
- attribute: tools are listed under each keyword that characterizes
- them. The keywords and the subordinate lists of tools under them are
- in alphabetical order.
-
- Alarm
- -----
- CMIP Library
- Dual Manager
- Eagle
- EMANATE
- EtherMeter
- LanProbe
- LANWatch
- MONET
- NetMetrix Load Monitor
- NetMetrix Protocol Analyzer
- NETMON for Windows
- NETscout
- NOCOL
- SNMP Libraries and Utilities from Empire Technologies
- SNMP Libraries and Utilities from SNMP Research
- snmpd from Empire Technologies
- SpiderMonitor
- XNETMON from SNMP Research
- xnetmon from Wellfleet
-
- Analyzer
- --------
- LANVista
- LANWatch
- NetMetrix Protocol Analyzer
- NETscout
- PacketView
- Sniffer
- SpiderMonitor
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 10]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Benchmark
- ---------
- hammer & anvil
- iozone
- LADDIS
- LANVista
- nhfsstone
- SPIMS
- spray
- ttcp
- XNETMON from SNMP Research
-
- CMIS
- ----
- CMIP library
- Generic Managed System
- MIB Browser
-
- Control
- -------
- CMIP Library
- Dual Manager
- Eagle
- MIB Manager from Empire Technologies
- MONET
- NETMON for Windows
- proxyd
- SNMP Libraries and Utilities from Empire Technologies
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System
- snmpd from Empire Technologies
- TokenVIEW
- XNETMON from SNMP Research
-
- Debugger
- --------
- Ethernet Box II
- LANVista
- NetMetrix Traffic Generator
- ping from UCB
- SPIMS
- XNETMON from SNMP Research
-
- Generator
- ---------
- hammer & anvil
- LADDIS
- LANVista
-
-
-
- NOCTools2 Working Group [Page 11]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- NetMetrix Traffic Generator
- nhfsstone
- ping
- ping from UCB
- Sniffer
- SpiderMonitor
- spray
- TTCP
-
- Manager
- -------
- Beholder
- CMIP Library
- CMU SNMP Distribution
- decaddrs by Wellfleet
- Dual Manager
- EMANATE
- Ethernet Box II
- getone by Wellfleet
- Interactive Network Map
- LanProbe
- LANVista
- MIB Manager from Empire Technologies
- MONET
- NetLabs CMOT Agent
- NetLabs SNMP Agent
- NETMON for Windows
- NETscout
- NNStat
- NOCOL
- OverVIEW
- SAS/CPE for Open Systems Software
- SNMP Development Kit
- SNMP Libraries and Utilities from Empire Technologies
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System
- snmpd from Empire Technologies
- tokenview
- Tricklet
- Wollongong-Manager
- XNETMON from SNMP Research
- XNETMON from Wellfleet
- xnetperfmon
-
- Map
- ---
- decaddrs by Wellfleet
- Dual Manager
-
-
-
- NOCTools2 Working Group [Page 12]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- etherhostprobe
- EtherMeter
- Interactive Network Map
- LanProbe
- NETMON for Windows
- Network Integrator I
- NPRV
- SNMP Libraries and Utilities from SNMP Research
- XNETMON by SNMP Research
- XNETMON by Wellfleet
-
- Reference
- ---------
- EMANATE
- ethernet-codes
- HyperMIB
- MIB Manager from Empire Technologies
- XNETMON
-
- Routing
- -------
- arp
- decaddrs by Wellfleet
- etherhostprobe
- getone by Wellfleet
- hopcheck
- MONET
- net_monitor
- NETMON for Windows
- netstat
- NPRV
- ping from UCB
- query
- traceroute
-
- Security
- --------
- Computer Security Checklist
- Dual Manager
- Eagle
- EMANATE
- LAN Patrol
- SNMP Libraries and Utilities from SNMP Research
- XNETMON by SNMP Research
- xnetperfmon
-
-
-
-
-
-
- NOCTools2 Working Group [Page 13]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Status
- ------
- Beholder
- CMIP Library
- CMU SNMP
- DiG
- dnsstats
- doc
- Dual Manager
- EMANATE
- fping
- getone by Wellfleet
- host
- Internet Rover
- lamers
- LanProbe
- mconnect
- MONET
- net_monitor
- Netlabs CMOT Agent
- Netlabs SNMP Agent
- NETscout
- NNStat
- NOCOL
- NPRV
- OverVIEW
- ping
- ping from UCB
- proxyd from SNMP Research
- SAS/CPE
- SNMP Development Kit
- SNMP Libraries and Utilities from Empire Technologies
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System
- PSI SNMP
- snmpd from Empire Technologies
- snmpd from SNMP Research
- TokenVIEW
- Tricklet
- vrfy
- XNETMON by SNMP Research
- xnetmon by Wellfleet
- xnetperfmon
- xup
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 14]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Traffic
- -------
- etherfind
- EtherMeter
- Ethernet Box II
- EtherView
- getethers
- LAN Patrol
- LanProbe
- LANVista
- LANWatch
- ENTM
- MONET
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- NETMON by Mitre
- NETscout
- netwatch
- Network Integrator I
- nfswatch
- nhfsstone
- NNStat
- ositrace
- PacketView
- Sniffer
- SpiderMonitor
- spray
- tcpdump
- tcplogger
- trpt
- ttcp
- XNETMON by SNMP Research
-
- Bridge
- ------
- decaddrs by Wellfleet
- EMANATE
- MIB Manager from Empire Technologies
- MONET
- proxyd by SNMP Research
- SAS/CPE
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System
- snmpd from SNMP Research
- XNETMON from SNMP Research
-
-
-
-
- NOCTools2 Working Group [Page 15]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CHAOS
- -----
- Interactive Network Map
- LANWatch
-
- DECnet
- ------
- decaddrs by Wellfleet
- LANVista
- LANWatch
- MONET
- net_monitor
- NetMetrix Protocol Analyzer
- NETMON for Windows
- NETscout
- Sniffer
- SNMP Libraries and Utilities from SNMP Research
- SpiderMonitor
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
-
- DNS
- ---
- DiG
- dnsstats
- doc
- lamers
- LANWatch
- NetMetrix Protocol Analyzer
- NOCOL
-
- Ethernet
- --------
- arp
- Beholder
- Eagle
- EMANATE
- etherfind
- etherhostprobe
- EtherMeter
- Ethernet Box II
- ethernet-codes
- EtherView
- getethers
- LAN Patrol
- LanProbe
- LANVista
- LANWatch
-
-
-
- NOCTools2 Working Group [Page 16]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- ENTM
- Interactive Network Map
- MONET
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- NETMON for Windows
- NETscout
- netwatch
- Network Integrator I
- nfswatch
- NNStat
- PacketView
- proxyd from SNMP Research
- SAS/CPE
- Sniffer
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
- SpiderMonitor
- tcpdump
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
-
- FDDI
- ----
- EMANATE
- ethernet-codes
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- nfswatch
- SAS/CPE
- SNMP Libraries and utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
- XNETMON from SNMP Research
-
- IP
- --
- arp
- CMU SNMP
- Dual Manager
- Eagle
- EMANATE
- etherfind
-
-
-
- NOCTools2 Working Group [Page 17]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- etherhostprobe
- EtherView
- fping
- getone from Wellfleet
- hammer & anvil
- hopcheck
- Internet Rover
- LanProbe
- LANVista
- LANWatch
- ENTM
- Interactive Network Map
- MIB Manager from Empire Technologies
- MONET
- net_monitor
- Netlabs CMOT Agent
- Netlabs SNMP Agent
- NetMetrix Load Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- NETMON by Mitre
- NETMON for Windows
- NETscout
- netstat
- netwatch
- nfswatch
- nhfsstone
- NNStat
- NOCOL
- NPRV
- OverVIEW
- PacketView
- ping
- ping from UCB
- proxyd from SNMP Research
- query
- SAS/CPE
- SNMP Development Kit
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- PSI SNMP
- snmpd from Empire Technologies
- snmpd from SNMP Research
- PSI SNMP
- SpiderMonitor
- SPIMS
- spray
- tcpdump
-
-
-
- NOCTools2 Working Group [Page 18]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- tcplogger
- traceroute
- trpt
- ttcp
- XNETMON from SNMP Research
- xnetmon from Wellfleet
- xnetperfmon from SNMP Research
-
- OSI
- ---
- CMIP Library
- Dual Manager
- EMANATE
- LANVista
- LANWatch
- Netlabs CMOT Agent
- NetMetrix Protocol Analyzer
- NETMON for Windows
- NETscout
- NOCOL
- ositrace
- proxyd from SNMP Research
- SAS/CPE
- Sniffer
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
- SpiderMonitor
- SPIMS
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
-
- NFS
- ---
- etherfind
- EtherView
- iozone
- LADDIS
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NETscout
- nfswatch
- nhfsstone
- Sniffer
- tcpdump
-
-
-
-
-
-
- NOCTools2 Working Group [Page 19]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Ring
- ----
- Eagle
- EMANATE
- Interactive Network Map
- LANVista
- LANWatch
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- NETMON by Mitre
- NETMON for Windows
- NETscout
- netwatch
- PacketView
- proxyd from SNMP Research
- Sniffer
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
- TokenVIEW
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
-
- SMTP
- ----
- host
- Internet Rover
- LANWatch
- mconnect
- NetMetrix Protocol Analyzer
- Sniffer
- vrfy
-
- Star
- ----
- EMANATE
- Interactive Network Map
- LAN Patrol
- LANWatch
- NETMON for Windows
- NETscout
- proxyd from SNMP Research
- Sniffer
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
-
-
-
- NOCTools2 Working Group [Page 20]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
-
- Curses
- ------
- Eagle
- Internet Rover
- net_monitor
- nfswatch
- NOCOL
- PSI SNMP
-
- Eavesdrop
- ---------
- etherfind
- Ethernet Box II
- EtherView
- LAN Patrol
- LANVista
- LANWatch
- ENTM
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetNetrix Traffic Generator
- NETMON from Mitre
- NETscout
- netwatch
- nfswatch
- NNStat
- OSITRACE
- PacketView
- Sniffer
- SpiderMonitor
- tcplogger
- trpt
-
- NMS
- ---
- CMU SNMP
- decaddrs from Wellfleet
- Dual Manager
- EMANATE
- EtherMeter
- Ethernet Box II
- getone from Wellfleet
- Interactive Network Map
- MONET
-
-
-
- NOCTools2 Working Group [Page 21]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Netlabs CMOT Agent
- Netlabs SNMP Agent
- NETMON for Windows
- NETscout
- NNStat
- NOCOL
- OverVIEW
- proxyd from SNMP Research
- SNMP Development Kit
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- PSI SNMP
- snmpd from Empire Technologies
- snmpd from SNMP Research
- TokenVIEW
- XNETMON from SNMP Research
- xnetmon from Wellfleet
- xnetperfmon from SNMP Research
-
- Ping
- ----
- etherhostprobe
- fping
- getethers
- hopcheck
- Interactive Network Map
- Internet Rover
- LANWatch
- net_monitor
- NOCOL
- NPRV
- ping
- ping from UCB
- spray
- traceroute
- ttcp
- XNETMON from SNMP Research
- xup
-
- Proprietary
- -----------
- Eagle
- EtherMeter
- Ethernet Box II
- LanProbe
- LANVista
- TokenVIEW
-
-
-
-
- NOCTools2 Working Group [Page 22]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- RMON
- ----
- Beholder
-
- SNMP
- ----
- Beholder
- CMU SNMP
- decaddrs from Wellfleet
- Dual Manager
- EMANATE
- getone from Wellfleet
- Interactive Network Map
- MIB Manager from Empire Technologies
- MONET
- Netlabs SNMP Agent
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- NETMON for Windows
- NETscout
- NOCOL
- OverVIEW
- proxyd from SNMP Research
- SNMP Development Kit
- SNMP Libraries and utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- PSI SNMP
- snmpd from Empire Technologies
- snmpd from SNMP Research
- Wollongong-Manager
- XNETMON from SNMP Research
- xnetmon from Wellfleet
- xnetperfmon from SNMP Research
-
- Spoof
- -----
- DiG
- doc
- Internet Rover
- host
- LADDIS
- mconnect
- nhfsstone
- NOCOL
- query
- SPIMS
-
-
-
- NOCTools2 Working Group [Page 23]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- vrfy
-
- X
- -
- Dual Manager
- Interactive Network Map
- MIB Manager from Empire Technologies
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- SAS/CPE
- PSI SNMP
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
- xup
-
- DEC
- ---
- Wollongong-Manager
-
- DOS
- ---
- Computer Security Checklist
- Ethernet Box II
- hammer & anvil
- hopcheck
- iozone
- LAN Patrol
- LANVista
- netmon
- NETMON for Windows
- netwatch
- OverVIEW
- PacketView
- ping
- SAS/CPE
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
- TokenVIEW
- Wollongong-Manager
- xnetperfmon from SNMP Research
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 24]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HP
- --
- iozone
- SAS/CPE
- xup
-
- Macintosh
- ---------
- HyperMIB
-
- OS/2
- ----
- Beholder
- Tricklet
-
- Standalone
- ----------
- LANVista
- Sniffer
- SNMP Packaged Agent System from SNMP Research
- SpiderMonitor
-
- Sun
- ---
- Avatar SunSNMPD
- Wollongong Manager
-
- UNIX
- ----
- arp
- CMIP Library
- CMU SNMP
- decaddrs from Wellfleet
- DiG
- doc
- dnsstats
- Eagle
- etherfind
- etherhostprobe
- EtherView
- fping
- getethers
- getone from Wellfleet
- host
- Interactive Network Map
- Internet Rover
- iozone
- LADDIS
-
-
-
- NOCTools2 Working Group [Page 25]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- lamers
- mconnect
- MIB Manager from Empire Technologies
- MONET
- net_monitor
- Dual Manager
- NetMetrix Load Monitor
- NetMetrix NFS Monitor
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- NETMON from Mitre
- NETscout
- netstat
- Network Integrator I
- nfswatch
- nhfsstone
- NNStat
- NOCOL
- OSITRACE
- ping
- ping from UCB
- proxyd from SNMP Research
- query
- SAS/CPE
- SNMP Development Kit
- SNMP Libraries and Utilities from Empire Technologies
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- PSI SNMP
- snmpd from Empire Technologies
- snmpd from SNMP Research
- SPIMS
- spray
- tcpdump
- tcplogger
- traceroute
- Tricklet
- trpt
- ttcp
- vrfy
- XNETMON from SNMP Research
- xnetmon from Wellfleet
- xnetperfmon from SNMP Research
-
- VMS
- ---
- arp
- ENTM
-
-
-
- NOCTools2 Working Group [Page 26]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- fping
- net_monitor
- netstat
- NPRV
- ping
- SNMP Libraries and Utilities from SNMP Research
- tcpdump
- traceroute
- ttcp
- xnetperfmon from SNMP Research
-
- Free
- ----
- arp
- Beholder
- CMIP Library
- CMU SNMP Distribution
- DiG
- dnsstats
- doc
- ENTM
- fping
- getethers
- hammer & anvil
- hopcheck
- host
- Interactive Network Map
- Internet Rover
- iozone
- lamers
- net_monitor
- netmon from Mitre
- netstat
- netwatch
- nfswatch
- nhfsstone
- NNStat
- NOCOL
- NPRV
- OSITRACE
- PING
- ping from UCB
- query
- SNMP Development Kit
- tcpdump
- tcplogger
- traceroute
- Tricklet
-
-
-
- NOCTools2 Working Group [Page 27]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- trpt
- ttcp
- vrfy
-
- Library
- -------
- CMIP Library
- CMU SNMP
- Dual Manager
- NetMetrix Protocol Analyzer
- NetMetrix Traffic Generator
- proxyd from SNMP Research
- SAS/CPE
-
- Sourcelib
- ---------
- Beholder
- CMIP Library
- CMU SNMP
- EMANATE
- HyperMIB
- Interactive Network Map
- Internet Rover
- LANWatch
- MIB Manager from Empire Technologies
- net_monitor
- NETMON for Windows
- NOCOL
- proxyd from SNMP Research
- SNMP Development Kit
- SNMP Libraries and Utilities from Empire Technologies
- SNMP Libraries and Utilities from SNMP Research
- SNMP Packaged Agent System from SNMP Research
- snmpd from SNMP Research
- SpiderMonitor
- Tricklet
- XNETMON from SNMP Research
- xnetperfmon from SNMP Research
-
- Tool Descriptions
-
- This section is an updated collection of brief descriptions of tools
- for managing TCP/IP internets. These entries are in alphabetical
- order, by tool name.
-
- The entries all follow a standard format. Immediately after the NAME
- of a tool are its associated KEYWORDS. Keywords are terse
- descriptions of the purposes or attributes of a tool. A more
-
-
-
- NOCTools2 Working Group [Page 28]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- detailed description of a tool's purpose and characteristics is given
- in the ABSTRACT section. The MECHANISM section describes how a tool
- works. In CAVEATS, warnings about tool use are given. In BUGS,
- known bugs or bug-report procedures are given. LIMITATIONS describes
- the boundaries of a tool's capabilities. HARDWARE REQUIRED and
- SOFTWARE REQUIRED relate the operational environment a tool needs.
- Finally, in AVAILABILITY, pointers to vendors, online repositories,
- or other sources for a tool are given.
-
- Where tool names conflict, the vendor name is used as well. For
- example, MITRE, and SNMP Research each submitted an updated
- description of a tool called, "NETMON". These tools were
- independently developed, are functionally different, and run in
- different environments. MITRE's tool is listed as "NETMON_MITRE,"
- and the tool from SNMP Research as "NETMON_WINDOWS_SNMP_RESEARCH".
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 29]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog ARP
-
- NAME
- arp
-
- KEYWORDS
- routing; ethernet, IP;; UNIX, VMS; free.
-
- ABSTRACT
- Arp displays and can modify the internet-to-ethernet
- address translations tables used by ARP, the address
- resolution protocol.
-
- MECHANISM
- The arp program accesses operating system memory to
- read the ARP data structures.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Only the super user can modify ARP entries.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS, or VMS.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
-
- Available via anonymous FTP from uunet.uu.net, in
- directory bsd-sources/src/etc. Available with 4.xBSD
- UNIX and related operating systems. For VMS, available
- as part of TGV MultiNet IP software package, as well as
- Wollongong's WIN/TCP and Process Software Corporation's
- TCPware for VMS.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- This entry maintained by the NOCtools editors.
- Send email to noctools-request@merit.edu.
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 30]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog AVATAR-SNMP-TOOLKIT
-
- NAME
- SNMP Application Development Toolkit
-
- KEYWORDS
- manager;;SNMP;;sourcelib.
-
- ABSTRACT
- snmpapi is an api toolkit for developing SNMP
- applications and agents. The toolkit is simple and
- very fast that can be used for any type of
- application. It is very well suited for embedded
- systems such as bridges or routers. An example MIB II
- agent for Sun Sparcstations is provided. snmpapi is
- distributed in source form only.
-
- MECHANISM
- snmpapi is a library of C functions.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None.
-
- HARDWARE REQUIRED
- No restrictions.
-
- AVAILABILITY
- Available now. For more information, send e-mail to
- info@avatar.com.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 31]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog AVATAR-SUNSNMPD
-
- NAME
- sunsnmpd
-
- KEYWORDS
- manager;;snmp;sun;.
-
- ABSTRACT
- sunsnmpd is a fully supported SNMP agent with MIB II
- support for Sun Sparscations running SunOS 4.1 or
- higher. sunsnmpd supports both SNMP GET and SET
- operations.
-
- MECHANISM
- sundnmpd is a daemon process which starts up at boot
- time from the rc.local file. It uses /dev/kmem to access
- kernel structures.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Must be started by a super user.
-
- HARDWARE REQUIRED
- Sun Sparcstations.
-
- AVAILABILITY
- Available now. Site licensing only. For more information,
- send e-mail to info@avatar.com.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 32]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog ChameLAN-100
-
- NAME
- ChameLAN 100
-
- KEYWORDS
- analyzer, benchmark, debugger, generator, map,
- reference, status, traffic; bridge, DECnet, ethernet,
- FDDI, IP, OSI, NFS, ring; eavesdrop, SNMP, X;
- standalone, UNIX.
-
- ABSTRACT
-
- Tekelec's ChameLAN 100 is a portable diagnostic system
- for monitoring and simulation of FDDI, Ethernet and
- Token Ring networks -- simultaneously. Protocol
- analysis of multiple topologies, as well as mixed
- topoloies simultaneously, is a key feature of
- the product family. Tekelec's proprietary FDDI
- hardware guarantees complete real-time analysis of
- networks and network components at the full ring
- bandwidth of 125 Mbps. It passively connects to the
- network and captures 100 percent of the data, measures
- performance and isolates real-time problems.
-
- The simulation option offers full bandwidth load
- generation that allows you to create and simulate any
- network condition. It gives you the ability to inject
- errors and misformed frames. A set of
- confidence tests allow simple evaluation of new
- equipment. A ring map feature displays network
- topology and status of all nodes via the SMT
- process.
-
- Monitoring of FDDI, Ethernet and Token Ring allows the
- user to: view network status in real time; view
- network, node, or node pair statistics; capture
- frames; control capture using trigger and filter
- capabilities; view real-time statistics; view captured
- frames in decoded format; and view the last frame
- transmitted by each station.
-
- The following Real-Time Network Statistics of FDDI,
- Ethernet and Token Ring networks is displayed: frame
- rate, runts, byte rate, jabbers, CRC/align errors, and
- collisions.
-
- Product developers can use the ChameLAN 100 to observe
-
-
-
- NOCTools2 Working Group [Page 33]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- and control various events to help debug their FDDI,
- Ethernet and Token Ring products. End users can
- perform real-time monitoring to test and
- diagnose problems that may occur when developing,
- installing or managing FDDI, Ethernet and Token Ring
- networks and network products. End users can use the
- ChameLAN 100 to aid in the installation and
- maintenance of Ethernet and Token Ring networks. To
- isolate specific network trouble spots the ChameLAN
- 100 uses filtering and triggering techniques for data
- capture. Higher level protocol decode includes
- TCP/IP, OSI and DECnet protocol suites. Protocol
- decode of IPX, SNMP, XTP, and AppleTalk are also
- supported. Development of additional protocol decodes
- is also under development. The ChameLAN 100 family
- also offers a Protocol Management Development System
- (PMDS) that enables users to develop custom protocol
- decode suites.
-
- The FDDI, Ethernet and Token Ring hardware interfaces
- feature independent processing power. Real-time data
- is monitored unobtrusively at full bandwidth without
- affecting network activity. Real-time data may also
- be saved to a 120MB or optional 200MB hard disk drive
- for later analysis. FDDI data is captured at 125 megabits
- per second (Mbps), Ethernet at 10 Mbps and Token Ring
- at 4 or 16 Mbps.
-
- MECHANISM
- This portable, standalone unit incorporates the power
- of UNIX, X-Windows and Motif. Its UNIX-based
- programming interface facilitates development of
- customized monitoring and simulation applications. The
- ChameLAN 100 may connect to the network at any
- location using standard equipment. Standard graphical
- Motif/X-Windows and TCP/IP allow remote control
- through Ethernet and 10Base T interfaces. Tekelec
- also offers a rackmounted model -- ChameLAN 100-X.
- Both models can be controlled via a Sun Workstation
- remotely.
-
- CAVEATS
- none.
-
- BUGS
- none known.
-
-
-
-
-
- NOCTools2 Working Group [Page 34]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- none reported.
-
- HARDWARE REQUIRED
- None. The ChameLAN 100 is a self-contained unit, and
- includes its own interface cards. It installs
- into a network with standard interface
- connectors.
-
- SOFTWARE REQUIRED
- None.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- The ChameLAN 100 product famil y is available
- commercially. For more information or a free demo,
- call or write:
-
- 1.800.tek.elec
- Tekelec
- 26580 West Agoura Road
- Calabasas, CA 91302
- Phone: 818.880.5656
- Fax: 818.880.6993
-
- The ChameLAN 100 is listed on the GSA schedule.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Todd Koch
- Public Relations Specialist
- 818.880.7718
- Internet: todd.koch@tekelec.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 35]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog CMU_SNMP
-
- NAME
- The CMU SNMP Distribution
-
- KEYWORDS
- manager, status; IP; NMS, SNMP; UNIX; free, sourcelib.
-
- ABSTRACT
- The CMU SNMP Distribution includes source code for an
- SNMP agent, several SNMP client applications, an ASN.1
- library, and supporting documentation.
-
- The agent compiles into about 10 KB of 68000 code. The
- distribution includes a full agent that runs on a
- Kinetics FastPath2/3/4, and is built into the KIP
- appletalk/ethernet gateway. The machine independent
- portions of this agent also run on CMU's IBM PC/AT
- based router.
-
- The applications are designed to be useful in the real
- world. Information is collected and presented in a
- useful format and is suitable for everyday status
- monitoring. Input and output are interpreted
- symbolically. The tools can be used without
- referencing the RFCs.
-
- MECHANISM
- SNMP.
-
- CAVEATS
- None.
-
- BUGS
- None reported. Send bug reports to
- sw0l+snmp@andrew.cmu.edu. ("sw0l" is "ess double-you
- zero ell.")
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- The KIP gateway agent runs on a Kinetics FastPath2/3/4.
- Otherwise, no restrictions.
-
- SOFTWARE REQUIRED
- The code was written with efficiency and portability in
- mind. The applications compile and run on the follow-
-
-
-
- NOCTools2 Working Group [Page 36]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- ing systems: IBM PC/RT running ACIS Release 3, Sun3/50
- running SUNOS 3.5, and the DEC microVax running Ultrix
- 2.2. They are expected to run on any system with a
- Berkeley socket interface.
-
- AVAILABILITY
- This distribution is copyrighted by CMU, but may be
- used and sold without permission. Consult the copy-
- right notices for further information. The distribu-
- tion is available by anonymous FTP from the host
- lancaster.andrew.cmu.edu (128.2.13.21) as the files
- pub/cmu-snmp.9.tar, and pub/kip-snmp.9.tar. The former
- includes the libraries and the applications, and the
- latter is the KIP SNMP agent.
-
- Please direct questions, comments, and bug reports to
- sw0l+snmp@andrew.cmu.edu. ("sw0l" is "ess double-you
- zero ell.") If you pick up this package, please send a
- note to the above address, so that you may be notified
- of future enhancements/changes and additions to the set
- of applications (several are planned).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 37]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog COMPUTER-SECURITY-CHECKLIST
-
- NAME
- Computer Security Checklist
-
- KEYWORDS
- security; DOS.
-
- ABSTRACT
- This program consists of 858 computer security ques-
- tions divided up in thirteen sections. The program
- presents the questions to the user and records their
- responses. After answering the questions in one of the
- thirteen sections, the user can generate a report from
- the questions and the user's answers. The thirteen
- sections are: telecommunications security, physical
- access security, personnel security, systems develop-
- ment security, security awareness and training prac-
- tices, organizational and management security, data and
- program security, processing and operations security,
- ergonomics and error prevention, environmental secu-
- rity, and backup and recovery security.
-
- The questions are weighted as to their importance, and
- the report generator can sort the questions by weight.
- This way the most important issues can be tackled
- first.
-
- MECHANISM
- The questions are displayed on the screen and the user
- is prompted for a single keystroke reply. When the end
- of one of the thirteen sections is reached, the answers
- are written to a disk file. The question file and the
- answer file are merged to create the report file.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
-
-
-
-
- NOCTools2 Working Group [Page 38]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- DOS operating system.
-
- AVAILABILITY
- A commercial product available from:
- C.D., Ltd.
- P.O. Box 58363
- Seattle, WA 98138
- (206) 243-8700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 39]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog CMIP-LIBRARY
-
- NAME
- CMIP Library
-
- KEYWORDS
- manager; osi; cmis; unix; free, sourcelib.
-
- ABSTRACT
-
- The CMIP Library implements the functionality of the
- Common Management Information Service/Protocol as in
- the full international standards (ISO 9595, ISO 9596)
- published in 1990. It is designed to work with the
- ISODE package and can act as a building block for the
- construction of CMIP-based agent and manager
- applications.
-
- MECHANISM
- The CMIP library uses ISO ROS, ACSE and ASN.1
- presentation, as implemented in ISODE, to provide its
- service.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None known.
-
- HARDWARE REQUIRED
- Has been tested on SUN 3 and SUN 4 architectures.
-
- SOFTWARE REQUIRED
- The ISODE protocol suite, BSD UNIX.
-
- AVAILABILITY
- The CMIP library and related management tools built
- upon it, known as OSIMIS (OSI Management Information
- Service), are publicly available from University
- College London, England via FTP and FTAM. To obtain
- information regarding a copy send email to
- osimis-request@cs.ucl.ac.uk or call +44 71 380 7366.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 40]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog DECADDRS
-
- NAME
- decaddrs, decaroute, decnroute, xnsroutes, bridgetab
-
- KEYWORDS
- manager, map, routing; bridge, DECnet; NMS, SNMP; UNIX.
-
- ABSTRACT
- These commands display private MIB information from
- Wellfleet systems. They retrieve and format for
- display values of one or several MIB variables from the
- Wellfleet Communications private enterprise MIB, using
- the SNMP (RFC1098). In particular these tools are used
- to examine the non-IP modules (DECnet, XNS, and Bridg-
- ing) of a Wellfleet system.
-
- Decaddrs displays the DECnet configuration of a
- Wellfleet system acting as a DECnet router, showing the
- static parameters associated with each DECnet inter-
- face. Decaroute and decnroute display the DECnet
- inter-area and intra-area routing tables (that is area
- routes and node routes). Xnsroutes displays routes
- known to a Wellfleet system acting as an XNS router.
- Bridgetab displays the bridge forwarding table with the
- disposition of traffic arriving from or directed to
- each station known to the Wellfleet bridge module. All
- these commands take an IP address as the argument and
- can specify an SNMP community for the retrieval. One
- SNMP query is performed for each row of the table.
- Note that the Wellfleet system must be operating as an
- IP router for the SNMP to be accessible.
-
- MECHANISM
- Management information is exchanged by use of SNMP.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Distributed and supported for Sun 3 systems.
-
-
-
-
- NOCTools2 Working Group [Page 41]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- Distributed and supported for SunOS 3.5 and 4.x.
-
- AVAILABILITY
- Commercial product of:
- Wellfleet Communications, Inc.
- 12 DeAngelo Drive
- Bedford, MA 01730-2204
- (617) 275-2400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 42]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog DIG
-
- NAME
- DiG
-
- KEYWORDS
- status; DNS; spoof; UNIX; free.
-
- ABSTRACT
- DiG (domain information groper), is a command line tool
- which queries DNS servers in either an interactive or a
- batch mode. It was developed to be more
- convenient/flexible than nslookup for gathering perfor-
- mance data and testing DNS servers.
-
- MECHANISM
- Dig is built on a slightly modified version of the bind
- resolver (release 4.8).
-
- CAVEATS
- none.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX.
-
- AVAILABILITY
- DiG is available via anonymous FTP from venera.isi.edu
- in pub/dig.2.0.tar.Z.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 43]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog EMANATE_SNMP_RESEARCH
-
- NAME
- EMANATE: Enhanced MANagement Agent Through Extensions
- from SNMP Research.
-
- KEYWORDS
- alarm, control, manager, reference, security, status;
- bridge, Ethernet, FDDI, IP, OSI, ring, star;
- NMS, SNMP;
- sourcelib.
-
- ABSTRACT
- The EMANATE system provides a run-time extensible SNMP
- agent that dynamically reconfigures an agent's MIB
- without having to recompile, relink, or restart the
- agent. An EMANATE capable SNMP agent can support zero,
- one, or many subagents and dynamically reconfigure to
- connect or disconnect those subagents' MIBs.
-
- The EMANATE system consists of several logically
- independent components and subsystems:
-
- o Master SNMP agent which contains an API to communicate
- with subagents.
- o Subagents which implement various MIBS.
- o Subagent Developer's Kit which contains tools to assist
- in the implementation of subagents.
- o EMANATE libraries which provide the API for the
- subagent.
-
- MECHANISM
- A concise API allows a standard means of communication
- between the master and subagents. System dependent
- mechanisms are employed for transfer of information
- between the master and subagents.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 44]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- Multiple platforms including PC's, workstations, hosts,
- and servers are supported. Contact SNMP Research for
- more details.
-
- SOFTWARE REQUIRED
- C compiler.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
-
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 45]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog ETHERFIND_SUN
-
- NAME
- etherfind
-
- KEYWORDS
- traffic; ethernet, IP, NFS; eavesdrop; UNIX.
-
- ABSTRACT
- Etherfind examines the packets that traverse a network
- interface, and outputs a text file describing the
- traffic. In the file, a single line of text describes
- a single packet: it contains values such as protocol
- type, length, source, and destination. Etherfind can
- print out all packet traffic on the ethernet, or
- traffic for the local host. Further packet filtering
- can be done on the basis of protocol: IP, ARP, RARP,
- ICMP, UDP, ND, TCP, and filtering can also be done
- based on the source, destination addresses as well as
- TCP and UDP port numbers.
-
- MECHANISM
- In usual operations, and by default, etherfind puts the
- interface in promiscuous mode. In 4.3BSD UNIX and
- related OSs, it uses a Network Interface Tap (NIT) to
- obtain a copy of traffic on an ethernet interface.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Minimal protocol information is printed. Can only be
- run by the super user. The syntax is painful.
-
- HARDWARE REQUIRED
- Ethernet.
-
- SOFTWARE REQUIRED
- SunOS.
-
- AVAILABILITY
- Executable included in Sun OS "Networking Tools and
- Programs" software installation option.
-
-
-
-
-
- NOCTools2 Working Group [Page 46]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog ETHERNET-CODES
-
- NAME
- ethernet-codes
-
- KEYWORDS
- reference;
- ethernet, fddi;
- ;
- ;
- ;
-
- ABSTRACT
- Mike Patton of MIT LCS has compiled a very
- comprehensive list of the IEEE numbers used on
- Ethernet and FDDI (with some permutation).
- This file contains collected information on the
- various codes used on IEEE 802.3 and EtherNet.
- There are three "pages": type codes, vendor
- codes, and the uses of multicast (including
- broadcast) addresses.
-
- MECHANISM
- FTP the file and use it like a secret decoder ring.
-
- CAVEATS
- Since this information is from collected wisdom,
- there are certainly omissions.
-
- BUGS
- Mike welcomes any further additions.
- They can be sent to a special mailbox that he has set up:
-
- MAP=EtherNet-codes@LCS.MIT.Edu
-
- LIMITATIONS
- See caveats.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- No restrictions.
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 47]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- The file is stored as flat, non-compressed ASCII text.
- It can be FTP'ed from:
- ftp.lcs.mit.edu
-
- Retreive the file:
- /pub/map/EtherNet-codes
-
- To submit additions or obtain further assistance, send email to:
- MAP=EtherNet-codes@LCS.MIT.Edu
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- This entry maintained by the NOCtools editors.
- Send email to noctools-request@merit.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 48]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog GENERIC-MANAGED-SYSTEM
-
- NAME
- Generic Managed System
-
- KEYWORDS
- manager; osi; cmis; unix; free, sourcelib
-
- ABSTRACT
- The Generic Managed System (GMS) implements the
- functions that would be common to any OSI managed
- system. These include the parseing of CMIS requests,
- selection of managed objects according to the scoping
- and filtering rules, handling of notifications and
- event forwarding discriminators etc. The intention is
- that the implementors should use the GMS as a basis
- for their own managed object implementations. A
- support environment is provided to assist with this.
-
- MECHANISM
- The GMS uses the UCL CMIP library plus a library of
- C++ objects representing common managed objects and
- attribute types.
-
- CAVEATS
- The system is still experimental, is subject to change
- and is not yet well documented.
-
- BUGS
- See above.
-
- LIMITATIONS
- None known.
-
- HARDWARE REQUIRED
- Has been tested on SUN 3 and SUN 4 architectures.
-
- SOFTWARE REQUIRED
- The ISODE protocol suite, BSD UNIX, UCL CMIP Library,
- GNU C++ (g++).
-
- AVAILABILITY
- The CMIP library and related management tools built
- upon it, known as OSIMIS (OSI Management Information
- Service), are publicly available from University
- College London, England via FTP and FTAM. To obtain
- information regarding a copy send email to
- osimis-request@cs.ucl.ac.uk or call +44 71 380 7366.
-
-
-
- NOCTools2 Working Group [Page 49]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog GETETHERS
-
- NAME
- getethers
-
- KEYWORDS
- Traffic; Ethernet; Ping; UNIX; Free
-
- ABSTRACT
- Getethers runs through all addresses on an ethernet
- segment (a.b.c.1 to a.b.c.254) and pings each address,
- and then determines the ethernet address for that
- host. It produces a list, in either plain ASCII, the
- file format for the Excelan Lanalyzer, or the file
- format for the Network General Sniffer, of
- hostname/ethernet address pairs for all hosts on the
- local nework. The plain ASCII list optionally
- includes the vendor name of the ethernet card in
- each system, to aid in the determination of the
- identity of unknown systems.
-
- MECHANISM
- Getethers uses a raw IP socket to generate ICMP echo
- requests and receive ICMP echo replies, and then
- examines the kernel ARP table to determine the
- ethernet address of each responding system.
-
- CAVEATS
- Assumes that the ethernet it is looking at is either
- a Class C IP network, or part of a Class B IP network
- that is subnetted with a netmask of 255.255.255.0.
- (This is easy to change, but it's compiled in.)
-
- BUGS
- None known.
-
- LIMITATIONS
- None.
-
- HARDWARE REQUIRED
- Has been tested on Sun-3 and Sun-4 (SPARC) systems
- under SunOS 4.1.x, DEC VAXes under 4.3BSD.
-
- SOFTWARE REQUIRED
- Runs under SunOS 4.x and 4.3BSD; should be easy to
- port to any other Berkeley-like system. Requires
- raw sockets and the ioctl calls to get at the ARP
- table.
-
-
-
- NOCTools2 Working Group [Page 50]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- Public domain, and freely distributable. Available
- via anonymous FTP from harbor.ecn.purdue.edu; also has
- been posted to comp.sources.unix. The current version
- is Version 1.4 from May 1992.
-
- Contact point:
- Dave Curry
- Purdue University
- Engineering Computer Network
- 1285 Electrical Engineering Bldg.
- West Lafayette, IN 47907-1285
- davy@ecn.purdue.edu
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Dave Curry (see address above).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 51]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog GETONE_WELLFLEET
-
- NAME
- getone, getmany, getroute, getarp, getaddr, getif,
- getid.
-
- KEYWORDS
- manager, routing, status; IP; NMS, SNMP; UNIX.
-
- ABSTRACT
- These commands retrieve and format for display values
- of one or several MIB variables (RFC1066) using the
- SNMP (RFC1098). Getone and getmany retrieve arbitrary
- MIB variables; getroute, getarp, getaddr, and getif
- retrieve and display tabular information (routing
- tables, ARP table, interface configuration, etc.), and
- getid retrieves and displays system name, identifica-
- tion and boot time.
-
- Getone <target> <mibvariable> retrieves and displays
- the value of the designated MIB variable from the
- specified target system. The SNMP community name to be
- used for the retrieval can also be specified. Getmany
- works similarly for groups of MIB variables rather than
- individual values. The name of each variable, its
- value and its data type is displayed. Getroute returns
- information from the ipRoutingTable MIB structure,
- displaying the retrieved information in an accessible
- format. Getarp behaves similarly for the address
- translation table; getaddr for the ipAddressTable; and
- getif displays information from the interfaces table,
- supplemented with information from the ipAddressTable.
- Getid displays the system name, identification, ipFor-
- warding state, and the boot time and date. All take a
- system name or IP address as an argument and can
- specify an SNMP community for the retrieval. One SNMP
- query is performed for each row of the table.
-
- MECHANISM
- Queries SNMP agent(s).
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
-
-
-
-
- NOCTools2 Working Group [Page 52]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Distributed and supported for Sun 3 systems.
-
- SOFTWARE REQUIRED
- Distributed and supported for SunOS 3.5 and 4.x.
-
- AVAILABILITY
- Commercial product of:
- Wellfleet Communications, Inc.
- 12 DeAngelo Drive
- Bedford, MA 01730-2204
- (617) 275-2400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 53]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog HAMMER_ANVIL
-
- NAME
- hammer & anvil
-
- KEYWORDS
- benchmark, generator; IP; DOS; free.
-
- ABSTRACT
- Hammer and Anvil are the benchmarking programs for IP
- routers. Using these tools, gateways have been tested
- for per-packet delay, router-generated traffic over-
- head, maximum sustained throughput, etc.
-
- MECHANISM
- Tests are performed on a gateway in an isolated
- testbed. Hammer generates packets at controlled rates.
- It can set the length and interpacket interval of a
- packet stream. Anvil counts packet arrivals.
-
- CAVEATS
- Hammer should not be run on a live network.
-
- BUGS
- None reported.
-
- LIMITATIONS
- Early versions of hammer could not produce inter-packet
- intervals shorter than 55 usec.
-
- HARDWARE REQUIRED
- Hammer runs on a PC/AT or compatible, and anvil
- requires a PC or clone. Both use a Micom Interlan
- NI5210 for LAN interface.
-
- SOFTWARE REQUIRED
- MS-DOS.
-
- AVAILABILITY
- Hammer and anvil are copyrighted, though free. Copies
- are available from pub/eutil on husc6.harvard.edu.
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 54]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog HOPCHECK
-
- NAME
- hopcheck
-
- KEYWORDS
- routing; IP; ping; DOS; free.
-
- ABSTRACT
- Hopcheck is a tool that lists the gateways traversed by
- packets sent from the hopcheck-resident PC to a desti-
- nation. Hopcheck uses the same mechanism as traceroute
- but is for use on IBM PC compatibles that have ethernet
- connections. Hopcheck is part of a larger TCP/IP pack-
- age that is known as ka9q that is for use with packet
- radio. Ka9q can coexist on a PC with other TCP/IP
- packages such as FTP Inc's PC/TCP, but must be used
- independently of other packages. Ka9q was written by
- Phil Karn. Hopcheck was added by Katie Stevens,
- dkstevens@ucdavis.edu. Unlike traceroute, which
- requires a UNIX kernel mod, hopcheck will run on the
- standard, unmodified ka9q release.
-
- MECHANISM
- See the description in traceroute.
-
- CAVEATS
- See the description in traceroute.
-
- BUGS
- None known.
-
- HARDWARE REQUIRED
- IBM PC compatible with ethernet network interface card;
- ethernet card supported through FTP spec packet driver.
-
- SOFTWARE REQUIRED
- DOS.
-
- AVAILABILITY
- Free for radio amateurs and educational institutions;
- others should contact Phil Karn, karn@ka9q.bellcore.com.
- Available via anonymous FTP at ucdavis.edu, in the
- directory "dist/nethop".
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 55]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog INTERNET_ROVER
-
- NAME
- Internet Rover
-
- KEYWORDS
- status; IP, SMTP; curses, ping, spoof; UNIX; free,
- sourcelib.
-
- ABSTRACT
- Internet Rover is a prototype network monitor that uses
- multiple protocol "modules" to test network functional-
- ity. This package consists of two primary pieces of
- code: the data collector and the problem display.
-
- There is one data collector that performs a series of
- network tests, and maintains a list of problems with
- the network. There can be many display processes all
- displaying the current list of problems which is useful
- in a multi-operator NOC.
-
- The display task uses curses, allowing many terminal
- types to display the problem file either locally or
- from a remote site. Full source is provided. The data
- collector is easily configured and extensible. Contri-
- butions such as additional protocol modules, and shell
- script extensions are welcome.
-
- MECHANISM
- A configuration file contains a list of nodes,
- addresses, NodeUp? protocol test (ping in most cases),
- and a list of further tests to be performed if the node
- is in fact up. Modules are included to test TELNET,
- FTP, and SMTP. If the configuration contains a test
- that isn't recognized, a generic test is assumed, and a
- filename is checked for existence. This way users can
- create scripts that create a file if there is a prob-
- lem, and the data collector simply checks the existence
- of that file to determine if there is problem.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 56]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- This tool does not yet have the capability to perform
- actions based on the result of the test. Rather, it is
- intended for a multi-operator environment, and simply
- displays a list of what is wrong with the net.
-
- HARDWARE REQUIRED
- This software is known to run on Suns and IBM RTs.
-
- SOFTWARE REQUIRED
- Curses, 4.xBSD UNIX socket programming libraries, BSD
- ping.
-
- AVAILABILITY
- Full source available via anonymous FTP from merit.edu
- (35.1.1.42) in the ~ftp/pub/inetrover directory.
- Source and executables are public domain and can be
- freely distributed for non-commercial use. This pack-
- age is unsupported, but bug reports and fixes may be
- sent to: wbn@merit.edu.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 57]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog IOZONE
-
- NAME
- iozone
-
- KEYWORDS
- benchmark; nfs;; dos,hp,unix,vmx; free.
-
- ABSTRACT
- Software to assess the sequential file I/O capability
- of a system. May be useful as reference to compare
- against results obtained when files are accessed via
- NFS, Andrew, etc.
-
- MECHANISM
- This test writes a X MEGABYTE sequential file in Y
- byte chunks, then rewinds it and reads it back.
- [The size of the file should be big enough to factor
- out the effect of any disk cache.]. Finally,
- IOZONE deletes the temporary file. Options allow one to
- vary X and Y. In addition, 'auto test' runs IOZONE
- repeatedly using record sizes from 512 to 8192 bytes
- (adjustable), and file sizes from 1 to 16 megabytes
- (adjustable). It creates a table of results.
-
- CAVEATS
- The file is written (filling any cache buffers), and
- then read. If the cache is >= X MB, then most if not
- all the reads will be satisfied from the cache.
- However, if it is less than or equal to
- .5X MB, then NONE of the reads will be satisfied from
- the cache. This is becase after the file is written,
- a .5X MB cache will contain the upper .5 MB of the
- test file, but we will start reading
- from the beginning of the file (data which is no
- longer in the cache).
-
- In order for this to be a fair test, the length of the
- test file must be AT LEAST 2X the amount of disk cache
- memory for your system. If not, you are really
- testing the speed at which your CPU
- can read blocks out of the cache (not a fair test).
-
- BUGS
- none known at this time.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 58]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- IOZONE does not normally test the raw I/O speed of
- your disk or system-em. It tests the speed of
- sequential I/O to actual files.
- Therefore, this measurement factors in the efficiency
- of you machines file system, operating system, C
- compiler, and C runtime library. It produces a
- measurement which is the number of bytes
- per second that your system can read or write to a file.
-
- HARDWARE REQUIRED
-
- This program has been ported and tested on the
- following computer operating systems:
-
- Vendor Operating System Notes on compiling IOzone
- -----------------------------------------------------------------------
- Apollo Domain/OS no cc switches -- BSD domain
- AT&T UNIX System V R4
- AT&T 6386WGS AT&T UNIX 5.3.2 define SYSTYPE_SYSV
- Generic AT&T UNIX System V R3 may need cc -DSVR3
- Convergent Unisys/AT&T SVR3 cc -DCONVERGENT -o iozone iozone.c
- Digital Equipment ULTRIX V4.1
- Digital Equipment VAX/VMS V5.4 see below **
- Digital Equipment VAX/VMS (POSIX)
- Hewlett-Packard HP-UX 7.05
- IBM AIX Ver. 3 rel. 1
- Interactive UNIX System V R3
- Microsoft MS-DOS 3.3 tested Borland, Microsoft C
- MIPS RISCos 4.52
- NeXt NeXt OS 2.x
- OSF OSF/1
- Portable! POSIX 1003.1-1988 may need to define _POSIX_SOURCE
- QNX QNX 4.0
- SCO UNIX System V/386 3.2.2
- SCO XENIX 2.3
- SCO XENIX 3.2
- Silicon Graphics UNIX cc -DSGI -o iozone iozone.c
- Sony Microsystems UNIX same as MIPS
- Sun Microsystems SUNOS 4.1.1
- Tandem Computers GUARDIAN 90 1. call the source file IOZONEC
- 2. C/IN IOZONEC/IOZONE;RUNNABLE
- 3. RUN IOZONE
- Tandem Computers Non-Stop UX
-
- ** for VMS, define iozone as a foreign command via this DCL command:
-
- $IOZONE :== $SYS$DISK:[]IOZONE.EXE
-
-
-
- NOCTools2 Working Group [Page 59]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- this lets you pass the command line arguments to IOZONE
-
- SOFTWARE REQUIRED
- OS as shown in the hardware listing above.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- Author: Bill Norcott
- 1060 Hyde Avenue
- San Jose, CA 95129
- norcott_bill@tandem.com
-
- Availability:
- This tool has been posted to comp.sources.misc.
- It is available from the usual archive sites.
- Program can be located using ARCHIE or other
- servers.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- This entry is maintained by the noctools editors.
- Send email to noctools-request@merit.edu.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 60]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog LADDIS
-
- NAME
- LADDIS
-
- KEYWORDS
- benchmark, generator;
- NFS;
- spoof;
- unix;
- free.
-
- ABSTRACT
-
- "LADDIS: A Multi-Vendor and Vendor-Neutral SPEC NFS
- Benchmark", Bruce Nelson, LADDIS Group & Auspex Systems.
-
- Over the past 24 months, engineers from Legato,
- Auspex, Data General, DEC, Interphase, and Sun
- (LADDIS) met regularly to create the LADDIS NFS
- benchmark: an unbiased, standard, vendor-independent,
- scalable NFS performance test.
-
- The purpose of the LADDIS benchmark is to give users a
- credible and undisputed test of NFS performance, and
- to give vendors a publishable standard performance
- measure that customers can use for load planning,
- system configuration, and equipment buying decisions.
- Toward this end, the LADDIS benchmark is being adopted
- by SPEC (the System Performance Evaluation
- Cooperative, creators of SPECmarks) as the first
- member of SPEC's System-level File Server (SFS)
- benchmark suite."
-
- "In particular, we have had unexpected interest from
- some router vendors in using LADDIS to both rate and
- stress-test IP routers. This is because LADDIS can
- send back-to-back full-size packet trains, and because
- it can generate a 90%-Ethernet util on simulated
- "real" NFS workloads, just like routers encounter in
- the real world. But LADDIS is for local Ethernet or
- FDDI nets only, not WAN."
-
- MECHANISM
- Generates NFS requests and measures responsiveness of
- the server.
-
-
-
-
-
- NOCTools2 Working Group [Page 61]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- "LADDIS is not released yet by SPEC, although a free
- beta version, quite stable, is available now as
- PRE-LADDIS. So you might want to put PRE-LADDIS in
- your listing, noting that full LADDIS
- availability from SPEC is expected by the end of 1992."
-
- BUGS
- The licensee is requested to direct beta test comments
- via electronicmail to:
- "spec-preladdis-comments@riscee.pko.dec.com".
-
- This alias will forward all comments to the SPECSFS
- mailing list (which includes the LADDIS Group).
-
- LIMITATIONS
- LADDIS is for local Ethernet or FDDI nets only, not
- WAN.
-
- HARDWAE REQUIRED
- A host with LAN connectivity. Presumably, a host with
- enough horsepower to generate an adequate work load.
-
- SOFTWARE REQUIRED
- LADDIS is a sophisticated Unix-based NFS traffic
- generator program.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- Date: Mon, 10 Feb 92 13:12:20 PST
- From: bnelson (Bruce Nelson)
-
- Dear Person:
-
- The SPEC PRE-LADDIS beta test process became
- operational on Monday, February 3, 1992. This email
- describes the process as announced during the LADDIS
- Group's presentation at UniForum '92 and
- also at Interop '91. The content of the beta test
- license and the license request process are consistent
- with the proposals approved by the SPEC Steering
- Committee at the January 1992 meeting in Milpitas,
- California.
-
- The SPEC PRE-LADDIS beta test will consist of one beta
- test version of PRE-LADDIS distributed ONLY by
- electronic mail. The SPEC PRE-LADDIS Beta test
- software is licensed by SPEC, not by the LADDIS
- Group.
-
-
-
- NOCTools2 Working Group [Page 62]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- To obtain the PRE-LADDIS Beta test software, an
- individual must:
-
- 1. Request the SPEC PRE-LADDIS beta test License by
- electronic mail to
- "spec-preladdis-beta-test@riscee.pko.dec.com" with a
- subject line of "Request SPEC PRE-LADDIS Beta Test
- License".
- 2. Print a hardcopy of the license and sign.
- 3. Attach a cover letter written on the individual's
- company letterhead requesting the PRE-LADDIS Beta
- Test Kit.
- 4. U.S. Mail the signed license and cover letter to:
- SPEC PRE-LADDIS Beta Test
- c/o NCGA, 2722 Merrilee Drive, Suite 200
- Fairfax, VA 22031
-
- After completing these steps, the SPEC PRE-LADDIS beta
- test kit will be emailed to the requestor from
- riscee.pko.dec.com. The licensee is requested to
- direct beta test comments via electronic mail
- to "spec-preladdis-comments@riscee.pko.dec.com". This
- alias will forward all comments to the SPECSFS mailing
- list (which includes the
- LADDIS Group).
-
- Note that PRE-LADDIS is ONLY available through
- electronic mail and ONLY through the process listed
- above in steps 1-4. If you do not have internet email
- available to you (which is unlikely if you are
- receiving THIS email), you must arrange delivery of
- PRE-LADDIS through some email-capable part of your
- organization, not through LADDIS members like Auspex,
- DEC, Sun, etc.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- This entry is maintained by the NOCtools editors.
- Send E-mail to noctools-request@merit.edu.
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 63]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog LAN_PATROL
-
- NAME
- LAN Patrol
-
- KEYWORDS
- security, traffic; ethernet, star; eavesdrop; DOS.
-
- ABSTRACT
- LAN Patrol is a full-featured network analyzer that
- provides essential information for effective fault and
- performance management. It allows network managers to
- easily monitor user activity, find traffic overloads,
- plan for growth, test cable, uncover intruders, balance
- network services, and so on. LAN Patrol uses state of
- the art data collection techniques to monitor all
- activity on a network, giving an accurate picture of
- how it is performing.
-
- LAN Patrol's reports can be saved as ASCII files to
- disk, and imported into spreadsheet or database pro-
- grams for further analysis.
-
- MECHANISM
- The LAN Patrol interface driver programs a standard
- interface card to capture all traffic on a network seg-
- ment. The driver operates from the background of a
- standard PC, maintaining statistics for each station on
- the network. The information can be viewed on the PC's
- screen, or as a user-defined report output either to
- file or printer.
-
- CAVEATS
- None. Normal operation is completely passive, making
- LAN Patrol transparent to the network.
-
- BUGS
- None known.
-
- LIMITATIONS
- LAN Patrol can monitor up to 10,000 packets/sec on an
- AT class PC, and is limited to monitoring a maximum of
- 1024 stations for intervals of up to 30 days.
-
- Because LAN Patrol operates at the physical level, it
- will only see traffic for the segment on which it is
- installed; it cannot see traffic across bridges.
-
-
-
-
- NOCTools2 Working Group [Page 64]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- Computer: IBM PC/XT/AT, PS/2 Model 30, or compatible.
- Requires 512K memory and a hard drive or double-sided
- disk drive.
-
- Display: Color or monochrome text. Color display
- allows color-coding of traffic information.
-
- Ethernet, StarLAN, LattisNet, or StarLAN 10 network
- interface card.
-
- SOFTWARE REQUIRED
- PC DOS, MS-DOS version 3.1 or greater.
-
- AVAILABILITY
- LAN Patrol many be purchased through network dealers,
- or directly from:
- Legend Software, Inc.
- Phone: (201) 227-8771
- FAX: (201) 906-1151
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 65]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog LANVista
-
- NAME
- LANVista
-
- KEYWORDS
- analyzer, benchmark, debugger, generator, manager, traffic;
- DECnet, Ethernet, IP, OSI, Ring; Eavesdrop, Proprietary;
- DOS, Standalone.
-
- ABSTRACT
- CXR/Digilog's LANVista family of protocol and statistical
- analyzers provide the tools to troubleshoot an Ethernet and
- Token Ring 4/16Mbps network. LANVista lets you capture
- frames to RAM and or disk, generate traffic for stress
- testing, test your network cable for fault isolation, and
- decode all 7 layers of many popular protocol stacks.
- LANVista's 100 family offers exceptional price/performance
- and a wide range of options. Combined with an
- integrated upgrade path to the fully distributed LANVista
- 200 system, the 100 line provides a reasonably priced
- entry into LAN management and protocol analysis.
-
- All LANVista models are fully operable under Microsoft
- Windows. Under Windows, LANVista can be operated in
- the background, gathering data and alarms as other
- tasks are completed. Displayed data may easily be
- cut from LANVista and pasted into other Windows
- applications such as Excel, Lotus 1-2-3, Harvard
- Graphics, etc.
-
- The versatile LANVista family can also be remotely
- controlled through the use of PC Anywhere, Commute,
- Carbon Copy, or other PC remote control packages.
- This feature allows the use of "co-pilot" mode which
- enables an operator at the central site to guide and
- train a remote operator through network management or
- analysis tasks.
-
- All LANVista models provide features vital to effective
- network management and troubleshooting. Basic
- capabilities include: Network database, statistics
- based on the entire network and on a node basis, Token
- Ring functional address statistics, Bridged traffic
- statistics, Protocol statistics, logging of statistics
- to a printer or file of user definable alarms, Hardware
- Pre-Capture filtering, Post capture filtering, Playback of
- captured data, Traffic simulation and On-line context
-
-
-
- NOCTools2 Working Group [Page 66]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- sensitive Help.
-
- Protocol Interpreters used for decoding network traffic
- supported by LANVista include: TCP/IP, DECnet, Banyan
- Vines, XNS/MS-Net, AppleTalk, IBM Token Ring, Novell,
- 3Com 3+ Open, SNMP and OSI.
-
- MECHANISM
- LANVista is available in three forms. A kit version which
- consists of a plug-in PC card and Master software, a self
- contained unit that packages the kit version in a portable
- PC, and a Distributed system. The LANVista distributed
- system allows slave units placed anywhere in the world to
- be controlled from a single central location for
- centralized management of an enterprise network.
- LANVista's PC cards provides a physical interface to
- the LAN and frame preprocessing power. The Master
- software controls the PC card, and the display and
- processing of information gathered from the network.
-
- CAVEATS
- Optimal performance of LANVista's master software is achieved
- with DOS 5.0 by utilizing RAMDRIVE.SYS, SMARTDRV.SYS and High
- memory.
-
- BUGS
- None Known.
-
- LIMITATIONS
- None Known.
-
- HARDWARE REQUIRED
- IBM PC AT, 386, 486 or compatible.
-
- SOFTWARE REQUIRED
- DOS
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- LANVista is available worldwide. For information on a
- local sales representative contact:
-
- CXR/DIGILOG
- 900 Business Center Drive
- Horsham, PA 19044
- Phone 1-800-DIGILOG
- FAX: 215-956-0108
-
- GSA schedule pricing is honored.
-
-
-
- NOCTools2 Working Group [Page 67]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- CXR/DIGILOG Help Desk 1-800-DIGILOG
- Send email to: lanvista@digilog.uucp
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 68]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog LANPROBE
-
- NAME
- LanProbe -- the HP 4990S LanProbe Distributed Analysis
- System.
-
- KEYWORDS
- alarm, manager, map, status, traffic; ethernet; eaves-
- drop, NMS; proprietary.
-
- ABSTRACT
- The LanProbe distributed monitoring system performs
- remote and local monitoring of ethernet LANs in a pro-
- tocol and vendor independent manner.
-
- LanProbe discovers each active node on a segment and
- displays it on a map with its adapter card vendor name,
- ethernet address, and IP address. Additional informa-
- tion about the nodes, such as equipment type and physi-
- cal location can be entered in to the data base by the
- user.
-
- When the NodeLocator option is used, data on the actual
- location of nodes is automatically entered and the map
- becomes an accurate representation of the physical lay-
- out of the segment. Thereafter when a new node is
- installed and becomes active, or when a node is moved
- or becomes inactive, the change is detected and shown
- on the map in real time. The system also provides the
- network manager with precise cable fault information
- displayed on the map.
-
- Traffic statistics are gathered and displayed and can
- be exported in (comma delimited) CSV format for further
- analysis. Alerts can be set on user defined thres-
- holds.
-
- Trace provides a remote protocol analyzer capability
- with decodes for common protocols.
-
- Significant events (like power failure, cable breaks,
- new node on network, broadcast IP source address seen,
- etc.) are tracked in a log that is uploaded to Pro-
- beView periodically.
-
- ProbeView generates reports that can be manipulated by
- MSDOS based word processors, spreadsheets, and DBMS.
-
-
-
-
- NOCTools2 Working Group [Page 69]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- The system consists of one or more LanProbe segment
- monitors and ProbeView software running under Microsoft
- Windows. The LanProbe segment monitor attaches to the
- end of an ethernet segment and monitors all traffic.
- Attachment can be direct to a thin or thick coax cable,
- or via an external transceiver to fiber optic or twist-
- ed pair cabling. Network data relating to the segment
- is transferred to a workstation running ProbeView via
- RS-232, ethernet, or a modem connection.
-
- ProbeView software, which runs on a PC/AT class works-
- tation, presents network information in graphical
- displays.
-
- The HP4992A NodeLocator option attaches to the opposite
- end of the cable from the HP4991A LanProbe segment mon-
- itor. It automatically locates the position of nodes
- on the ethernet networks using coaxial cabling schemes.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- HP 4991A LanProbe segment monitor
- HP 4992A NodeLocator (for optional capabilities)
- 80386 based PC capable of running MS-Windows
-
- SOFTWARE REQUIRED
- HP 4990A ProbeView
- MSDOS 3.0 or higher and Microsoft Windows/286 2.1.
-
- AVAILABILITY
- A commercial product available from:
- Hewlett-Packard Company
- P.O. Box 10301,
- Palo Alto, CA 94303-0890
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 70]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog LANWATCH
-
- NAME
- LANWatch
-
- KEYWORDS
- alarm, analyzer, traffic; CHAOS, DECnet, DNS, ethernet,
- IP, OSI, ring, SMTP, star; eavesdrop; DOS; library,
- sourcelib.
-
- ABSTRACT
- LANWatch 2.0 is an inexpensive, powerful and flexible
- network analyzer that runs under DOS on personal com-
- puters and requires no hardware modifications to either
- the host or the network. LANWatch is an invaluable
- tool for installing, troubleshooting, and monitoring
- local area networks, and for developing and debugging
- new protocols. Network managers using LANWatch can
- inspect network traffic patterns and packet errors to
- isolate performance problems and bottlenecks. Protocol
- developers can use LANWatch to inspect and verify
- proper protocol handling. Since LANWatch is a
- software-only package which installs easily in existing
- PCs, network technicians and field service engineers
- can carry LANWatch in their briefcase for convenient
- network analysis at remote sites.
-
- LANWatch has two operating modes: Display and Examine.
- In Display Mode, LANWatch traces network traffic by
- displaying captured packets in real time. Examine Mode
- allows you to scroll back through stored packets to
- inspect them in detail. To select a subset of packets
- for display, storage or retrieval, there is an exten-
- sive set of built-in filters. Using filters, LANWatch
- collects only packets of interest, saving the user from
- having to sort through all network traffic to isolate
- specific packets. The built-in filters include alarm,
- trigger, capture, load, save and search. They can be
- controlled separately to match on source or destination
- address, protocol, or packet contents at the hardware
- and transport layers. LANWatch also includes suffi-
- cient source code so users can modify the existing
- filters and parsers or add new ones.
-
- The LANWatch distribution includes executables and
- source for several post-processors: a TCP protocol
- analyzer, a node-by-node traffic analyzer and a dump
- file listing tool.
-
-
-
- NOCTools2 Working Group [Page 71]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- Uses many common PC network interfaces by placing them
- in promiscuous mode and capturing traffic.
-
- CAVEATS
- Most PC network interfaces will not capture 100% of the
- traffic on a fully-loaded network (primarily missing
- back-to-back packets).
-
- BUGS
- None known.
-
- LIMITATIONS
- LANWatch can't analyze what it doesn't see (see
- Caveats).
-
- HARDWARE REQUIRED
- LANWatch requires a PC or PS/2 with a supported network
- interface card.
-
- SOFTWARE REQUIRED
- LANWatch runs in DOS. Modification of the supplied
- source code or creation of additional filters and
- parsers requires Microsoft C 5.1
-
- AVAILABILITY
- LANWatch is commercially available from FTP Software,
- Incorporated, 26 Princess Street, Wakefield, MA, 01880
- (617 246-0900).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 72]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog LLL_ENTM
-
- NAME
- ENTM -- Ethernet Traffic Monitor
-
- KEYWORDS
- traffic; ethernet, IP; eavesdrop; VMS; free.
-
- ABSTRACT
- ENTM is a screen-oriented utility that runs under
- VAX/VMS. It monitors local ethernet traffic and
- displays either a real time or cumulative, histogram
- showing a percent breakdown of traffic by ethernet pro-
- tocol type. The information in the display can be
- reported based on packet count or byte count. The per-
- cent of broadcast, multicast and approximate lost pack-
- ets is reported as well. The screen display is updated
- every three seconds. Additionally, a real time, slid-
- ing history window may be displayed showing ethernet
- traffic patterns for the last five minutes.
-
- ENTM can also report IP traffic statistics by packet
- count or byte count. The IP histograms reflect infor-
- mation collected at the TCP and UDP port level, includ-
- ing ICMP type/code combinations. Both the ethernet and
- IP histograms may be sorted by ASCII protocol/port name
- or by percent-value. All screen displays can be saved
- in a file for printing later.
-
- MECHANISM
- This utility simply places the ethernet controller in
- promiscuous mode and monitors the local area network
- traffic. It preallocates 10 receive buffers and
- attempts to keep 22 reads pending on the ethernet dev-
- ice.
-
- CAVEATS
- Placing the ethernet controller in promiscuous mode may
- severly slow down a VAX system. Depending on the speed
- of the VAX system and the amount of traffic on the lo-
- cal ethernet, a large amount of CPU time may be spent
- on the Interrupt Stack. Running this code on any pro-
- duction system during operational hours is discouraged.
-
- BUGS
- Due to a bug in the VAX/VMS ethernet/802 device driver,
- IEEE 802 format packets may not always be detected. A
- simple test is performed to "guess" which packets are
-
-
-
- NOCTools2 Working Group [Page 73]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- in IEEE 802 format (DSAP equal to SSAP). Thus, some
- DSAP/SSAP pairs may be reported as an ethernet type,
- while valid ethernet types may be reported as IEEE 802
- packets.
-
- In some hardware configurations, placing an ethernet
- controller in promiscuous mode with automatic-restart
- enabled will hang the controller. Our VAX 8650 hangs
- running this code, while our uVAX IIs and uVAX IIIs do
- not.
-
- Please report any additional bugs to the author at:
- Allen Sturtevant
- National Magnetic Fusion Energy Computer Center
- Lawrence Livermore National Laboratory
- P.O. Box 808; L-561
- Livermore, CA 94550
- Phone : (415) 422-8266
- E-Mail: sturtevant@ccc.nmfecc.gov
-
- LIMITATIONS
- The user is required to have PHY_IO, TMPMBX and NETMBX
- privileges. When activated, the program first checks
- that the user process as enough quotas remaining
- (BYTLM, BIOLM, ASTLM and PAGFLQUO) to successfully run
- the program without entering into an involuntary wait
- state. Some quotas require a fairly generous setting.
-
- The contents of IEEE 802 packets are not examined.
- Only the presence of IEEE 802 packets on the wire is
- reported.
-
- The count of lost packets is approximated. If, after
- each read completes on the ethernet device, the utility
- detects that it has no reads pending on that device,
- the lost packet counter is incremented by one.
-
- When the total number of bytes processed exceeds
- 7fffffff hex, all counters are automatically reset to
- zero.
-
- HARDWARE REQUIRED
- A DEC ethernet controller.
-
- SOFTWARE REQUIRED
- VAX/VMS version V5.1+.
-
-
-
-
-
- NOCTools2 Working Group [Page 74]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- For executables only, FTP to the ANONYMOUS account
- (password GUEST) on CCC.NMFECC.GOV and GET the follow-
- ing files:
-
- [ANONYMOUS.PROGRAMS.ENTM]ENTM.DOC (ASCII text)
- [ANONYMOUS.PROGRAMS.ENTM]ENTM.EXE (binary)
- [ANONYMOUS.PROGRAMS.ENTM]EN_TYPES.DAT (ASCII text)
- [ANONYMOUS.PROGRAMS.ENTM]IP_TYPES.DAT (ASCII text)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 75]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog Interactive Network Map
-
- NAME
- map -- Interactive Network Map
-
- KEYWORDS
- manager, map; CHAOS, ethernet, IP, ring, star; NMS,
- ping, SNMP, X; UNIX; free, sourcelib.
-
- ABSTRACT
- Map draws a map of network connectivity and allows
- interactive examination of information about various
- components including whether hosts can be reached over
- the network.
-
- The program is supplied with complete source and is
- written in a modular fashion to make addition of dif-
- ferent protocols stacks, displays, or hardcopy devices
- relatively easy. This is one of the reasons why the
- initial version supports at least two of each. Contri-
- butions of additional drivers in any of these areas
- will be welcome as well as porting to additional plat-
- forms.
-
- MECHANISM
- Net components are pinged by use of ICMP echo and,
- optionally, CHAOS status requests and SNMP "gets." The
- program initializes itself from static data stored in
- the file system and therefore does not need to access
- the network in order to get running (unless the static
- files are network mounted).
-
- CAVEATS
- As of publication, the tool is in beta release.
-
- BUGS
- Several minor nits, documented in distribution files.
- Bug discoveries should be reported by email to Bug-
- Map@LCS.MIT.Edu.
-
- LIMITATIONS
- See distribution file for an indepth discussion of sys-
- tem capabilities and potential.
-
- HARDWARE REQUIRED
- An X display is needed for interactive display of the
- map, non-graphical interaction is available in non-
- display mode. For hardcopy output a PostScript or Tek-
-
-
-
- NOCTools2 Working Group [Page 76]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- tronix 4692 printer is required.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS. IP/ICMP is required;
- CHAOS/STATUS and SNMP can be used but are optional.
- X-Windows is required for interactive display of the
- map.
-
- AVAILABILITY
- The program is Copyright MIT. It is available via
- anonymous FTP with a license making it free to use and
- distribute for non-commercial purposes. FTP to host
- FTP.LCS.MIT.Edu, directory nets. The complete
- distribution is in map.tar.Z and some short
- documentation files are there (as well as in the
- distribution). Of most interest are ReadMe and Intro.
-
- To be added to the email forum that discusses the
- software, or for other administrative details, send a
- request to: MAP-Request@LCS.MIT.Edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 77]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog MCONNECT
-
- NAME
- mconnect
-
- KEYWORDS
- status; SMTP; spoof; UNIX.
-
- ABSTRACT
- Mconnect allows an interactive session with a remote
- mailer. Mail delivery problems can be diagnosed by
- connecting to the remote mailer and issuing SMTP com-
- mands directly.
-
- MECHANISM
- Opens a TCP connection to remote SMTP on port 25. Pro-
- vides local line buffering and editing, which is the
- distinction between mconnect and a TELNET to port 25.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Mconnect is not a large improvement over using a TELNET
- connection to port 25.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS.
-
- AVAILABILITY
- Available with 4.xBSD UNIX and related operating sys-
- tems.
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 78]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog MIB-BROWSER
-
- NAME
- MIB Browser
-
- KEYWORDS
- manager; osi; cmis, x; unix; free, sourcelib.
-
- ABSTRACT
- The MIB Browser is an X Windows HCI tool that allows
- you to "browse" through the objects in a Management
- Information Base (MIB). The browser is generic in that
- it can connect to a CMIS agent without having any
- prior knowledge of the structure of the MIB in the
- agent.
-
- MECHANISM
- CMIP is used to transfer the values of attributes
- between the managed system and the browser.
-
- CAVEATS
- None.
-
- BUGS
- Unexpected termination of the agent can cause browser
- to crash (ISODE bug!).
-
- HARDWARE REQUIRED
- Unix workstation, has been tested on SUN 3 and SUN 4
- architectures.
-
- SOFTWARE REQUIRED
- The ISODE protocol suite, BSD UNIX, X Windows, GNU C++
- (g++), Interviews (2.6).
-
- AVAILABILITY
- The CMIP library and related management tools built
- upon it, known as OSIMIS (OSI Management Information
- Service), are publicly available from University
- College London, England via FTP and FTAM. To obtain
- information regarding a copy send email to
- osimis-request@cs.ucl.ac.uk or call +44 71 380 7366.
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 79]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog MONET
-
- NAME
- MONET -- the Hughes LAN Systems SNMP Network Management
- Center (formerly the Hughes LAN Systems 9100) software
- product runs on a Sun SPARCStation hardware platform.
-
- KEYWORDS
- control, graphics, network topology,manager, routing,
- status, traffic; bridge, configuration, performance,
- alarm management, relational database, mib parser for
- RDBMS, intelligent hub management, DECnet, ethernet,
- IP; NMS, SNMP; UNIX.
-
- ABSTRACT
- Monet provides the capability to manage and control
- SNMP-based networking products from any vendor including
- those from Hughes LAN Systems.
-
- A comprehensive relational database manages the data and
- ensures easy access and control of resources throughout
- the network.
-
- Monet provides multivendor management through its
- advanced Mib master MIB parser that allows the parsing
- of enterprise MIBs (ASN.1 format per RFC1212) directly
- into the RDBMS for use by Monet's applications.
-
- Major features include:
-
- Remote access with X:
- Use of the X/Motif user-interface, enabling remote
- access to the all applications.
-
- Database Management
- Stores and retrieves the information required to
- administer and configure the network. It can be
- used to:
- - Store and recall configuration data for all
- devices.
- - Provide availability history for devices.
- - Assign new internet addresses.
- - Provide administrative information such as
- physical location of devices, responsible
- person, maintenance history, asset data,
- hardware/software versions, etc.
- - Full-function SQL interface.
- - User-customizable RDBMS report generation.
-
-
-
- NOCTools2 Working Group [Page 80]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Graphics and Network Mapping
- The Graphics module enables the user to view the
- nodes in the network as "dynamic" icons in
- heirarchical maps. The network is represented by
- these heirarchical maps. Though there is a
- library of device icons, cities and geographical
- maps included, the user has access to a
- graphics editor that allows customizing and the
- creation of new icons and maps.
- A Device's icon may be selected to:
- - Register/deregister the device,
- - Access the open alarms and acknowledge
- faults for the selected device,
- - Ping the device to determine accessibility,
- - Draw graphs of any of the device's numeric
- MIB objects, either the values as retrieved
- in real-time or the history values
- previously stored in the RDBMS by the
- Performance Manager,
- - Telnet to the device,
- - Customize the graphical dynamics (color,
- fill, rotation, etc.) of the device's icon
- by associating them to the values of the
- device's MIB objects.
-
- Configuration Management
- - Retrieves configuration information from SNMP
- devices.
- - Stores device parameters in the RDBMS, with
- common sets of parameters used for multiple
- devices, or for multiple ports on a device,
- stored only once in the RDBMS.
- - Configures devices from the parameters stored in
- the RDBMS, including those relating to TCP/IP,
- DECnet and any other protocol/feature
- configurable via SNMP.
- - Polls devices to compare their current parameter
- values with those in the database and produce
- reports of the discrepancies.
- - Collect data about the state of the network.
- - Learn the parameters of the devices in the
- network and populate the database.
-
- Performance Management
- - Displays local network traffic graphically, by
- packet size, protocol, network utilization,
- sources and destinations of packets, etc.
- - Provides for the scheduling of jobs to retrieve
-
-
-
- NOCTools2 Working Group [Page 81]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MIB values of a device and store them in the RDBMS
- for review or summary reporting at a later time.
- - Allows high/low thresholds to be set on retrieved
- values with alarms generated when thresholds are
- exceeded.
-
- Fault Management
- - Provides availability monitoring and indicates
- potential problems.
- - Creates alarms from received SNMP traps, and from
- other internally-generated conditions,
- - Records alarms in the alarm log in the RDBMS.
- - Lists alarms for selected set of devices,
- according to various filter conditions,
- - Possible causes and suggested actions for the
- alarms are listed.
- - New alarms are indicated by a flashing icon and
- optional audio alert.
- - Visual indication of alarms bubbles up the network
- map heirarchy.
- - Cumulative reports can be produced.
-
- Utilities Function
- - View and/or terminate current NMC processes,
- - Access to database maintenance utilities.
-
- MECHANISM
- SNMP.
-
- CAVEATS
- None reported.
-
- BUGS
- None known.
-
- LIMITATIONS
- Maximum number of nodes that can be monitored is
- 18,000. This can include Hosts, Terminal Servers, PCs,
- Routers, and Bridges.
-
- HARDWARE REQUIRED
- The host for the NMC software is a Sun 4 desktop works-
- tation. Recommended minimum hardware is the Sun IPX
- Color workstation, with a 1/4" SCSI tape drive.
-
- SOFTWARE REQUIRED
- MONET V5.0, which is provided on 1/4" tape format, runs on
- the Sun 4.1.1 Operating System.
-
-
-
- NOCTools2 Working Group [Page 82]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- A commercial product of:
- Hughes LAN Systems Inc.
- 1225 Charleston Road
- Mountain View, CA 94043
- Phone: (415) 966-7300
- Fax: (415) 960-3738
- RCA Telex: 276572
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- kishoret@msgate.hls.com
- kzm@hls.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 83]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NET_MONITOR
-
- NAME
- net_monitor
-
- KEYWORDS
- routing, status; DECnet, IP; curses, ping; UNIX, VMS;
- free, sourcelib.
-
- ABSTRACT
- Net_monitor uses ICMP echo (and DECnet reachability
- information on VAX/VMS) to monitor a network. The mon-
- itoring is very simplistic, but has proved useful. It
- periodically tests whether hosts are reachable and
- reports the results in a full-screen display. It
- groups hosts together in common sets. If all hosts in
- a set become unreachable, it makes a lot of racket with
- bells, since it assumes that this means that some com-
- mon piece of hardware that supports that set has
- failed. The periodicity of the tests, hosts to test,
- and groupings of hosts are controlled with a single
- configuration file.
-
- The idea for this program came from the PC/IP monitor
- facility, but is an entirely different program with
- different functionality.
-
- MECHANISM
- Reachability is tested using ICMP echo facilities for
- TCP/IP hosts (and DECnet reachability information on
- VAX/VMS). A DECnet node is considered reachable if it
- appears in the list of hosts in a "show network" com-
- mand issued on a routing node.
-
- CAVEATS
- This facility has been found to be most useful when run
- in a window on a workstation rather than on a terminal
- connected to a host. It could be useful if ported to a
- PC (looks easy using FTP Software's programming
- libraries), but this has not been done. Curses is very
- slow and cpu intensive on VMS, but the tool has been
- run in a window on a VAXstation 2000. Just don't try
- to run it on a terminal connected to a 11/750.
-
- BUGS
- None known.
-
-
-
-
-
- NOCTools2 Working Group [Page 84]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- This tool is not meant to be a replacement for a more
- comprehensive network management facility such as is
- provided with SNMP.
-
- HARDWARE REQUIRED
- A host with a network connection.
-
- SOFTWARE REQUIRED
- Curses, 4.xBSD UNIX socket programming libraries (lim-
- ited set) and some flavor of TCP/IP that supports ICMP
- echo request (ping). It has been run on VAX/VMS run-
- ning WIN/TCP and several flavors of 4BSD UNIX (includ-
- ing SunOS 3.2, 4.0, and 4.3BSD). It could be ported to
- any platform that provides a BSD-style programming li-
- brary with an ICMP echo request facility and curses.
-
- AVAILABILITY
- Requests should be sent to the author:
-
- Dale Smith
- Asst Dir of Network Services
- University of Oregon
- Computing Center
- Eugene, OR 97403-1211
-
- Internet: dsmith@oregon.uoregon.edu.
- BITNET: dsmith@oregon.bitnet
- UUCP: ...hp-pcd!uoregon!dsmith
- Voice: (503)686-4394
-
- With the source code, a makefile is provided for most
- any UNIX box and a VMS makefile compatible with the
- make distributed with PMDF. A VMS DCL command file is
- also provided, for use by those VMS sites without
- "make."
-
- The author will attempt to fix bugs, but no support is
- promised. The tool is copyrighted, but free (for now).
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 85]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETLABS_CMOT_AGENT
-
- NAME
- Netlabs CMOT Agent
-
- KEYWORDS
- manager, status; IP, OSI; NMS.
-
- ABSTRACT
- Netlabs' CMOT code debuted in Interop 89. The CMOT
- code comes with an Extensible MIB, which allows users
- to add new MIB variables. The code currently supports
- all the MIB variables in RFC 1095 via the data types in
- RFC 1065, as well as the emerging MIB-II, which is
- currently in experimental stage. The CMOT has been
- benchmarked at 100 Management Operations per Second
- (MOPS) for a 1-MIPS machine.
-
- MECHANISM
- The Netlabs CMOT agent supports the control and moni-
- toring of network resources by use of CMOT message
- exchanges.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Portable to most hardware.
-
- SOFTWARE REQUIRED
- Portable to most operating systems.
-
- AVAILABILITY
- Commercially available from:
- Netlabs Inc
- 11693 Chenault Street Ste 348
- Los Angeles CA 90049
- (213) 476-4070
- lam@netlabs.com (Anne Lam)
-
-
-
-
-
-
- NOCTools2 Working Group [Page 86]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETLABS_DUAL_MANAGER
-
- NAME
- Dual Manager
-
- KEYWORDS
- alarm, control, manager, map, security, status; IP,
- OSI; NMS, SNMP, X; UNIX; library.
-
- ABSTRACT
- Netlabs' Dual Manager provides management of TCP/IP
- networks using both SNMP and CMOT protoocls. Such
- management can be initiated either through the X-
- Windows user interface (both Motif and Openlook), or
- through OSI Network Management (CMIP) commands. The
- Dual Manager provides for configuration, fault, secu-
- rity and performance management. It provides extensive
- map management features, including scanned maps in the
- background. It provides simple mechanisms to extend
- the MIB and assign specific lists of objects to
- specific network elements, thereby providing for the
- management of all vendors' specific MIB extensions. It
- provides an optional relational DBMS for storing and
- retrieving MIB and alarm information. Finally, the
- Dual Manager is an open platform, in that it provides
- several Application Programming Interfaces (APIs) for
- users to extend the functionality of the Dual Manager.
-
- The Dual Manager is expected to work as a TCP/IP
- "branch manager" under DEC's EMA, AT&T's UNMA and other
- OSI-conformant enterprise management architectures.
-
- MECHANISM
- The Netlabs Dual Manager supports the control and moni-
- toring of network resources by use of both CMOT and
- SNMP message exchanges.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Runs on Sun/3 and Sun/4s.
-
-
-
- NOCTools2 Working Group [Page 87]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- Available on System V or SCO Open Desktop environments.
- Uses X-Windows for the user interface.
-
- AVAILABILITY
- Commercially available from:
- Netlabs Inc
- 11693 Chenault Street Ste 348
- Los Angeles CA 90049
- (213) 476-4070
- lam@netlabs.com (Anne Lam)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 88]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETLABS_SNMP_AGENT
-
- NAME
- Netlabs SNMP Agent.
-
- KEYWORDS
- manager, status; IP; NMS, SNMP.
-
- ABSTRACT
- Netlabs' SNMP code debuted in Interop 89, where it
- showed interoperation of the code with several imple-
- mentations on the show floor. The SNMP code comes with
- an Extensible MIB, which allows users to add new MIB
- variables. The code currently supports all the MIB
- variables in RFC 1066 via the data types in RFC 1065,
- as well as the emerging MIB-II, which is currently in
- experimental stage. The SNMP has been benchmarked at
- 200 Management Operations per Second (MOPS) for a 1-
- MIPS machine.
-
- MECHANISM
- The Netlabs SNMP agent supports the control and moni-
- toring of network resources by use of SNMP message
- exchanges.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Portable to most hardware.
-
- SOFTWARE REQUIRED
- Portable to most operating systems.
-
- AVAILABILITY
- Commercially available from:
- Netlabs Inc
- 11693 Chenault Street Ste 348
- Los Angeles CA 90049
- (213) 476-4070
- lam@netlabs.com (Anne Lam)
-
-
-
-
- NOCTools2 Working Group [Page 89]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NetMetrix-Load-Monitor
-
- NAME
- NetMetrix Load Monitor
-
- KEYWORDS
- alarm,traffic; Ethernet, FDDI, IP, Ring; Eavesdrop,
- SNMP, X; UNIX;
-
- ABSTRACT
- The NetMetrix Load Monitor is a distributed
- client-server monitoring tool for ethernet, token
- ring, and FDDI networks. A unique "dual" architecture
- provides compatibility with both RMON and X windows.
- RMON allows interoperability and an enterprise-wide
- view, while X windows enables much more powerful,
- intelligent applications at remote segments and saves
- network bandwidth.
-
- The Load Monitor provides extensive traffic
- statistics. It looks at load by time interval, source
- node, destination node, application, protocol or
- packet size. A powerful ZOOM feature allows extensive
- correlational analysis which is displayed in a wide
- variety of graphs and tables.
-
- You can answer questions such as: Which sources are
- generating most of the load on the network when it is
- most heavily loaded and where is this load going?
- Which source/destination pairs generate the most
- traffic over the day? Where should bridges and
- routers be located to optimally partition the network?
- How much load do applications, like the X Windows
- protocol, put on the network and who is generating that
- load when it is the greatest.
-
- A floating license allows easy access to the software
- tool anywhere you need it.
-
- MECHANISM
- NetMetrix turns the network interface into promiscuous
- mode to capture packets.
-
- CAVEATS
- none.
-
- BUGS
- none known.
-
-
-
- NOCTools2 Working Group [Page 90]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- none.
-
- HARDWARE REQUIRED
- SPARC system
-
- SOFTWARE REQUIRED
- SunOS 4.0 or higher
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- NetMetrix is available from:
- Sales Department
- Metrix Network Systems, Inc.
- One Tara Boulevard
- Nashua, New Hampshire 03062
- telephone: 603-888-7000
- fax: 603-891-2796
- email: info@metrix.com
-
- Government agencies please note that NetMetrix is on the GSA
- schedule.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Norma Shepperd
- Marketing Administrator
- 603-888-7000
- norma@metrix.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 91]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NetMetrix-NFS-Monitor
-
- NAME
- NetMetrix NFS Monitor
-
- KEYWORDS
- traffic; Ethernet, FDDI, NFS, Ring; Eavesdrop, SNMP, X;
- UNIX
-
- ABSTRACT
- The NetMetrix NFS Monitor is a distributed network
- monitoring tool which monitors and graphs NFS load,
- response time, retransmits, rejects and errors by
- server, client, NFS procedure, or time
- interval. Breakdown server activity by file system
- and client activity by user.
-
- A powerful ZOOM feature lets you correlate monitoring
- variables. You can see client/server relationships,
- compare server performance, evaluate NFS performance
- enhancement strategies.
-
- A floating license and the X Window protocol allows
- monitoring of remote ethernet, token ring and FDDI
- segments from a central enterprise-wide display.
-
- MECHANISM
- NetMetrix turns the network interface into promiscuous
- mode to capture packets.
-
- CAVEATS
- none.
-
- BUGS
- none known.
-
- LIMITATIONS
- none.
-
- HARDWARE REQUIRED
- SPARC system
-
- SOFTWARE REQUIRED
- SunOS 4.0 or higher
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 92]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- NetMetrix is available from:
- Sales Department
- Metrix Network Systems, Inc.
- One Tara Boulevard
- Nashua, New Hampshire 03062
- telephone: 603-888-7000
- fax: 603-891-2796
- email: info@metrix.com
-
- Government agencies please note that NetMetrix is on
- the GSA schedule.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Norma Shepperd
- Marketing Administrator
- 603-888-7000
- norma@metrix.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 93]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NetMetrix-Protocol-Analyzer
-
- NAME
- NetMetrix Protocol Analyzer
-
- KEYWORDS
- alarm, analyzer, traffic; DECnet, DNS, Ethernet, FDDI,
- IP, OSI, NFS, Ring, SMTP; Eavesdrop, SNMP, X; UNIX;
- Library
-
- ABSTRACT
- The NetMetrix Protocol Analyzer is a distributed
- client-server monitoring tool for ethernet, token
- ring, and FDDI networks. A unique "dual" architecture
- provides compatibility with both RMON and
- X windows. RMON allows interoperability, while X
- windows enables much more powerful, intelligent
- applications at remote segments and saves network
- bandwidth.
-
- With the Protocol Analyzer, you can decode and display
- packets as they are being captured. Extensive filters
- let you sift through packets either before or after
- trace capture. The capture filter may be specified by
- source, destination between hosts, protocol, packet
- size, pattern match, or by a complete expression using
- an extensive filter expression language.
-
- Full 7-layer packet decodes are available for all
- major protocols including DECnet, Appletalk, Novell,
- XNS, SNA, BANYAN, OSI and TCP/IP. The decodes for the
- TCP/IP stack have all major protocols including NFS,
- YP, DNS, SNMP, OSPF, etc.
-
- Request and reply packets are matched. Packets can be
- displayed in summary, detail or hex, with multiple
- views to see packet dialogues side by side.
-
- A complete developers' kit is available for custom
- decodes.
-
- A floating license allows easy acess to the software
- tool anywhere you need it.
-
- MECHANISM
- NetMetrix turns the network interface into promiscuous
- mode to capture packets.
-
-
-
-
- NOCTools2 Working Group [Page 94]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- none.
-
- BUGS
- none known.
-
- LIMITATIONS
- none.
-
- HARDWARE REQUIRED
- SPARC system
-
- SOFTWARE REQUIRED
- SunOS 4.0 or higher
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- NetMetrix is available from:
- Sales Department
- Metrix Network Systems, Inc.
- One Tara Boulevard
- Nashua, New Hampshire 03062
- telephone: 603-888-7000
- fax: 603-891-2796
- email: info@metrix.com
-
- Government agencies please note that NetMetrix is on the
- GSA schedule.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Norma Shepperd
- Marketing Administrator
- 603-888-7000
- norma@metrix.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 95]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NetMetrix-Traffic-Generator
-
- NAME
- NetMetrix Traffic Generator
-
- KEYWORDS
- Debugger, Generator, Traffic; Ethernet, FDDI, IP,
- Ring; Eavesdrop, SNMP, X; UNIX; Library
-
- ABSTRACT
- The NetMetrix Traffic Generator is a distributed
- software tool which allows you to simulate network
- load or test packet dialogues between nodes on your
- ethernet, token ring, or FDDI segments. The Traffic
- Generator can also be used to test and validate
- management station alarms, routers, bridges, hubs, etc.
-
- An easy-to-use programming interface provides complete
- flexibility over variables such as bandwidth, packet
- sequence, and conditional responses.
-
- A floating license and the X Window System protocol
- allows testing of remote ethernet, token ring and FDDI
- segments from a central console.
-
- MECHANISM
- NetMetrix turns the network interface into promiscuous
- mode to capture packets.
-
- CAVEATS
- none.
-
- BUGS
- none known.
-
- LIMITATIONS
- none.
-
- HARDWARE REQUIRED
- SPARC system
-
- SOFTWARE REQUIRED
- SunOS 4.0 or higher
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 96]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- NetMetrix is available from:
- Sales Department
- Metrix Network Systems, Inc.
- One Tara Boulevard
- Nashua, New Hampshire 03062
- telephone: 603-888-7000
- fax: 603-891-2796
- email: info@metrix.com
-
- Government agencies please note that NetMetrix is on
- the GSA schedule.
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Norma Shepperd
- Marketing Administrator
- 603-888-7000
- norma@metrix.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 97]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETMON_MITRE
-
- NAME
- NETMON and iptrace
-
- KEYWORDS
- traffic; IP; eavesdrop; UNIX; free.
-
- ABSTRACT
- NETMON is a facility to enable communication of net-
- working events from the BSD UNIX operating system to a
- user-level network monitoring or management program.
- Iptrace is a program interfacing to NETMON which logs
- TCP-IP traffic for performance measurement and gateway
- monitoring. It is easy to build other NETMON-based
- tools using iptrace as a model.
-
- NETMON resides in the 4.3BSD UNIX kernel. It is
- independent of hardware-specific code in UNIX. It is
- transparent to protocol and network type, having no
- internal assumptions about the network protocols being
- recorded. It is installed in BSD-like kernels by
- adding a standard function call (probe) to a few points
- in the input and output routines of the protocols to be
- logged.
-
- NETMON is analogous to Sun Microsystems' NIT, but the
- interface tap function is extended by recording more
- context information. Aside from the timestamp, the
- choice of information recorded is up to the installer
- of the probes. The NETMON probes added to the BSD IP
- code supplied with the distribution include as context:
- input and output queue lengths, identification of the
- network interface, and event codes labeling packet dis-
- cards. (The NETMON distribution is geared towards
- measuring the performance of BSD networking protocols
- in an IP gateway).
-
- NETMON is designed so that it can reside within the
- monitored system with minimal interference to the net-
- work processing. The estimated and measured overhead
- is around five percent of packet processing.
-
- The user-level tool "iptrace" is provided with NETMON.
- This program logs IP traffic, either at IP-level only,
- or as it passes through the network interface drivers
- as well. As a separate function, iptrace produces a
- host traffic matrix output. Its third type of output
-
-
-
- NOCTools2 Working Group [Page 98]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- is abbreviated sampling, in which only a pre-set number
- of packets from each new host pair is logged. The
- three output types are configured dynamically, in any
- combination.
-
- OSITRACE, another logging tool with a NETMON interface,
- is available separately (and documented in a separate
- entry in this catalog).
-
- MECHANISM
- Access to the information logged by NETMON is through a
- UNIX special file, /dev/netmon. User reads are blocked
- until the buffer reaches a configurable level of full-
- ness.
-
- Several other parameters of NETMON can be tuned at com-
- pile time. A diagnostic program, netmonstat, is
- included in the distribution.
-
- CAVEATS
- None.
-
- BUGS
- Bug reports and questions should be addressed to:
- ie-tools@gateway.mitre.org
- Requests to join this mailing list:
- ie-tools-request@gateway.mitre.org
- Questions and suggestions can also be directed to:
- Allison Mankin (703)883-7907
- mankin@gateway.mitre.org
-
- LIMITATIONS
- A NETMON interface for tcpdump and other UNIX protocol
- analyzers is not included, but it is simple to write.
- NETMON probes for a promiscuous ethernet interface are
- similarly not included.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX-like network protocols or the ability to
- install the BSD publicly available network protocols in
- the system to be monitored.
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 99]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- The NETMON distribution is available by anonymous FTP
- in pub/netmon.tar or pub/netmon.tar.Z from aelred-
- 3.ie.org. A short user's and installation guide,
- NETMON.doc, is available in the same location. The
- NETMON distribution is provided "as is" and requires
- retention of a copyright text in code derived from it.
- It is copyrighted by the MITRE-Washington Networking
- Center.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 100]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETMON_WINDOWS_SNMP_RESEARCH
-
- NAME
- NETMON for Windows -- an SNMP-based network management
- tool that runs under Microsoft Windows 3.0 from SNMP
- Research.
-
- KEYWORDS
- alarm, control, manager, map, routing;
- DECnet, Ethernet, IP, OSI, ring, star;
- NMS, SNMP;
- DOS;
- sourcelib.
-
- ABSTRACT
- The NETMON application implements a powerful network
- management station based on a low-cost DOS platform.
- NETMON's network management tools for configuration,
- performance, security, and fault management have been
- used successfully with a wide assortment of wide- and
- local-area-network topologies and medias. Multiprotocol
- devices are supported including those using TCP/IP,
- DECnet, and OSI protocols.
-
- Some features of NETMON's network management tools include:
-
- o Fault management tool displays a map of the network
- configuration with node and link state indicated
- in one of several colors to indicate current status;
- o Configuration management tool may be used to edit the
- network management information base stored in the
- NMS to reflect changes occurring in the network;
- o Graphs and tabular tools for use in fault and performance
- management;
- o Mechanisms by which additional variables, such as vendor-
- specific variables, may be added;
- o Alarms may be enabled to alert the operator of events
- occurring in the network;
- o Events are logged to disk;
- o Output data may be transferred via flat files for
- additional report generation by a variety of
- statistical packages.
-
- The NETMON application comes complete with source code
- including a powerful set of portable libraries for generating
- and parsing SNMP messages.
-
-
-
-
-
- NOCTools2 Working Group [Page 101]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- The NETMON for Windows application is based on the
- Simple Network Management Protocol (SNMP). Polling is
- performed via the powerful SNMP get-next operator and
- the SNMP get operator. Trap directed polling is used
- to regulate the focus and intensity of the polling.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- The minimum system is a IBM 386 computer, or
- compatible, with hard disk drive.
-
- SOFTWARE REQUIRED
- DOS 5.0 or later, Windows 3.0 in 386 mode, and TCP/IP
- kernel software from FTP Software.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 102]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETscout
-
- NAME
- NETscout(tm)
-
- KEYWORDS
- Alarm, Analyzer, Manager, Status, Traffic;
- DECnet, Ethernet, IP, OSI, NFS, Ring, Star, Eavesdrop;
- NMS, SNMP;
- UNIX;
-
- ABSTRACT
- The NETscout family of distributed LAN Analyzer
- devices are intended to provide network users with a
- comprehensive capability to identify and isolate fault
- conditions in data communications networks.
- NETscout has the capability to collect wide ranging
- statistical data, to display selectively captured and
- fully decoded network traffic, to set user-defined
- alarm conditions, and to obtain real-time updates
- from all segments of a widely dispersed internetwork
- from a centralized SNMP-compatible network management
- console.
-
- The NETscout family is based on standards so that
- operation may be realized in heterogeneous networks
- which constitute a multi-protocol, multi-topology,
- multi-vendor environment. The fundamental standards
- upon which NETscout is based are the Simple Network
- Management Protocol (SNMP), which defines the protocol
- for all inter-communications between NETscout devices,
- and the Remote Monitoring Management Information Base
- (RMON-MIB), which defines the type of information
- which is to be gathered and made available to the
- user for each network segment.
-
- NETscout clients provide a full array of monitoring
- and analysis features including intelligent seven
- level decoding of all majorprotocol stacks:
-
- DOD including TCP/IP XNS Novell
- DECNET including LAT ISO APPLETALK
- IBM Token Ring Vines NETBIOS/SMB
- SNMP including RMON-MIB SUN-NFS SMT
-
- NETscout agents support all nine groups of the
- RMON-MIB standard. NETscout agents can work with any
- SNMP-based network management system and currently
-
-
-
- NOCTools2 Working Group [Page 103]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- support Ethernet and Token Ring.
-
- MECHANISM
- The operation of the NETscout family is divided into
- two distinct subcategories. The first is the "Client"
- which is the user console from which operational
- commands are issued and where all results and
- diagnostic information are displayed. In a NETscout
- topology it is feasible to have multiple clients
- active simultaneously within a single network. The
- second category is the "Agent", a hardware/software
- device which is attached to a specific network
- segment and which gathers statistical information for
- that segment as well as providing a window into that
- segment where network traffic may be observed and
- gathered for more detailed user analysis. A
- typical network will have multiple segments and
- multiple agents up to the point of having one agent
- for each logical network segment.
-
- NETscout Model 9210 is a software package which, when
- combined in a Sun SPARCstation in conjunction with
- SunNet Manager running under Open Windows, implements
- the NETscout client function. SunNet Manager provides
- the background operational tools for client operation
- while the NETscout software provides
- application-specific functions related to RMON-MIB
- support as well as all software necessary to
- perform the protocol decode function.
- SunNet Manager also implements a network map file
- which includes a topographical display of the entire
- network and is the mechanism for selecting
- network elements to perform operations.
-
- NETscout Model 9215 is a software package that
- operates in conjunction with SunNet Manager and
- implements the statistics monitoring function only.
- That is, it does not include the protocol
- decode function or the mechanism to retrieve actual
- data from a remote agent. It does, however, include
- complete statistics gathering and event and alarm
- generation.
-
- Frontier NETscout Models 9510 and 9515, and Model 9610
- and 9615 are agent software packages that implement
- selected network diagnostic functions when loaded into
- a Sun SPARCstation (9510, 9515) or a SynOptics
- LattisNet Hub (9610, 9615) respectively which is
-
-
-
- NOCTools2 Working Group [Page 104]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- connected to an Ethernet network segment
- using conventional network interface hardware. Models
- 9510 and 9610 support all nine RMON-MIB groups
- including "filters" and "packet capture" and thus
- provide for complete protocol monitoring and decode
- when used with a client
- equipped with protocol decode software. Models 9515
- an 9615 include support for seven RMON-MIB groups
- which excludes "filters" and "data capture" and
- therefore perform network monitoring only through
- collection and presentation of network statistics,
- events, and alarms. All models also support the MIB2
- system and interface groups.
-
- Frontier NETscout Models 9520 and 9525, and Model 9620
- and 9625 are agent software packages that are
- identical in function to their respective models
- described above except that they are for use on
- Token Ring segments.
-
- CAVEATS
- The RMON-MIB standard for Token Ring applications has
- not yet beenformally released and is not approved.
- NETscout products correspond to the latest draft for
- Token Ring functions and will be updated as
- required to conform to the standard as it is approved.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Sun SPARCstation or LattisNet Hub depending upon Model
- number.
-
- SOFTWARE REQUIRED
- Sun OS 4.1.1 for client and agent, SunNet Manager for
- client.
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 105]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- NETscout products are available commercially. For
- information regarding your local representative, contact:
- Frontier Software Development, Inc.
- 1501 Main Street
- Tewksbury, MA 01876
- Phone: 508-851-8872
- Fax: 508-851-6956
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Marketing
- Frontier Software
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 106]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETSTAT
-
- NAME
- netstat
-
- KEYWORDS
- routing; IP; UNIX, VMS; free.
-
- ABSTRACT
- Netstat is a program that accesses network related data
- structures within the kernel, then provides an ASCII
- format at the terminal. Netstat can provide reports on
- the routing table, TCP connections, TCP and UDP
- "listens", and protocol memory management.
-
- MECHANISM
- Netstat accesses operating system memory to read the
- kernel routing tables.
-
- CAVEATS
- Kernel data structures can change while netstat is run-
- ning.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS, or VMS.
-
- AVAILABILITY
- Available via anonymous FTP from uunet.uu.net, in
- directory bsd-sources/src/ucb. Available with 4.xBSD
- UNIX and related operating systems. For VMS, available
- as part of TGV MultiNet IP software package, as well as
- Wollongong's WIN/TCP.
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 107]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NETWORK_INTEGRATOR
-
- NAME
- Network Integrator I
-
- KEYWORDS
- map, traffic; ethernet; UNIX.
-
- ABSTRACT
- This tool monitors traffic on network segments. All
- information is dumped to either a log file or, for
- real-time viewing, to a command tool window. Data is
- time-stamped according to date and time. Logging can
- continue for up to 24 hours.
-
- The tool is flexible in data collection and presenta-
- tion. Traffic filters can be specified according to
- header values of numerous protocols, including those
- used by Apple, DEC, Sun, HP, and Apollo. Bandwidth
- utilization can be monitored, as well as actual load
- and peak throughput. Additionally, the Network
- Integrator can analyze a network's topology, and record
- the location of all operational nodes on a network.
-
- Data can be displayed in six separate formats of bar
- graphs. In addition, there are several routines for
- producing statistical summaries of the data collected.
-
- MECHANISM
- The tools work through RPC and XDR calls.
-
- CAVEATS
- Although the tool adds only little traffic to a net-
- work, generation of statistics from captured files
- requires a significant portion of a workstation's CPU.
-
- BUGS
- None known.
-
- LIMITATIONS
- Must be root to run monitor. There does not seem to be
- a limit to the number of nodes, since it monitors by
- segments. The only major limitation is the amount of
- disk space that a user can commit to the log files.
- The size of the log files, however, can be controlled
- through the tool's parameters.
-
-
-
-
-
- NOCTools2 Working Group [Page 108]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- Sun3 or Sun4.
-
- SOFTWARE REQUIRED
- 4.0BSD UNIX or greater, or related OS.
-
- AVAILABILITY
- Copyrighted, commercially available from
- Network Integrators,
- (408) 927-0412.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 109]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NFSwatch
-
- NAME
- nfswatch
-
- KEYWORDS
- Traffic; Ethernet, IP, NFS; Curses, Eavesdrop; UNIX;
- Free
-
- ABSTRACT
- Nfswatch monitors all incoming ethernet traffic to an
- NFS file server and divides it into several
- categories. The number and percentage of packets
- received in each category is displayed on
- the screen in a continuously updated display.
-
- By default, nfswatch monitors all packets destined for
- the local host over a single network interface.
- Options are provided to specify the specific interface
- to be monitored, or all interfaces at once. NFS
- traffic to the local host, to a remote host, from a
- specific host, between two hosts, or all NFS traffic
- on the network may be monitored.
-
- Categories of packets monitored and counted include:
- ND Read, ND Write, NFS Read, NFS Write, NFS Mount,
- Yellow Pages (NIS), RPC Authorization, Other RPC, TCP,
- UDP, ICMP, RIP, ARP, RARP, Ethernet Broadcast, and
- Other.
-
- Packets are also tallied either by file system or file
- (specific files may be watched as an option), NFS
- procedure name (RPC call), or NFS client hostname.
-
- Facilities for taking "snapshots" of the screen, as
- well as saving data to a log file for later analysis
- (the analysis tool is included) are also available.
-
- MECHANISM
- Nfswatch uses the Network Interface Tap, nit(4) under
- SunOS 4.x, and the Packet Filter, packetfilter(4),
- under Ultrix 4.x, to place the ethernet interface into
- promiscuous mode. It filters out NFS packets, and
- decodes the file handles in order to determine how to
- count the packet.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 110]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- Because the NFS file handle is a non-standard (server
- private) piece of data, nfswatch must be modified to
- understand file handles used by various
- implementations. It currently knows
- about the SunOS 4.x and Ultrix file handle formats.
-
- BUGS
- Does not monitor FDDI interfaces. (It should be a
- simple change, but neither author has access to a
- system with FDDI interfaces for testing.)
-
- LIMITATIONS
- Up to 256 exported file systems and 256 individual
- files can be monitored at any time.
-
- Only NFS requests are counted; the NFS traffic
- generated by a server in response to those packets
- is not counted.
-
- HARDWARE REQUIRED
- Any Ultrix system (VAX or DEC RISC hardware)
-
- SOFTWARE REQUIRED
- Ultrix release 4.0 or later. For Ultrix 4.1, may
- require the patched "if_ln.o" kernel module, available
- from Digital's Customer Support Center.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- Copyrighted, but freely distributable. Available via
- anonymous FTP from harbor.ecn.purdue.edu,
- ftp.erg.sri.com, and gatekeeper.dec.com, as well as
- numerous other sites around the Internet. The current
- version is Version 3.0 from January 1991.
-
- Contact points:
-
- Dave Curry Jeff Mogul
- Purdue University Digital Equipment Corp.
- Engineering Computer Network Western Research Laboratory
- 1285 Electrical Engineering Bldg. 100 Hamilton Avenue
- West Lafayette, IN 47907-1285 Palo Alto, CA 94301
- davy@ecn.purdue.edu mogul@decwrl.dec.com
-
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Dave Curry (see address above).
-
-
-
-
- NOCTools2 Working Group [Page 111]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NHFSSTONE
-
- NAME
- nhfsstone
-
- KEYWORDS
- benchmark, generator; NFS; spoof; UNIX; free.
-
- ABSTRACT
- Nhfsstone (pronounced n-f-s-stone, the "h" is silent)
- is an NFS benchmarking program. It is used on an NFS
- client to generate an artificial load with a particular
- mix of NFS operations. It reports the average response
- time of the server in milliseconds per call and the
- load in calls per second. The nhfsstone distribution
- includes a script, "nhfsnums" that converts test
- results into plot(5) format so that they can be graphed
- using graph(1) and other tools.
-
- MECHANISM
- Nhfsstone is an NFS traffic generator. It adjusts its
- calling patterns based on the client's kernel NFS
- statistics and the elapsed time. Load can be generated
- over a given time or number of NFS calls.
-
- CAVEATS
- Nhfsstone will compete for system resources with other
- applications.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- 4.xBSD-based UNIX
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 112]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- Available via anonymous FTP from bugs.cs.wisc.edu.
- Alternatively, Legato Systems will provide the program
- free of charge, if certain conditions are met. Send
- name and both email and U.S. mail addresses to:
- Legato Systems, Inc.
- Nhfsstone
- 260 Sheridan Avenue
- Palo Alto, California 94306
-
- A mailing list is maintained for regular information
- and bug fixes: nhfsstone@legato.com or
- uunet!legato.com!nhfsstone. To join the list:
- nhfsstone-request@legato.com or
- uunet!legato.com!nhfsstone-request.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 113]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NNSTAT
-
- NAME
- NNStat
-
- KEYWORDS
- manager, status, traffic; ethernet, IP; eavesdrop, NMS;
- UNIX; free.
-
- ABSTRACT
- NNStat is a collection of programs that provides an
- internet statistic collecting capability. The NNStat
- strategy for statistic collection is to collect traffic
- statistics via a promiscuous ethernet tap on the local
- networks, versus instrumenting the gateways. If all
- traffic entering or leaving a network or set of net-
- works traverses a local ethernet, then by stationing a
- statistic gathering agent on each local network a pro-
- file of network traffic can be gathered. Statistical
- data is retrieved from the local agents by a global
- manager.
-
- A program called "statspy" performs the data gathering
- function. Essentially, statspy reads all packets on an
- ethernet interface and records all information of
- interest. Information of interest is gathered by exa-
- mining each packet and determining if the source or
- destination IP address is one that is being monitored,
- typically a gateway address. If so then the contents
- of the packet are examined to see if they match further
- criteria.
-
- A program called "collect" performs global data collec-
- tion. It periodically polls various statspy processes
- in the domain of interest to retrieve locally logged
- statistical data.
-
- The NNSTAT distribution comes with several sample awk
- programs which process the logged output of the collect
- program.
-
- MECHANISM
- Local agents (statspy processes) collect raw traffic
- data via a promiscuous ethernet tap. Statistical, fil-
- tered or otherwise reduced data is retrieved from the
- local agents by a global manager (the "collect" pro-
- cess).
-
-
-
-
- NOCTools2 Working Group [Page 114]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- None.
-
- BUGS
- Bug fixes, extensions, and other pointers are discussed
- in the electronic mail forum, bytecounters. To join,
- send a request to bytecounters-request@venera.isi.edu.
- Forum exchanges are archived in the file
- bytecounters/bytecounters.mail, available via anonymous
- FTP from venera.isi.edu.
-
- LIMITATIONS
- NNStat presumes a topology of one or more long haul
- networks gatewayed to local ethernets.
-
- A kernel mod required to run with SunOS4. These mods
- are described in the bytecounters archive.
-
- HARDWARE REQUIRED
- Ethernet interface. Sun 3, Sun 4 (SPARC), or PC RT
- workstation.
-
- SOFTWARE REQUIRED
- Distribution is for BSD UNIX, could easily be adapted
- to any UNIX with promiscuous ethernet support.
-
- AVAILABILITY
- Distribution is available via anonymous FTP from
- venera.isi.edu, in file pub/NNStat.tar.Z. Documenta-
- tion is in pub/NNStat.userdoc.ms.Z.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 115]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NOCOL(8)
-
- NAME
- nocol - network monitoring tools for an IP network
-
- SYNOPSIS
- This is an overview of the NOCOL software.
-
- DESCRIPTION
- NOCOL (Network Operations Center On-Line) is a
- collection of network monitoring programs that run on
- Unix systems. The software consists of a number of
- monitoring agents that poll various parameters from any
- system and put it in a format suitable for
- post-processing. The post-processors can be a display
- agent, an automated troubleshooting program, an
- event logging program, etc. Presently, monitors for
- tracking reachability, SNMP traps, data throughput
- rate, and nameservers have been developed and are in
- use. Addition of more monitoring agents is easy and
- they will be added as necessary. A display agent-
- nocol(1) using curses has already been developed. Work
- on an "intelligent" module is currently in progress for
- event logging and some automatic troubleshooting.
-
- All data collected by the monitoring agents follows a
- fixed (non-readable) format. Each data entry is termed
- an event in NOCOL, and each event has certain flags and
- severity associated with it. The display agent
- nocol(1), displays the output of these monitoring
- agents depending on the severity of the event. There
- can be multiple displays running simultanously and
- all process the same set of monitored data.
-
- There are four levels of severity associated with an
- event- CRITICAL, ERROR, WARNING and INFO. The severity
- level is controlled independently by the monitoring
- agents, and the decision to raise or set an event's
- severity to any level depends on the logic imbedded in
- the monitoring agent.
-
- As an example, for the pingmon(8) monitor, if a site is
- unreachable via ping, it would be assigned a severity
- of WARNING by pingmon, which would then elevate to
- CRITICAL if the site is still unreachable after some
- time. In the case of trapmon(8), an SNMP trap message
- of EGP neighbor lost would be directly assigned a
- severity level of CRITICAL, while an Warm Start trap is
-
-
-
- NOCTools2 Working Group [Page 116]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- assigned a severity of WARNING.
-
- The display agent (and other data post-processors)
- would use this event severity to decide whether to
- display it (or troubleshoot/log it) depending on the
- user selected display severity level.
-
- The software is very flexible and allows enhancements
- and development with a minimum amount of effort. The
- display module processes all the files present in the
- data directory, and displays them sequentially. This
- allows new monitoring programs to simply start
- generating data in the data directory and the display
- module will automatically start displaying the new
- data. The monitoring tools can be changed, and the only
- element that has to remain common between all the
- modules is the EVENT data structure.
-
- CURRENT MODULES
- NOCOL presently consists of the following modules:
-
- nocol
- which simply displays the data collected by the
- monitoring agents. It uses the curses screen
- management system to support a wide variety of terminal
- types. The criterion for displaying an event is:
-
- 1. Severity level of the event is higher than the
- severity level set in the display.
-
- 2. The display filter (if set) matches some string in
- the event line.
-
- The display can be in regular 80 column mode or in
- extended 132 column mode. Critical events are
- displayed in reverse video (if the terminal type
- supports it). Additional features like displaying
- informational messages in a part of the window,
- automatic resizing window sizes, operator
- acknowledgement via a bell when a new event goes
- critical are also available.
-
- ippingmon
- which monitors the reachability of a site via "ICMP"
- ping packets (ICMP was preferred over SNMP for many
- obvious reasons). This program can use the default out-
- put from the system's ping program, but an accompanying
- program ( multiping) can ping multiple IP sites at the
-
-
-
- NOCTools2 Working Group [Page 117]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- same time and is preferable for monitoring a large list
- of sites. A site is marked unreachable if a certain
- number of packets is lost, and the severity level is
- increased each time that the site tests unreachable.
-
- osipingmon
- which is similar to the ippingmon module but uses the
- OSI ping program instead. No multiple ping program for
- OSI sites has been developed at this time. The only
- requirement is that the system's ping program output
- match the typical BSD IP ping program's output.
-
- nsmon
- which monitors the nameservers (named) on the list of
- specified hosts. It periodically sends an SOA query for
- the default domain and if the queried nameservers
- cannot resolve the query, then the site is elevated to
- CRITICAL status.
-
- tpmon
- For monitoring the throughput (kbits per second) to a
- list of hosts. The program connects to the discard
- socket on the remote machine (using a STREAM socket)
- and sends large packets for a small amount of time to
- evaluate the effective throughput. It elevates a site
- to WARNING level if the throughput drops below a
- certain threshold (set in the configuration file).
-
- trapmon
- Converts all SNMP traps into a format suitable for
- displaying using NOCOL. The severity of the various
- traps is preset (and can be changed during compilation
- time).
-
-
- PLATFORM
- Any Unix system with the curses screen management library
- and IP (Internet Protocol) programming facility. It has been
- tested on Sun Sparc 4.1.1, Ultrix, and NeXT systems. Porting
- to other platforms might require minor adjustments depending
- on the vagaries of the different vendors (mostly in the
- include files).
-
- AVAILABILITY
- NOCOL was developed at JvNCnet and has been in use for
- monitoring the JvNCnet wide area network since 1989.
- It is available via anonymous FTP from ftp.jvnc.net under
- pub/jvncnet-packages/nocol.tar.Z. The system running at
-
-
-
- NOCTools2 Working Group [Page 118]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- JvNCet can be viewed by logging into the host nocol.jvnc.net
- with username nocol (an rlogin instead of telnet will handle
- your X window terminal types better).
- To be added to the NOCOL mailing list (for future updates
- and bug fixes), send a message to nocol-users-
- request@jvnc.net with your email address.
-
- FUTURE DEVELOPMENTS
-
- Possible future enhancements are:
-
- 1. Event logging.
-
- 2. Addition of an automated troubleshooting mechanism
- when a site severity level reaches a particular
- level.
-
- 3. SNMP monitors to watch the state of certain vari-
- ables (interface errors, packet rate, route state
- changes).
-
- AUTHOR
- The software was developed at JvNCnet over a period of time.
- The overall design and initial development was done by Vikas
- Aggarwal and Sze-Ying Wuu. Additional development is being
- done and coordinated by Vikas Aggarwal (vikas@jvnc.net).
- Copyright 1992 JvNCnet. (See the file COPYRIGHT for full
- details)
-
- SEE ALSO
- nocol(1) nocol(3) tpmon(8) tsmon(8) nsmon(8)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 119]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NPRV
-
- NAME
- NPRV -- IP Node/Protocol Reachability Verifier
-
- KEYWORDS
- map, routing, status; IP; ping; VMS; free.
-
- ABSTRACT
- NPRV is a full-screen, keypad-oriented utility that
- runs under VAX/VMS. It allows the user to quickly scan
- through a user-defined list of IP addresses (or domain
- names) and verify a node's reachability. The node's
- reachability is determined by performing an ICMP echo,
- UDP echo and a TCP echo at alternating three second
- intervals. The total number of packets sent and
- received are displayed, as well as the minimum, average
- and maximum round-trip times (in milliseconds) for each
- type of echo. Additionally, a "trace route" function
- is performed to determine the path from the local sys-
- tem to the remote host. Once all of the trace route
- information has filled the screen, a "snapshot" of the
- screen can be written to a text file. Upon exiting the
- utility, these text files can be used to generate a
- logical network map showing host and gateway intercon-
- nectivity.
-
- MECHANISM
- The ICMP echo is performed by sending ICMP ECHO REQUEST
- packets. The UDP and TCP echoes are performed by con-
- necting to the UDP/TCP echo ports (port number 7). The
- trace route information is compiled by sending alter-
- nating ICMP ECHO REQUEST packets and UDP packets with
- very large destination UDP port numbers (in two
- passes). Each packet is initially sent with a TTL
- (time to live) of 1. This should cause an ICMP TIME
- EXCEEDED error to be generated by the first routing
- gateway. Then each packet is sent with a TTL of 2.
- This should cause an ICMP TIME EXCEEDED error to be
- generated by the second routing gateway. Then each
- packet is sent with a TTL of 3, and so on. This pro-
- cess continues until an ICMP ECHO REPLY or UDP PORT
- UNREACHABLE is received. This indicates that the
- remote host has been reached and that the trace route
- information is complete.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 120]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- This utility sends one echo packet per second (ICMP,
- UDP or TCP), as well as sending out one trace route
- packet per second. If a transmitted trace route packet
- is returned in less than one second, another trace
- route packet is sent in 100 milliseconds. This could
- cause a significant amount of contention on the local
- network.
-
- BUGS
- None known. Please report any discovered bugs to the
- author at:
- Allen Sturtevant
- National Magnetic Fusion Energy Computer Center
- Lawrence Livermore National Laboratory
- P.O. Box 808; L-561
- Livermore, CA 94550
- Phone : (415) 422-8266
- E-Mail: sturtevant@ccc.nmfecc.gov
-
- LIMITATIONS
- The user is required to have SYSPRV privilege to per-
- form the ICMP Echo and trace route functions. The
- utility will still run with this privilege disabled,
- but only the UDP Echo and TCP Echo information will be
- displayed. This utility is written in C, but unfor-
- tunately it cannot be easily ported over to UNIX since
- many VMS system calls are used and all screen I/O is
- done using the VMS Screen Management Routines.
-
- HARDWARE REQUIRED
- Any network interface supported by TGV Incorporated's
- MultiNet software.
-
- SOFTWARE REQUIRED
- VAX/VMS V5.1+ and TGV Incorporated's MultiNet version
- 2.0.
-
- AVAILABILITY
- For executables only, FTP to the ANONYMOUS account
- (password GUEST) on CCC.NMFECC.GOV (128.55.128.30) and
- GET the following files:
-
- [ANONYMOUS.PROGRAMS.NPRV]NPRV.DOC (ASCII text)
- [ANONYMOUS.PROGRAMS.NPRV]NPRV.EXE (binary)
- [ANONYMOUS.PROGRAMS.NPRV]SAMPLE.IPA (ASCII text)
-
-
-
-
-
- NOCTools2 Working Group [Page 121]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog NSLOOKUP
-
- NAME
- nslookup
-
- KEYWORDS
- status; DNS, BIND; UNIX, VMS; free.
-
- ABSTRACT
- Nslookup is an interactive program for querying
- Internet Domain Name System (DNS) servers. It is
- essentially a user-friendly front end to
- the BIND "resolver" library routines.
-
- This program is useful for converting a hostname
- into an IP address (and vice versa), determining
- the name servers for a domain , listing
- the contents of a domain, displaying any type of
- DNS record, such as MX, CNAME, SOA, etc.,
- diagnosing name server problems.
-
- By default, nslookup will query
- the default name server but you can specify a
- different server on the command line or from a
- configuration file. You can also specify
- different values for the options that control the
- resolver routines.
-
- MECHANISM
- The program formats, sends and receives DNS
- (RFC 1034) queries.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None known.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS, or VMS.
-
-
-
-
-
- NOCTools2 Working Group [Page 122]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- NSLookup is included in the BIND distribution.
-
- Available via anonymous FTP from uunet.uu.net,
- in directory /networking/ip/dns/bind. Available
- with 4.xBSD UNIX and related operating systems.
- For VMS, available as part of TGV MultiNet IP
- software package, as well as Wollongong's WIN/TCP.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 123]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog OSITRACE
-
- NAME
- OSITRACE
-
- KEYWORDS
- traffic; OSI; eavesdrop; UNIX; free.
-
- ABSTRACT
- OSITRACE is a network performance tool that displays
- information about ISO TP4 connections. One line of
- output is displayed for each packet indicating the
- time, source, destination, length, packet type,
- sequence number, credit, and any optional parameters
- contained in the packet. Numerous options are avail-
- able to control the output of OSITRACE.
-
- To obtain packets to analyze, OSITRACE uses Sun
- Microsystems' Network Interface Tap (NIT) in SunOS 3.4,
- 3.5, and 4.0.X. OSITRACE may also obtain data from the
- NETMON utility which is described as another tool
- entry.
-
- In Sun systems, OSITRACE may be easily installed: OSI
- kernel support is not needed, nor is any other form of
- OSI software support.
-
- MECHANISM
- This tool has been designed in such a way that code to
- process different protocol suites may be easily added.
- As such, OSITRACE also has the ability to trace the DOD
- TCP protocols.
-
- CAVEATS
- None.
-
- BUGS
- Bug reports and questions should be addressed to: ie-
- tools@gateway.mitre.org
-
- Requests to join this mailing list: ie-tools-
- request@gateway.mitre.org
-
- Questions and suggestions can also be directed to: Greg
- Hollingsworth, gregh@gateway.mitre.org
-
- LIMITATIONS
- None reported.
-
-
-
- NOCTools2 Working Group [Page 124]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- No restriction.
-
- SOFTWARE REQUIRED
- SunOS 3.4, 3.5, or 4.0.X, or BSD UNIX-like network pro-
- tocols with NETMON installed.
-
- AVAILABILITY
- OSITRACE is copyrighted by the MITRE-Washington Net-
- working Center, but freely distributed "as is." It re-
- quires retention of a copyright text in code derived
- from it. The distribution is available by anonymous
- FTP in pub/pdutrace.tar or pub/pdutrace.tar.Z from
- aelred-3.ie.org.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 125]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog OVERVIEW
-
- NAME
- OverVIEW
-
- KEYWORDS
- manager, status; IP; NMS, SNMP; DOS.
-
- ABSTRACT
- Network and internet monitor; Performance monitor;
- Fully Graphic user interface; Event logging; TFTP boot
- server
-
- MECHANISM
- OverVIEW uses SNMP to query routers, gateways and
- hosts. Also supports SGMP, PING and is committed to
- CMIP/CMOT. The SNMP queries allow dynamic determina-
- tion of configuration and state. Sets of related
- queries allows monitoring of congestion and faults.
- The hardware and software are sold as an integrated
- package.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- 256 nodes, 256 nets
-
- HARDWARE REQUIRED
- 80286, 640K, EGA, mouse.
-
- SOFTWARE REQUIRED
- MS-DOS, OverVIEW, Network kernel, Mouse driver, SNMP
- agents for monitored devices.
-
- AVAILABILITY
- Fully supported product of Proteon, Inc. For more
- information, contact:
- Proteon, Inc. Phone: (508) 898-2800
- 2 Technology Drive Fax: (508) 366-8901
- Westborough, MA 01581 Telex: 928124
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 126]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog PING
-
- NAME
- ping
-
- KEYWORDS
- generator, status; IP; ping; DOS, UNIX, VMS; free.
-
- ABSTRACT
- Ping is perhaps the most basic tool for internet
- management. It verifies that a remote IP implementa-
- tion and the intervening networks and interfaces are
- functional. It can be used to measure round trip
- delay. Numerous versions of the ping program exist.
-
- MECHANISM
- Ping is based on the ICMP ECHO_REQUEST message.
-
- CAVEATS
- If run repeatedly, ping could generate high system
- loads.
-
- BUGS
- None known.
-
- LIMITATIONS
- PC/TCP's ping is the only implementation known support
- both loose and strict source routing. Though some ping
- implementations support the ICMP "record route"
- feature, the usefulness of this option for debugging
- routes is limited by the fact that many gateways do not
- correctly implement it.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- None.
-
- AVAILABILITY
- Ping is widely included in TCP/IP distributions. Pub-
- lic domain versions of ping are available via anonymous
- FTP from uunet.uu.net, in directory bsd-
- sources/src/etc, and from venera.isi.edu, in directory
- pub.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 127]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog PROCESS-TCPWARE-SNMP
-
- NAME
- SNMP agent
-
- KEYWORDS
- alarm, manager, status, traffic; IP; SNMP; VMS;.
-
- ABSTRACT
- The SNMP agent listens for and responds to network
- management requests sent from SNMP-conforming network
- management stations. The SNMP agent also sends SNMP
- traps, under specific conditions, to identified trap
- receivers. SNMP communities and generation of traps
- are fully configurable. The SNMP agent supports all
- MIB-II variables except the EGP group.
-
- MECHANISM
- Network management variables are made available for
- inspection and/or alteration by means of the Simple
- Network Management Protocol (SNMP).
-
- CAVEATS
- None.
-
- BUGS
- No known bugs.
-
- LIMITATIONS
- Does not yet provide the ability for sites to add
- extra MIB definitions.
-
- HARDWARE REQUIRED
- Supported VAX processors.
-
- SOFTWARE REQUIRED
- VMS V4 or later
-
- AVAILABILITY
- The SNMP agent is included in TCPware for VMS, a
- commercial product available under license from:
- Process Software Corporation
- 959 Concord Street
- Framingham, MA 01701
- +1 800 722 7770, +1 508 879 6994 (voice)
- +1 508 879-0042 (FAX) TELEX 517891
- sales@process.com
-
-
-
-
- NOCTools2 Working Group [Page 128]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog PROXYD
-
- NAME
- proxyd -- SNMP proxy agent daemons from SNMP Research.
-
- KEYWORDS
- control, management, status;
- bridge, Ethernet, IP, OSI, ring, star;
- NMS, SNMP;
- UNIX;
- library, sourcelib.
-
- ABSTRACT
- SNMP proxy agents may be used to permit the monitoring
- and controlling of network elements which are otherwise
- not addressable using the SNMP management protocol
- (e.g., a network bridge that implements a proprietary
- management protocol). Similarly, SNMP proxy agents may
- be used to protect SNMP agents from redundant network
- management agents through the use of caches. Finally,
- SNMP proxy agents may be used to implement elaborate
- MIB access policies.
-
- The proxy agent daemon:
-
- - listens for SNMP queries and commands from logically
- remote network management stations,
- - translates and retransmits those as appropriate
- network management queries or cache lookups,
- - listens for and parses the responses,
- - translates the responses into SNMP responses, and
- - returns those responses as SNMP messages to the
- network management station that originated the
- transaction.
-
- The proxy agent daemon also emits SNMP traps to
- identified trap receivers. The proxy agent daemon is
- designed to make the addition of additional vendor-
- specific variables a straight-forward task. The proxy
- application comes complete with source code including a
- powerful set of portable libraries for generating and
- parsing SNMP messages and a set of command line utilities.
-
- MECHANISM
- Network management variables are made available for
- inspection and/or alteration by means of the Simple
- Network Management Protocol (SNMP).
-
-
-
-
- NOCTools2 Working Group [Page 129]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- This application is a template for proxy application
- writers.
-
- Only a few of the many LanBridge 100 variables are
- supported.
-
- HARDWARE REQUIRED
- System from Sun Microsystems, Incorporated.
-
- SOFTWARE REQUIRED
- Sun OS 3.5 or 4.x.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 130]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog PROXYD_SNMP_RESEARCH
-
- NAME
- proxyd -- SNMP proxy agent daemons from SNMP Research.
-
- KEYWORDS
- control, management, status;
- bridge, Ethernet, IP, OSI, ring, star;
- NMS, SNMP;
- UNIX;
- library, sourcelib.
-
- ABSTRACT
- SNMP proxy agents may be used to permit the monitoring
- and controlling of network elements which are otherwise
- not addressable using the SNMP management protocol
- (e.g., a network bridge that implements a proprietary
- management protocol). Similarly, SNMP proxy agents may
- be used to protect SNMP agents from redundant network
- management agents through the use of caches. Finally,
- SNMP proxy agents may be used to implement elaborate
- MIB access policies.
-
- The proxy agent daemon:
-
- - listens for SNMP queries and commands from logically
- remote network management stations,
- - translates and retransmits those as appropriate
- network management queries or cache lookups,
- - listens for and parses the responses,
- - translates the responses into SNMP responses, and
- - returns those responses as SNMP messages to the
- network management station that originated the
- transaction.
-
- The proxy agent daemon also emits SNMP traps to
- identified trap receivers. The proxy agent daemon is
- designed to make the addition of additional vendor-
- specific variables a straight-forward task. The proxy
- application comes complete with source code including a
- powerful set of portable libraries for generating and
- parsing SNMP messages and a set of command line utilities.
-
- MECHANISM
- Network management variables are made available for
- inspection and/or alteration by means of the Simple
- Network Management Protocol (SNMP).
-
-
-
-
- NOCTools2 Working Group [Page 131]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- This application is a template for proxy application
- writers.
-
- Only a few of the many LanBridge 100 variables are
- supported.
-
- HARDWARE REQUIRED
- System from Sun Microsystems, Incorporated.
-
- SOFTWARE REQUIRED
- Sun OS 3.5 or 4.x.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 132]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog QUERY
-
- NAME
- query, ripquery
-
- KEYWORDS
- routing; IP; spoof; UNIX; free.
-
- ABSTRACT
- Query allows remote viewing of a gateway's routing
- tables.
-
- MECHANISM
- Query formats and sends a RIP request or POLL command
- to a destination gateway.
-
- CAVEATS
- Query is intended to be used a a tool for debugging
- gateways, not for network management. SNMP is the pre-
- ferred protocol for network management.
-
- BUGS
- None known.
-
- LIMITATIONS
- The polled gateway must run RIP.
-
- HARDWARE REQUIRED
- No restriction.
-
- SOFTWARE REQUIRED
- 4.3BSD UNIX or related OS.
-
- AVAILABILITY
- Available with routed and gated distributions.
-
- Routed may be obtained via anonymous FTP from
- uunet.uu.net, in file bsd-
- sources/src/network/routed.tar.Z.
-
- Gated may be obtained via anonymous FTP from
- devvax.tn.cornell.edu. Distribution files are in
- directory pub/gated.
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 133]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SAS-CPE
-
- NAME
- SAS/CPE(tm) for Open Systems Software
-
- KEYWORDS
- manager, status;
- bridge, ethernet, FDDI, IP, OSI, NFS;
- X;
- DOS, HP, UNIX;
- library.
-
- ABSTRACT
- SAS/CPE(tm) for Open Systems software is an integrated system designed
- to facilitate the analysis and presentation of computer performance
- and resource utilization data. SAS/CPE software features include:
-
- . Processing of raw computer and network performance data into
- detail-level SAS data sets.
- . Conversion and validation of logged data values to forms
- more useful for display and analysis (e.g., I/O counts
- are converted to I/O rates per second).
- . Numerous sample reports on performance data processed by
- SAS/CPE software.
- . Reduction of logged performance data into daily, weekly,
- monthly or yearly summarized values.
- . Menu-driven interface to the creation and management of multiple
- performance data bases.
- . Menu-driven report designing interface that allows users with no
- programming knowledge to create and manage custom reports from
- their performance data base. No SAS coding is needed for this
- interface.
-
- MECHANISM
- SAS/CPE for Open Systems processes and reports data
- from SNMP and other proprietary monitoring protocols,
- as well as du and accounting.
-
- CAVEATS
- The product is currently in alpha testing.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
-
-
-
-
- NOCTools2 Working Group [Page 134]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- HP, SUN or IBM Workstation
-
- SOFTWARE REQUIRED
- The SAS(r) System Base Software, SAS/GRAPH Software and
- SAS/CPE for Open System Software
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- SAS/CPE for Open Systems Software is available from:
- SAS Institute Inc.
- SAS Campus Drive
- Cary, NC 27513
- Phone 919-677-8000
- FAX 919-677-8123
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Send email to snodjs@mvs.sas.com.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 135]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SNIFFER
-
- NAME
- Sniffer
-
- KEYWORDS
- analyzer, generator, traffic; DECnet, ethernet, IP,
- NFS, OSI, ring, SMTP, star; eavesdrop; standalone.
-
- ABSTRACT
- The Network General Sniffer is a protocol analyzer for
- performing LAN diagnostics, monitoring, traffic genera-
- tion, and troubleshooting. The Sniffer protocol
- analyzer has the capability of capturing every packet
- on a network and of decoding all seven layers of the
- OSI protocol model. Capture frame selection is based
- on several different filters: protocol content at lower
- levels; node addresses; pattern matching (up to 8
- logically-related patterns of 32 bytes each); and des-
- tination class. Users may extend the protocol
- interpretation capability of the Sniffer by writing
- their own customized protocol interpreters and linking
- them to the Sniffer software.
-
- The Sniffer displays network traffic information and
- performance statistics in real time, in user-selectable
- formats. Numeric station addresses are translated to
- symbolic names or manufacturer ID names. Network
- activities measured include frames accepted, Kbytes
- accepted, and buffer use. Each network version has
- additional counters for activities specific to that
- network. Network activity is expressed as
- frames/second, Kbytes/second, or per cent of network
- bandwidth utilization.
-
- Data collection by the Sniffer may be output to printer
- or stored to disk in either print-file or spread-sheet
- format.
-
- Protocol suites understood by the Sniffer include:
- Banyan Vines, IBM Token-Ring, Novell Netware, XNS/MS-
- Net (3Com 3+), DECnet, TCP/IP (including SNMP and
- applications-layer protocols such as FTP, SMTP, and
- TELNET), X Windows (for X version 11), NFS, and several
- SUN proprietary protocols (including mount, pmap, RPC,
- and YP). Supported LANs include: ethernet, Token-ring
- (4Mb and 16Mb versions), ARCNET, StarLAN, IBM PC Net-
- work (Broadband), and Apple Localtalk Network.
-
-
-
- NOCTools2 Working Group [Page 136]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- The Sniffer is a self-contained, portable protocol
- analyzer that require only AC line power and connection
- to a network to operate. Normally passive (except when
- in Traffic Generator mode), it captures images of all
- or of selected frames in a working buffer, ready for
- immediate analysis and display.
-
- The Sniffer is a standalone device. Two platforms are
- available: one for use with single network topologies,
- the other for use with multi-network topologies. Both
- include Sniffer core software, a modified network
- interface card (or multiple cards), and optional proto-
- col interpreter suites.
-
- All Sniffer functions may be remotely controlled from a
- modem-connected PC. Output from the Sniffer can be
- imported to database or spreadsheet packages.
-
- CAVEATS
- In normal use, the Sniffer is a passive device, and so
- will not adversely effect network performance. Perfor-
- mance degradation will be observed, of course, if the
- Sniffer is set to Traffic Generator mode and connected
- to an active network.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- None. The Sniffer is a self-contained unit, and
- includes its own interface card. It installs into a
- network as would any normal workstation.
-
- SOFTWARE REQUIRED
- None.
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 137]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- The Sniffer is available commercially. For information
- on your local representative, call or write:
- Network General Corporation
- 4200 Bohannon Drive
- Menlo Park, CA 94025
- Phone: 415-688-2700
- Fax: 415-321-0855
-
- For acquisition by government agencies, the Sniffer is
- included on the GSA schedule.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 138]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SNMP_DEVELOPMENT_KIT
-
- NAME
- The SNMP Development Kit
-
- KEYWORDS
- manager, status; IP; NMS, SNMP; UNIX; free, sourcelib.
-
- ABSTRACT
- The SNMP Development Kit comprises C Language source
- code for a programming library that facilitates access
- to the management services of the SNMP (RFC 1098).
- Sources are also included for a few simple client
- applications whose main purpose is to illustrate the
- use of the library. Example client applications query
- remote SNMP agents in a variety of modes, and generate
- or collect SNMP traps. Code for an example SNMP agent
- that supports a subset of the Internet MIB (RFC 1066)
- is also included.
-
- MECHANISM
- The Development Kit facilitates development of SNMP-
- based management applications -- both clients and
- agents. Example applications execute SNMP management
- operations according to the values of command line
- arguments.
-
- CAVEATS
- None.
-
- BUGS
- Fixed in the next release.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- The SNMP library source code is highly portable and
- runs on a wide range of platforms.
-
- SOFTWARE REQUIRED
- The SNMP library source code has almost no operating
- system dependencies and runs in a wide range of
- environments. Certain portions of the example SNMP
- agent code are specific to the 4.3BSD implementation of
- the UNIX system for the DEC MicroVAX.
-
-
-
-
-
- NOCTools2 Working Group [Page 139]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- The Development Kit is available via anonymous FTP from
- host allspice.lcs.mit.edu. The copyright for the
- Development Kit is held by the Massachusetts Institute
- of Technology, and the Kit is distributed without
- charge according to the terms set forth in its code and
- documentation. The distribution takes the form of a
- UNIX tar file.
-
- Bug reports, questions, suggestions, or complaints may
- be mailed electronically to snmp-dk@ptt.lcs.mit.edu,
- although no response in any form is guaranteed. Dis-
- tribution via UUCP mail may be arranged by contacting
- the same address. Requests for hard-copy documentation
- or copies of the distribution on magnetic media are
- never honored.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 140]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SNMP_Libraries_SNMP_RESEARCH
-
- NAME
- SNMP Libraries and Utilities from SNMP Research.
-
- KEYWORDS
- alarm, control, manager, map, security, status;
- bridge, DECnet, Ethernet, FDDI, IP, OSI, ring, star;
- NMS, SNMP;
- DOS, UNIX, VMS;
- sourcelib.
-
- ABSTRACT
- The SNMP Libraries and Utilities serve two purposes:
-
- 1) to act as building blocks for the construction of
- SNMP-based agent and manager applications; and
-
- 2) to act as network management tools for network
- fire fighting and report generation.
-
- The libraries perform ASN.1 parsing and generation tasks
- for both network management station applications and
- network management agent applications. These libraries
- hide the details of ASN.1 parsing and generation from
- application writers and make it unnecessary for them to
- be expert in these areas. The libraries are very robust
- with considerable error checking designed in. The
- several command line utilities include applications for
- retrieving one or many variables, retrieving tables, or
- effecting commands via the setting of remote network
- management variables.
-
- MECHANISM
- The parsing is performed via recursive descent methods.
- Messages are passed via the Simple Network Management
- Protocol (SNMP).
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- The monitored and managed nodes must implement the SNMP
- over UDP per RFC 1157 or must be reachable via a proxy
- agent.
-
-
-
- NOCTools2 Working Group [Page 141]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- This software has been ported to numerous platforms
- including workstations, general-purpose timesharing
- systems, and embedded hardware in intelligent network
- devices such as repeaters, bridges, and routers.
-
- SOFTWARE REQUIRED
- C compiler, TCP/IP library.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 142]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SNMP_PACKAGED_AGENT_SNMP_RESEARCH
-
- NAME
- SNMP Packaged Agent System -- an SNMP host/gateway
- agent daemon including a complete protocol stack and
- runtime environment required to support an SNMP Agent
- from SNMP Research.
-
- KEYWORDS
- control, manager, status;
- bridge, Ethernet, FDDI, IP, OSI, ring, star;
- NMS, SNMP;
- DOS, standalone, UNIX;
- sourcelib.
-
- ABSTRACT
- The snmpd agent daemon listens for and responds to
- network management queries and commands from logically
- remote network management stations. The agent daemon
- also emits SNMP traps to identified trap receivers.
- The agent daemon is designed to make the addition of
- additional vendor-specific variables a
- straight-forward task. The snmpd application comes
- complete with source code including a powerful set of
- portable libraries for generating and parsing SNMP
- messages and a set of command line utilities.
-
- The Packaged Agent System is designed to aid the
- hardware manufacturer who is not experienced with the
- TCP/IP protocol suite. A lightweight, non-preemptive
- scheduler/tasking system for faster execution and less
- impact on slow CPUs is included in the package.
- Development environment is either MS DOS or UNIX.
-
- MECHANISM
- Network management variables are made available for
- inspection and/or alteration by means of the Simple
- Network Management Protocol (SNMP).
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
-
-
-
- NOCTools2 Working Group [Page 143]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HARDWARE REQUIRED
- The Motorola 68XXX and the Intel 8088 and X86
- platforms are fully supported. Other platforms can be
- supported. Contact SNMP Research for details.
-
- This software has been ported to numerous platforms
- including workstations, general-purpose timesharing
- systems, and embedded hardware in intelligent network
- devices such as repeaters, bridges, and routers.
-
- SOFTWARE REQUIRED
- C compiler.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 144]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SNMPD_SNMP_RESEARCH
-
- NAME
- snmpd -- an SNMP host/gateway agent daemon from SNMP
- Research.
-
- KEYWORDS
- control, mananger, status;
- bridge, Ethernet, FDDI, IP, OSI, ring, star;
- NMS, SNMP;
- DOS, UNIX;
- sourcelib.
-
- ABSTRACT
- The snmpd agent daemon listens for and responds to
- network management queries and commands from logically
- remote network management stations. The agent daemon
- also emits SNMP traps to identified trap receivers. The
- agent daemon is architected to make the addition of
- additional vendor-specific variables a straight-forward
- task. The snmpd application comes complete with source
- code including a powerful set of portable libraries for
- generating and parsing SNMP messages and a set of
- command line utilities.
-
- MECHANISM
- Network management variables are made available for
- inspection and/or alteration by means of the Simple
- Network Management Protocol (SNMP).
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Only operating system variables available without
- source code modifications to the operating system and
- device device drivers are supported.
-
- HARDWARE REQUIRED
- This software has been ported to numerous platforms
- including workstations, general-purpose timesharing
- systems, and embedded hardware in intelligent network
- devices such as repeaters, bridges, and routers.
-
-
-
-
-
- NOCTools2 Working Group [Page 145]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- C compiler.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 146]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SPIDERMONITOR
-
- NAME
- SpiderMonitor P220, K220 and
- SpiderAnalyzer P320, K320
-
- KEYWORDS
- alarm, analyzer, generator, traffic; DECnet, ethernet,
- IP, OSI; eavesdrop; standalone; sourcelib.
-
- ABSTRACT
- The SpiderMonitor and SpiderAnalyzer are protocol
- analyzers for performing ethernet LAN diagnostics, mon-
- itoring, traffic generation, and troubleshooting. The
- SpiderMonitor has the capability of capturing every
- packet on a network and of decoding the first four
- layers of the OSI protocol model. The SpiderAnalyzer
- has additional software for decoding higher protocol
- layers. Protocol suites understood: TCP/IP (including
- SNMP and applications-layer protocols), OSI, XNS, DEC-
- net and IPX. User-definable decodes can be written in
- 'C' with the Microsoft version 5.0 'C' compiler. A
- decode guide is provided.
-
- The SpiderAnalyzer supports multiple simultaneous
- filters for capturing packets using predefined patterns
- and error states. Filter patterns can also trigger on
- NOT matching 1 or more filters, an alarm, or a speci-
- fied time.
-
- The SpiderAnalyzer can also employ TDR (Time Domain
- Reflectometry) to find media faults, open or short cir-
- cuits, or transceiver faults. It can transmit OSI,
- XNS, and Xerox link-level echo packets to user-
- specified stations, performs loop round tests.
-
- In traffic generation mode, the SpiderAnalyzer has the
- ability to generate packets at random intervals of ran-
- dom lengths or any combination of random or fixed
- interval or length, generation of packets with CRC
- errors, or packets that are too short, or packets that
- are too long.
-
- Output from the SpiderMonitor/Analyzer can be imported
- to database or spreadsheet packages.
-
-
-
-
-
-
- NOCTools2 Working Group [Page 147]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- The SpiderMonitor and Spider Analyzer are available as
- stand-alone, IBM PC compatible packages based upon a
- Compaq III portable system, or as a plug-in boards for
- any IBM XT/AT compatible machine. The model 220 (Spi-
- derMonitor) systems provide a functional base suited
- for most network management needs. The model 320 (Spi-
- derAnalyzer) systems provide extended functionality in
- the development mode and traffic generation mode as
- well more filtering capabilities than the 220 models.
-
- CAVEATS
- Traffic generation will congest an operational ether-
- net.
-
- BUGS
- None known.
-
- LIMITATIONS
- Monitoring of up to 1024 stations and buffering of up
- to 1500 packets. The model 220 provides for 3 filters
- with a filter depth of 46 bytes. The model 320 pro-
- vides for 4 filters and a second level of filtering
- with a filter depth of 64 bytes.
-
- HARDWARE REQUIRED
- PX20s are self contained, the KX20s require an IBM
- PC/XT-AT compatible machine with 5 megabytes of hard
- disk storage and the spare slot into which the board
- kit is plugged.
-
- SOFTWARE REQUIRED
- None. The SpiderAnalyzer requires the Microsoft 'C'
- Compiler, Version 5.0 for writing user defined decodes.
-
- AVAILABILITY
- The SpiderMonitor/Analyzer is available commercially.
- For information on your local representative, call or
- write:
- Spider Systems, Inc.
- 12 New England Executive Park
- Burlington, MA 01803
- Telephone: 617-270-3510
- FAX: 617-270-9818
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 148]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SPIMS
-
- NAME
- SPIMS -- the Swedish Institute of Computer Science
- (SICS) Protocol Implementation Measurement
- System tool.
-
- KEYWORDS
- benchmark, debugger; IP, OSI; spoof; UNIX.
-
- ABSTRACT
- SPIMS is used to measure the performance of protocol
- and "protocol-like" services including response time
- (two-way delay), throughput and the time to open and
- close connections. It has been used to:
-
- o benchmark alternative protocol implementations,
-
- o observe how performance varies when parameters in
- specific implementations have been varied (i.e.,
- to tune parameters).
-
- SPIMS currently has interfaces to the DoD Internet Pro-
- tocols: UDP, TCP, FTP, SunRPC, the OSI protocols from
- the ISODE 4.0 distribution package: FTAM, ROSE, ISO TP0
- and to Sunlink 5.2 ISO TP4 as well as Stanford's VMTP.
- Also available are a rudimentary set of benchmarks,
- stubs for new protocol interfaces and a user manual.
-
- For an example of the use of SPIMS to tune protocols,
- see:
- Nordmark & Cheriton, "Experiences from VMTP: How
- to achieve low response time," IFIP WG6.1/6.4:
- Protocols for High-Speed Networks, May 1989,
- Zurich. To be published.
-
- For an example of how SPIMS can be used to benchmark
- protocols, see:
-
- Gunningberg, Bjorkman, Nordmark, Sjodin, Pink &
- Stromqvist "Application Protocols and Performance
- Benchmarks", IEEE Communications Magazine, June
- 1989, Vol. 27, No.6, pp 30-36.
-
- Sjodin, Gunningberg, Nordmark, & Pink, "Towards
- Protocol Benchmarks', IFIP WG6.1/6.4 Protocols
- for High-Speed Networks, May 1989, Zurich, pp
- 57-67
-
-
-
- NOCTools2 Working Group [Page 149]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- SPIMS runs as user processes and uses a TCP connection
- for measurement set-up. Measurements take place
- between processes over the measured protocol. SPIMS
- generates messages and transfers them via the measured
- protocol service according to a user-supplied specifi-
- cation. SPIMS has a unique measurement specification
- language that is used to specify a measurement session.
- In the language there are constructs for different
- application types (e.g., bulk data transfer), for
- specifying frequency and sequence of messages, for dis-
- tribution over message sizes and for combining basic
- specifications. These specifications are independent
- of both protocols and protocol implementations and can
- be used for benchmarking. For more details on the
- internals of SPIMS, see:
-
- Nordmark & Gunningberg, "SPIMS: A Tool for Protocol
- Implementation Performance Measurements" Proc. of 13:th
- Conf. on Local Computer Networks, Minneapolis 1989, pp
- 222-229.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- SPIMS is implemented on UNIX, including SunOS 4.,
- 4.3BSD UNIX, DN (UNIX System V, with extensions) and
- Ultrix 2.0/3.0. It requires a TCP connection for meas-
- urement set-up. No kernel modifications or any modifi-
- cations to measured protocols are required.
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 150]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- SPIMS is not in the public domain and the software is
- covered by licenses. Use of the SPIMS software
- represents acceptance of the terms and conditions of
- the licenses.
- The licenses are enclosed in the distribution package.
- Licenses and SPIMS cover letter can also be obtained
- via an Internet FTP connection without getting the whole
- software. The retrieval procedure is identical to the
- below university distribution via FTP. The file to
- retrieve is pub/spims-dist/licenses.tar.Z
-
- There are two different distribution classes depending on
- requesting organization:
-
- 1. Universities and non-profit organizations.
-
- To these organizations, SPIMS source code is distributed
- free of charge. There are two ways to get the software:
-
- 1. FTP.
- If you have an Internet FTP connection, you
- can use anonymous FTP to sics.se
- [192.16.123.90], and retrieve the file
- pub/spims-dist/dist910304.tar.Z
- (this is a .6MB compressed tar image) in
- BINARY mode. Log in as user anonymous and at
- the password prompt, use your complete
- electronic mail address.
-
- 2. On a Sun 1/4-inch cartridge tape.
- For mailing, a handling fee of US$150.00 will be
- charged. Submit a bank check with the request.
- Do not send tapes or envelopes.
-
- 2. Commercial organizations.
-
- These organizations can chose between a license for
- commercial use, or a license for internal research
- only and no commercial use whatsoever.
-
- For internal research use only:
-
- The SPIMS source code is distributed for a one
- time fee of US$500.00. Organizations
- interested in the research prototype need to
- contact us via e-mail and briefly motivate why
- they qualify (non-commercial use) for the
-
-
-
- NOCTools2 Working Group [Page 151]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- research prototype.
- They will thereafter get a permission to
- obtain a copy from the same distribution
- source as for universities.
-
- Commercial use:
-
- A commercial version of SPIMS will eventually
- be distributed and supported by a commercial
- partner. nIn the meantime we will distribute
- the research prototype (source code) to
- interested organizations without any guaranty
- or support. Contact SICS for further
- information.
-
- For more information about the research prototype
- distribution and about a commercial license, contact:
-
- Swedish Institute of Computer Science
- Att: Birgitta Klingenberg
- P.O. Box 1263
- S-164 28 Kista
- SWEDEN
-
- e-address: spims@sics.se
- Phone: +46-8-7521500, Fax: +46-8-7517230
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Bengt Ahlgren
- Swedish Institute of Computer Science
- Box 1263
- S-164 28 KISTA, SWEDEN
-
- Email: bengta@sics.se
- Tel: +46 8 752 1562 (direct)
- or +46 8 752 1500
- Fax: +46 8 751 7230
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 152]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog SPRAY_SUN
-
- NAME
- spray
-
- KEYWORDS
- benchmark, generator; IP; ping; UNIX.
-
- ABSTRACT
- Spray is a traffic generation tool that generates RPC
- or UDP packets, or ICMP Echo Requests. The packets are
- sent to a remote procedure call application at the des-
- tination host. The count of received packets is
- retrieved from the remote application after a certain
- number of packets have been transmitted. The differ-
- ence in packets received versus packets sent represents
- (on a LAN) the packets that the destination host had to
- drop due to increasing queue length. A measure of
- throughput relative to system speed and network load
- can thus be obtained.
-
- MECHANISM
- See above.
-
- CAVEATS
- Spray can congest a network.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- SunOS
-
- AVAILABILITY
- Supplied with SunOS.
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 153]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog TCPDUMP
-
- NAME
- tcpdump
-
- KEYWORDS
- traffic; ethernet, IP, NFS; UNIX, VMS; free.
-
- ABSTRACT
- Tcpdump can interpret and print headers for the follow-
- ing protocols: ethernet, IP, ICMP, TCP, UDP, NFS, ND,
- ARP/RARP, AppleTalk. Tcpdump has proven useful for
- examining and evaluating the retransmission and window
- management operations of TCP implementations.
-
- MECHANISM
- Much like etherfind, tcpdump writes a log file of the
- frames traversing an ethernet interface. Each output
- line includes the time a packet is received, the type
- of packet, and various values from its header.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Public domain version requires a kernel patch for
- SunOS. TCPware for VMS - currently interprets headers
- for IP, TCP, UDP, and ICMP only.
-
- HARDWARE REQUIRED
- Any Ultrix system (VAX or DEC RISC hardware)
-
- SOFTWARE REQUIRED
- Ultrix release 4.0 or later. For Ultrix 4.1, may
- require the patched "if_ln.o" kernel module, available
- from Digital's Customer Support Center.
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 154]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- Available, though subject to copyright restrictions,
- via anonymous FTP from ftp.ee.lbl.gov. The source and
- documentation for the tool is in compressed tar format,
- in file tcpdump.tar.Z. Also available from
- spam.itstd.sri.com, in directory pub. For VMS hosts
- with DEC ethernet controllers, available as part of TGV
- MultiNet IP software package and TCPware for VMS from
- Process Software Corporation.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 155]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog TCPLOGGER
-
- NAME
- tcplogger
-
- KEYWORDS
- traffic; IP; eavesdrop; UNIX; free.
-
- ABSTRACT
- Tcplogger consists of modifications to the 4.3BSD UNIX
- source code, and a large library of post-processing
- software. Tcplogger records timestamped information
- from TCP and IP packets that are sent and received on a
- specified connection. For each TCP packet, information
- such as sequence number, acknowledgement sequence
- number, packet size, and header flags is recorded. For
- an IP packet, header length, packet length and TTL
- values are recorded. Customized use of the TCP option
- field allows the detection of lost or duplicate pack-
- ets.
-
- MECHANISM
- Routines of 4.3BSD UNIX in the netinet directory have
- been modified to append information to a log in memory.
- The log is read continuously by a user process and
- written to a file. A TCP option has been added to
- start the logging of a connection. Lots of post-
- processing software has been written to analyze the
- data.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- To get a log at both ends of the connection, the modi-
- fied kernel should be run at both the hosts.
-
- All connections are logged in a single file, but
- software is provided to filter out the record of a sin-
- gle connection.
-
- HARDWARE REQUIRED
- No restrictions.
-
-
-
-
-
- NOCTools2 Working Group [Page 156]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- 4.3BSD UNIX (as modified for this tool).
-
- AVAILABILITY
- Free, although a 4.3BSD license is required. Contact
- Olafur Gudmundsson (ogud@cs.umd.edu).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 157]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog TOKENVIEW_PROTEON
-
- NAME
- TokenVIEW
-
- KEYWORDS
- control, manager, status; ring; NMS, proprietary; DOS.
-
- ABSTRACT
- Network Management tool for 4/16 Mbit IEEE 802.5 Token
- Ring Networks. Monitors active nodes and ring errors.
- Maintains database of nodes, wire centers and their
- connections. Separate network management ring allows
- remote configuration of wire centers.
-
- MECHANISM
- A separate network management ring used with Proteon
- Intelligent Wire Centers allows wire center configura-
- tion information to be read and modified from a single
- remote workstation. A log of network events used with
- a database contain nodes, wire centers and their con-
- nections, facilitates tracking and correction of net-
- work errors. Requires an "E" series PROM, sold with
- package.
-
- CAVEATS
- Currently, only ISA bus cards support the required E
- series PROM.
-
- BUGS
- None known.
-
- LIMITATIONS
- 256 nodes, 1 net.
-
- HARDWARE REQUIRED
- 512K RAM, CGA or better, hard disk, mouse supported.
-
- SOFTWARE REQUIRED
- MS-DOS, optional mouse driver
-
- AVAILABILITY
- Fully supported product of Proteon, Inc. Previously
- sold as Advanced Network Manager (ANM). For more in-
- formation, contact:
- Proteon, Inc. Phone: (508) 898-2800
- 2 Technology Drive Fax: (508) 366-8901
- Westborough, MA 01581 Telex: 928124
-
-
-
- NOCTools2 Working Group [Page 158]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog TRACEROUTE
-
- NAME
- traceroute
-
- KEYWORDS
- routing; IP; ping; UNIX, VMS; free.
-
- ABSTRACT
- Traceroute is a tool that allows the route taken by
- packets from source to destination to be discovered.
- It can be used for situations where the IP record route
- option would fail, such as intermediate gateways dis-
- carding packets, routes that exceed the capacity of an
- datagram, or intermediate IP implementations that don't
- support record route. Round trip delays between the
- source and intermediate gateways are also reported
- allowing the determination of individual gateways con-
- tribution to end-to-end delay.
-
- Enhanced versions of traceroute have been developed
- that allow specification of loose source routes for
- datagrams. This allows one to investigate the return
- path from remote machines back to the local host.
-
- MECHANISM
- Traceroute relies on the ICMP TIME_EXCEEDED error
- reporting mechanism. When an IP packet is received by
- an gateway with a time-to-live value of 0, an ICMP
- packet is sent to the host which generated the packet.
- By sending packets to a destination with a TTL of 0,
- the next hop can be identified as the source of the
- ICMP TIME EXCEEDED message. By incrementing the TTL
- field the subsequent hops can be identified. Each
- packet sent out is also time stamped. The time stamp
- is returned as part of the ICMP packet so a round trip
- delay can be calculated.
-
- CAVEATS
- Some IP implementations forward packets with a TTL of
- 0, thus escaping identification. Others use the TTL
- field in the arriving packet as the TTL for the ICMP
- error reply, which delays identification.
-
- Sending datagrams with the source route option will
- cause some gateways to crash. It is considered poor
- form to repeat this behavior.
-
-
-
-
- NOCTools2 Working Group [Page 159]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- BUGS
- None known.
-
- LIMITATIONS
- Most versions of UNIX have errors in the raw IP code
- that require kernel mods for the standard version of
- traceroute to work. A version of traceroute exists
- that runs without kernel mods under SunOS 3.5 (see
- below), but it only operates over an ethernet inter-
- face.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS, or VMS.
-
- AVAILABILITY
- Available by anonymous FTP from ftp.ee.lbl.gov, in file
- traceroute.tar.Z. It is also available from
- uc.msc.umn.edu.
-
- A version of traceroute that supports Loose Source
- Record Route, along with the source code of the
- required kernel modifications and a Makefile for
- installing them, is available via anonymous FTP from
- zerkalo.harvard.edu, in directory pub, file
- traceroute_pkg.tar.Z.
-
- A version of traceroute that runs under SunOS 3.5 and
- does NOT require kernel mods is available via anonymous
- FTP from dopey.cs.unc.edu, in file
- ~ftp/pub/traceroute.tar.Z.
-
- For VMS, traceroute is available as part of TGV Mul-
- tiNet IP software package.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 160]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog TRPT
-
- NAME
- TRPT -- transliterate protocol trace
-
- KEYWORDS
- traffic; IP; eavesdrop; UNIX; free.
-
- ABSTRACT
- TRPT displays a trace of a TCP socket events. When no
- options are supplied, TRPT prints all the trace records
- found in a system, grouped according to TCP connection
- protocol control block (PCB).
-
- An example of TRPT output is:
-
- 38241 ESTABLISHED:input
- [e0531003..e0531203)@6cc5b402(win=4000)<ACK> -> ESTA-
- BLISHED
- 38241 ESTABLISHED:user RCVD -> ESTABLISHED
- 38266 ESTABLISHED:output
- 6cc5b402@e0531203(win=4000)<ACK> -> ESTABLISHED
- 38331 ESTABLISHED:input
- [e0531203..e0531403)@6cc5b402(win=4000)<ACK,FIN,PUSH>
- -> CLOSE_WAIT
- 38331 CLOSE_WAIT:output
- 6cc5b402@e0531404(win=3dff)<ACK> -> CLOSE_WAIT
- 38331 CLOSE_WAIT:user RCVD -> CLOSE_WAIT
- 38343 LAST_ACK:output
- 6cc5b402@e0531404(win=4000)<ACK,FIN> -> LAST_ACK
- 38343 CLOSE_WAIT:user DISCONNECT -> LAST_ACK
- 38343 LAST_ACK:user DETACH -> LAST_ACK
-
- MECHANISM
- TRPT interrogates the buffer of TCP trace records that
- is created when a TCP socket is marked for debugging.
-
- CAVEATS
- Prior to using TRPT, an analyst should take steps to
- isolate the problem connection and find the address of
- its protocol control blocks.
-
- BUGS
- None reported.
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 161]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LIMITATIONS
- A socket must have the debugging option set for TRPT to
- operate. Another problem is that the output format of
- TRPT is difficult.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS.
-
- AVAILABILITY
- Included with BSD and SunOS distributions. Available
- via anonymous FTP from uunet.uu.net, in file bsd-
- sources/src/etc/trpt.tar.Z.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 162]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog TTCP
-
- NAME
- TTCP
-
- KEYWORDS
- benchmark, generator; IP; ping; UNIX, VMS; free.
-
- ABSTRACT
- TTCP is a traffic generator that can be used for test-
- ing end-to-end throughput. It is good for evaluating
- TCP/IP implementations.
-
- MECHANISM
- Cooperating processes are started on two hosts. The
- open a TCP connection and transfer a high volume of
- data. Delay and throughput are calculated.
-
- CAVEATS
- Will greatly increase system load.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- No restrictions.
-
- SOFTWARE REQUIRED
- BSD UNIX or related OS, or VMS.
-
- AVAILABILITY
- Source for BSD UNIX is available via anonymous FTP from
- vgr.brl.mil, in file ftp/pub/ttcp.c, and from sgi.com,
- in file sgi/src/ttcp.c. A version of TTCP has also
- been submitted to the USENET news group
- comp.sources.unix. For VMS, ttcp.c is included in the
- MultiNet Programmer's Kit, a standard feature of TGV
- MultiNet IP software package.
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 163]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog UNISYS-PARAMAX
-
- NAME
- Paramax Network Security Server
-
- KEYWORDS
- alarm, control, manager, security, status;
- ethernet, FDDI, IP; X; UNIX.
-
- ABSTRACT
- The Paramax Network Security Server (NSS) is a
- security officer's tool for centralized security
- management of TCP/IP-based networks. The NSS provides
- capability for collection, on-line storage,
- maintenance, and correlation of audit data from hosts,
- workstations, servers, and network devices. Through
- the X window based user interface, a security officer
- can review and analyze this audit data at the NSS,
- select and request filtered portions of host audit
- data, and receive and analyze security alerts from
- across the network. The NSS supports centralized
- access control of network resources through its
- capability to create and update user and host access
- permissions data. The user access permissions data
- identifies network addresses that each user is
- permitted to access. The host access permissions data
- identifies network addresses between which
- communication is permitted. The NSS supports
- centralized management of user authentication data
- (user IDs and passwords) and other user data for use
- by hosts, workstations, and servers in the network.
- It generates pseudo-random pronounceable passwords for
- selection and assignment to users by the security officer.
-
- The NSS deadman timer locks the NSS screen or logs the
- security officer off the NSS after periods of
- inactivity. A biometric authentication device is
- optional for rigorous fingerprint authentication of
- users at the NSS, and logins to the NSS itself are
- permitted only at the console. The NSS currently
- provides centralized security management for a System High
- Network. It is being upgraded for a Compartmented Mode
- environment.
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 164]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- The NSS uses the Audit Information Transfer Protocol
- (AITP) for the transfer of security alerts and audit
- data. AITP is NOT proprietary, and the specification
- is available from the address listed below. Access to
- the NSS audit database is provided via the Structured
- Query Language (SQL).
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Hardware required is a Sun 4 (SPARCStation) with a color
- monitor, at least 600 MB disk, and 150 MB 1/4"
- cartridge tape drive.
-
- SOFTWARE REQUIRED
- SunOS Version 4.1.1 running the Sun OpenWindows X
- windowing environment and the SYBASE Relational Data
- Base Management System.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- Commercially available from:
- Paramax Systems Corporation
- 5151 Camino Ruiz
- Camarillo, California 93011-6004
- 805-987-6811
- Peter Vazzana
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- Paramax Systems Corporation
- 5151 Camino Ruiz
- Camarillo, California 93011-6004
- 805-987-6811
- Nina Lewis <nina@cam.paramax.com>
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 165]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog WOLLONGONG-MANAGER
-
- NAME
- Management Station, Release 3.0
-
- KEYWORDS
- manager; ; snmp, x; sun, dec, dos;.
-
- ABSTRACT
- Management Station is a network management software
- product that supports SNMP. Release 3.0 implements a
- distributed network management architecture that helps
- solve the scalability and reliability limitations of
- using a single cpu for all SNMP management tasks.
- Additionally, there are many applications provided
- that are all user-configurable. The following
- applications and their functionality is listed below:
-
- General Info:
-
- X Windows, 11.4 based implemented with OSF/Motif 1.1.1
- toolkit. X Windows interface for all configuration
- files. Most applications have "verbose" mode for
- display of SNMP PDU traffic. On-line help and
- Reference manual pages. ANSI C compliant.
-
- Network Management Daemon:
-
- Responsible for device discovery, trap/alarm
- management and fault monitoring for the network map.
- Connection with other distributed daemons and any
- connected stations is accomplished with SNMP/TCP.
- Configured via Manager MIB; also incorporates SMUX MIB
- (RFC 1227). Sends any information to INGRES, Oracle
- or Sybase via an ESQL interface. User-defined actions
- include: send alarm to map; send info to flat file;
- execute ESQL command; call any UNIX system command;
- forward traps and filter user-defined alarms.
- User-defined alarms can use any boolean expression and
- MIB variable expressions can be combined with AND/OR
- statements.
-
- MIB Compiler
-
- ASN.1 MIB compiler with X Windows interface. Accepts
- RFC 1155 and 1212 format. Most vendor-specific MIBs
- and proposed Internet standard MIBs already included.
-
-
-
-
- NOCTools2 Working Group [Page 166]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Network Map
-
- Comprehensive network monitoring map with click and
- drag interface, hiearchical and virtual views.
- Toolkit and preferences applications, device
- discovery. Uses /etc/hosts file, NIS or DNS for
- device resolution. Background pixmapping capability,
- user-definable menu bar, network manager and console
- operator modes via UNIX group permissions. Multiple
- map use without limitation.
-
- MIB Form and MIB Form Editor
-
- User-designed, X-based SNMP applications. Alias for
- MIB variables and interprets returned values. GET
- NEXT and SET capability. User-defined polling and
- multi-device [agent] capability. Configured via X
- interface.
-
- MIB Chart and MIB Chart Editor
-
- Choice of strip chart, packed strip chart or bar
- graphs. User-specified polling interval, MIB
- variable(s) or MIB expressions using arithmetic
- operands. Plot actual value, delta or delta/interval.
- Plot multiple MIB expressions from multiple agents
- simultaneously. X Windows interface. Pause polling
- and grid options.
-
- MIB Tool
-
- X Windows application for the general viewing and
- 'walking' of MIB trees. GET NEXT and SET options.
- Window for viewing RFC 1212 MIB definitions. Command
- line interface option.
-
- Application Programming Interface
-
- Complete set of APIs for developers to write SNMP
- applications in character mode or X Windows.
-
- MECHANISM
- Management Station uses SNMP and ICMP Echo Request to
- monitor and control SNMP Agents. Network management
- daemon implements Wollongong's Manager MIB, SNMP over
- TCP and the SMUX protocol.
-
-
-
-
-
- NOCTools2 Working Group [Page 167]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- CAVEATS
- none.
-
- BUGS
- See Product Release Notice.
-
- LIMITATIONS
- Limitations on number of management agents and network
- management daemons not known at this time.
-
- HARDWARE REQUIRED
- Sun SPARC workstations and servers
- DEC DECstations and DECsystems
- Motorola MPC (Delta 8000 series)
- 3/486 PC and PC-compatible
-
- 16 MB RAM
- n20 MB free disk space for installation
- Color monitor strongly recommended
-
- SOFTWARE REQUIRED
- SunOS 4.1-1 or greater & OpenWindows 2.0 or greater (SUN)
- X Windows, 11.4 or greater
- RISC ULTRIX 4.1 or greater (DEC)
- R32V2 (Motorola)
- Open Desktop 1.1 or greater (3/486)
-
- Provided on 1/4" cartridge, TK-50 or 3 1/2" diskettes,
- as appropriate, in cpio format.
-
- AVAILABILITY
- A commercial product of:
-
- The Wollongong Group, Inc.
- 1129 San Antonio Rd
- Palo Alto, CA. 94303
- ph.: (800) 962 - 8649 (in California)
- (800) 872 - 8649 (outside California)
- fax: (415) 962 - 0286
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 168]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog XNETDB
-
- NAME
- Xnetdb
-
- KEYWORDS
- database, manager, map, monitoring, status; IP; Ping,
- SNMP, Unix, X; free.
-
- ABSTRACT
- Xnetdb is a network monitoring tool based on X Windows
- and SNMP which also has integrated database and
- statistic viewing capabilities. Xnetdb will determine
- and display the status of routers and circuits it has
- been told to monitor by querying the designated sites
- and displaying the result. It can also query the
- status of certain designated SNMP variables, such as a
- default route for an important router. Additionally,
- it also has integrated database functionality in that
- it can display additional information about a site or
- circuit such as the equipment at the site, the contact
- person(s) for the site, and other useful information.
- Finally it can gather designated statistical
- information about a circuit and display it on demand.
-
- MECHANISM
- Xnetdb uses SNMP or ping to monitor things which its
- configured to monitor. It dynamically builds a
- network map on its display by querying entities and
- obtaining IP addresses and subnet masks. A
- configuration file tells xnetdb which IP hosts you
- want to monitor.
-
- CAVEATS
- While "ping" can be used to monitor hosts, more useful
- results are obtained using SNMP.
-
- BUGS
- Bugs and other assorted topics are discussed on the
- xnetdb mailing list. To join, send a note to
- "xnetdb-request@oar.net".
-
- LIMITATIONS
- None.
-
- HARDWARE REQUIRED
- No restrictions.
-
-
-
-
- NOCTools2 Working Group [Page 169]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SOFTWARE REQUIRED
- Most any variety of UNIX plus X-Windows and/or
- OpenWindows.
-
- AVAILABILITY
- Available via anonymous ftp from ftp.oar.net
- (currently 131.187.1.102) in the directory /pub/src.
- Special arrangements can be made for sites without
- direct IP access by sending a note to
- "xnetdb-request@oar.net". There are minimal licensing
- restrictions - these are detailed within the package.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 170]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog XNETMON_SNMP_RESEARCH
-
- NAME
- XNETMON -- an X windows based SNMP network management
- station from SNMP Research.
-
- KEYWORDS
- alarm, benchmark, control, debugger, manager, map,
- reference, security, status, traffic;
- bridge, DECnet, Ethernet, FDDI, IP, OSI, ring, star;
- NMS, Ping, SNMP, X;
- UNIX;
- Sourcelib.
-
- ABSTRACT
- The XNETMON application implements a powerful network
- management station based on the X window system.
- XNETMON's network management tools for configuration,
- performance, security, and fault management have been
- used successfully with a wide assortment of wide- and
- local-area-network topologies and medias.
- Multiprotocol devices are supported
- including those using TCP/IP, DECnet, and OSI
- protocols.
-
- Some features of XNETMON's network management tools include:
-
- o Fault management tool displays a map of the network
- configuration with node and link state indicated
- in one of several colors to indicate current status;
- o Configuration management tool may be used to edit the
- network management information base stored in the
- NMS to reflect changes occurring in the network;
- o Graphs and tabular tools for use in fault and performance
- management (e.g. XNETPERFMON);
- o Mechanisms by which additional variables, such as vendor-
- specific variables, may be added;
- o Alarms may be enabled to alert the operator of events
- occurring in the network;
- o Events are logged to disk;
- o Output data may be transferred via flat files for
- additional report generation by a variety of
- statistical packages.
-
- The XNETMON application comes complete with source
- code including a powerful set of portable libraries
- for generating and parsing SNMP messages.
-
-
-
-
- NOCTools2 Working Group [Page 171]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- MECHANISM
- XNETMON is based on the Simple Network Management
- Protocol (SNMP). Polling is performed via the
- powerful SNMP get-next operator and the SNMP get
- operator. Trap-directed polling is used to regulate
- focus and intensity of the polling.
-
- CAVEATS
- None.
-
- BUGS
- None known.
-
- LIMITATIONS
- Monitored and managed nodes must implement the SNMP over
- UDP per RFC 1157 or must be reachable via a proxy agent.
-
- HARDWARE REQUIRED
- X windows workstation with UDP socket library.
- Monochrome is acceptable, but color is far superior.
-
- SOFTWARE REQUIRED
- X windows version 11 release 4 or later or MOTIF.
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 172]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog XNETMON_WELLFLEET
-
- NAME
- xnetmon, xpmon
-
- KEYWORDS
- alarm, manager, map, status; IP; NMS, SNMP; UNIX.
-
- ABSTRACT
- Xnetmon and xpmon provide graphical representation of
- performance and status of SNMP-capable network ele-
- ments. Xnetmon presents a schematic network map
- representing the up/down status of network elements;
- xpmon draws a pen plot style graph of the change over
- time of any arbitrary MIB object (RFC1066). Both xnet-
- mon and xpmon use the SNMP (RFC1098) for retrieving
- status and performance data.
-
- MECHANISM
- Xnetmon polls network elements for the status of their
- interfaces on a controllable polling interval. Pop-up
- windows displaying the values of any MIB variable are
- supported by separate polls. When SNMP traps are
- received from a network element, that element and all
- adjacent elements are immediately re-polled to update
- their status. The layout of the network map is stati-
- cally configured. Xpmon repeatedly polls (using SNMP)
- the designated network element for the value of the
- designated MIB variable on the user-specified interval.
- The change in the variable is then plotted on the strip
- chart. The strip chart regularly adjusts its scale to
- the current maximum value on the graph.
-
- CAVEATS
- Polling intervals should be chosen with care so as not
- to affect system performance adversely.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Distributed and supported for Sun-3 systems.
-
- SOFTWARE REQUIRED
- SunOS 3.5 or 4.x; X11, release 2 or 3.
-
-
-
- NOCTools2 Working Group [Page 173]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY
- Commercial product of:
- Wellfleet Communications, Inc.
- 12 DeAngelo Drive
- Bedford, MA 01730-2204
- (617) 275-2400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 174]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog XNETPERFMON_SNMP_RESEARCH
-
- NAME
- xnetperfmon -- a graphical network performance and
- fault management tool from SNMP Research.
-
- KEYWORDS
- manager, security, status;
- DECnet, Ethernet, IP, OSI, ring, star;
- NMS, SNMP, X;
- DOS, UNIX, VMS;
- sourcelib.
-
- ABSTRACT
- Xnetperfmon is a XNETMON tool used to produce plots of
- SNMP variables in graphical displays. The manager may
- easily customize the labels, step size, update interval,
- and variables to be plotted to produce graphs for fault
- and performance management. Scales automatically adjust
- whenever a point to be plotted would go off scale.
-
- MECHANISM
- The xnetperfmon application communicates with remote
- agents or proxy agents via the Simple Network Management
- Protocol (SNMP).
-
- CAVEATS
- All plots for a single invocation of xnetperfmon must be
- for variables provided by a single network management
- agent. However, multiple invocations of xnetperfmon may
- be active on a single display simultaneously or proxy
- agents may be used to summarize information at a common
- point.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Systems supporting X windows.
-
- SOFTWARE REQUIRED
- XNETMON from SNMP Research and X Version 11 release 4 or
- later (option MOTIF)
-
-
-
-
-
- NOCTools2 Working Group [Page 175]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL
- This is a commercial product available under license
- from:
-
- SNMP Research
- 3001 Kimberlin Heights Road
- Knoxville, TN 37920-9716
- Attn: John Southwood, Sales and Marketing
- (615) 573-1434 (Voice) (615) 573-9197 (FAX)
-
- CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY
- users@seymour1.cs.utk.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 176]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Internet Tool Catalog XUP_HP
-
- NAME
- xup
-
- KEYWORDS
- status; ping, X; HP.
-
- ABSTRACT
- Xup uses the X-Windows to display the status of an
- "interesting" set of hosts.
-
- MECHANISM
- Xup uses ping to determine host status.
-
- CAVEATS
- Polling for status increases network load.
-
- BUGS
- None known.
-
- LIMITATIONS
- None reported.
-
- HARDWARE REQUIRED
- Runs only on HP series 300 and 800 workstations.
-
- SOFTWARE REQUIRED
- Version 10 of X-Windows.
-
- AVAILABILITY
- A standard command for the HP 300 & 800 Workstations.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 177]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- Appendix: "No-Writeups"
-
- This section contains references to tools which are known to exist,
- but which have not been fully cataloged. If anyone wishes to author
- an entry for one of these tools please contact: noctools-
- request@merit.edu.
-
- Each mention is separated by a <form-feed> for improved readability.
- If you intend to actually print-out this section of the catalog, then
- you should probably strip-out the <ff>.
-
- tuecho.c
-
- /*
- * Send / receive TCP or UDP echos in any of a number of bizzare ways.
- *
- * Joel P. Bion, March 1990
- * Copyright (c) 1990 cisco Systems. All rights reserved.
- *
- * This "tuecho" program is distributed in the hope that it will be
- * useful, but WITHOUT ANY WARRANTY; without even the implied warranty
- * of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
- *
- * Prompts as:
- * Host: -- host to send echos to -- can be name or a.b.c.d --
- * Enter protocol (0 = UDP, 1 = TCP) [0]: -- UDP or TCP
- * Size of data portion (bytes) [100]: -- bytes in data, excluding
- * headers -- Number of bursts [5]: -- number of bursts of packets to
- * send -- Packets per burst [1]: -- packets per burst, all sent AT
- * ONCE -- Timeout (seconds) [2]: -- how long to wait for data
- * Pause interval (seconds) [0]: -- Pause interval between bursts of
- * frames
- * Type of pattern (specify = 0, increment = 1) [1]:
- * -- if 0 specified, allow you to specify a 16bit pattern
- -- as four hex digits (see below). If 1, will create a
- -- "incrementing", cycling pattern from 0x0000 -> 0xffff
- -- ->.
- * Enter pattern (hex value) [abcd]: -- if "0" specified above
- */
-
- Availability:
- ftp.uu.net:/networking/cisco/tuecho.c
- ftp.cisco.com:tuecho.c
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 178]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- SPY An NFS monitoring/tracing tool
-
- Availability:
- A postscript file describing SPY is located on
- ftp.uu.net:/networking/ip/nfs/spy.ps.Z
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 179]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- NFSTRACE
-
- This is the rpcspy/nfstrace package.
-
- It is described in detail in the paper "NFS Tracing by Passive
- Network Monitoring", which appeared in the January, 1992 USENIX
- conference.
-
- You'll need either a DEC machine running ULTRIX (with the
- packetfilter installed in the kernel) or a Sun running SunOS 4.x
- (with NIT). Or you'll need to do a bit of hacking.
-
- The package differs slightly from the version in the paper:
-
-
- - The handle->name translation facility has been removed. It's
- just too fragile to include in the general release. If you need it,
- contact me directly and I'll be happy to mail you the code.
-
- - The output format is a wee-bit different.
-
- - The IBM-RT Enet filter version is also not included, since I seem to
- be the only person in the world running it. RTs are really too slow
- for this anyway.
-
- To configure the package, edit the makefile in the obvious (to me at
- least) way.
-
- Note that the not all versions of SunOS NIT have working versions of
- the packet timestamp mechanism. Try to set the -DSTAMPS option in
- the makefile, and if that doesn't work, take it out.
-
- If you are actually going to use this to gather traces, I'd like to
- hear from you! Please send email, and share your results/traces if
- your organization will allow it. I maintain a mailing list of users
- for updates, etc. Send me mail to be added to it.
-
- Happy tracing.
- Matt Blaze
- Department of Computer Science
- Princeton University
- 35 Olden Street
- Princeton, NJ 08544
- mab@cs.princeton.edu
- 609-258-3946
-
- Availability:
- ftp.uu.net:/networking/ip/nfs/nfstrace.shar (or check archie)
-
-
-
- NOCTools2 Working Group [Page 180]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- LAMER
-
- # Lame delegation notifier
- # Author: Bryan Beecher
- # Last Modified: 6/25/92
- #
- # To make use of this software, you need to be running the
- # University of Michigan release of BIND 4.8.3, or any version
- # of named that supports the LAME_DELEGATION patches posted to
- # USENET. The U-M release is available via anonymous ftp from
- # terminator.cc.umich.edu:/unix/dns/bind4.8.3.tar.Z.
- #
- # You must also have a copy of query(1) and host(1). These
- # are also available via anonymous ftp in the aforementioned
- # place.
- # -------------------------------------------------------------
-
- # -------------------------------------------------------------
- # handle arguments
- # -------------------------------------------------------------
- # -d <day>
- # This flag is used to append a dot-day suffix to the LOGFILE.
- # Handy where log files are kept around for the last week
- # and contain a day suffix.
- #
- # -f <logfile>
- # Change the LOGFILE value altogether.
- #
- # -w
- # Count up all of the DNS statistics for the whole week.
- #
- # -v
- # Be verbose.
- #
- # -t
- # Test mode. Do not send mail to the lame delegation
- # hostmasters.
-
- Availability:
- ftp.uu.net:/networking/ip/dns/lamer.tar.Z (or check archie)
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 181]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- HOST
-
- host - look up host names using domain server
-
- SYNOPSIS
- host [-v] [-a] [-t querytype] [options] name [server]
- host [-v] [-a] [-t querytype] [options] -l domain [server]
- host [-v] [options] -H [-D] [-E] [-G] domain
- host [-v] [options] -C domain
- host [-v] [options] -A host
-
- DESCRIPTION
- host looks for information about Internet hosts or domains.
- It gets this information from a set of interconnected
- servers that are spread across the world. By default, it
- simply converts between host names and Internet addresses.
- However, with the -t, -a and -v options, it can be used to
- find all of the information about hosts or domains that is
- maintained by the domain nameserver.
-
- /*
- * Extensively modified by E. Wassenaar, Nikhef-H, <e07@nikhef.nl>
- *
- * The officially maintained source of this program is available
- * via anonymous ftp from machine 'ftp.nikhef.nl' [192.16.199.1]
- * in the directory '/pub/network' as 'host.tar.Z'
- *
- * Also available in this directory are patched versions of the
- * BIND 4.8.3 nameserver and resolver library which you may need
- * to fully exploit the features of this program, although they
- * are not mandatory. See the file 'README_FIRST' for details.
- *
- * You are kindly requested to report bugs and make suggestions
- * for improvements to the author at the given email address,
- * and to not re-distribute your own modifications to others.
- */
- /*
- * New features
- *
- * - Major overhaul of the whole code.
- * - Very rigid error checking, with more verbose error messages.
- * - Zone listing section completely rewritten.
- * - It is now possible to do recursive listings into subdomains.
- * - Maintain resource record statistics during zone listings.
- * - Maintain count of hosts during zone listings.
- * - Exploit multiple server addresses if available.
- * - Option to exploit only primary server for zone transfers.
- * - Option to exclude info from names that do not reside in a domain.
-
-
-
- NOCTools2 Working Group [Page 182]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- * - Implement timeout handling during connect and read.
- * - Write resource record output to optional logfile.
- * - Special MB tracing by recursively expanding MR and MG records.
- * - Special mode to check SOA records at each nameserver for domain.
- * - Special mode to check inverse mappings of host addresses.
- * - Code is extensively documented.
- */
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 183]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- PINGs
-
- Many many versions of the PING program exist.
- Each implementation has its own set of additional features.
- Here are a few more PINGs that are worth taking a look at.
-
- Version on ftp.cc.berkeley.edu:pub/ping:
- This version has duplicate packet detection, Record Route,
- ability to specify data pattern for packets, flood pinging, an
- interval option, Multicast support, etc.
-
- Version on nikhefh.nikhef.nl:/pub/network/rping.tar.Z:
- 'rping' is just like 'ping', but only a single probe packet
- is sent to test the reachability of a destination.
- As an option, the loose source routing facility is used
- to show the roundtrip route the packet has taken.
- Multiple addresses of remote hosts are tried until one
- responds. As an option, each of multiple addresses can be
- probed unconditionally.
- Contains a patch for making loose source routing work in
- case you have a SUN with an OMNINET ethernet controller.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 184]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- VRFY
-
- vrfy.tar.Z (Version 921021)
- 'vrfy' is a tool to verify email addresses and mailing lists.
- In its simplest form it takes an address "user@domain", figures
- out the MX hosts for "domain", and issues the SMTP command VRFY
- at the primary MX host (optionally all), or at "domain" itself
- if no MX hosts exist. Without "domain" it goes to "localhost".
- More complex capabilities are: recursively expanding forward
- files or mailing lists, and detecting mail forwarding loops.
- Full-blown RFC822 address specifications are understood.
- Syntax checking can be carried out either locally or remotely.
- Various options are provided to exploit alternative protocol
- suites if necessary, and to print many forms of verbose output.
- Obvious limitations exist, but on average it works pretty well.
- Needless to say you need internet (nameserver and SMTP) access.
- See the man page and the extensive documentation in the source
- for further details.
-
- Please send comments and suggestions to Eric Wassenaar <e07@nikhef.nl>
-
- If you want to receive notification of updates, please send an email
- with the keyword "subscribe" in the subject or the body to the address
- <net-dist-request@nikhef.nl>
-
- available as: nikhefh.nikhef.nl:/pub/network/vrfy.tar.Z
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 185]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- XNETLOAD
-
- NAME
- xnetload - ethernet load average display for X
-
- SYNOPSIS
- xnetload[-toolkitoption ...] [-scale integer]
- [-update seconds] [-hl color] [-highlight color]
- [-jumpscroll pixels] [-label string] [-nolabel] host
-
- DESCRIPTION
- The xnetload program displays a periodically updating histo-
- gram of the ethernet load average for the specified host.
- The resulting graph is scaled as 0% to 100%, where 0%
- corresponds to 0mbs and 100% corresponds to 10mbs. NOTE:
- The specified host must be running rpc.etherd.
-
- This program has been run using X11R4 and X11R5, under the following
- operating systems:
-
- SUNOS 4.1.0
- SUNOS 4.1.1
- ULTRIX V4.2
- IRIX 3.3.2
-
- Assuming the Imake templates and Rules are in order and in the proper
- place on your system, these programs should compile and link
- straightforward by running the following sequence:
-
- xmkmf
- make
-
- Then, as root, issue the following:
-
- make install
- make install.man
-
- Then, on your host system, (or on any other system you can rlogin or rsh
- into) start the etherd daemon with the following (must be root):
-
- /usr/etc/rpc.etherd le0 &
-
- where le0 is the mnemonic for the primary ethernet interface.
-
- To start the xnetload program, the following command line is suggested:
-
- ./xnetload -hl red host &
-
-
-
-
- NOCTools2 Working Group [Page 186]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- where "host" is the name of any reachable network node (including
- LOCALHOST) that is running the etherd daemon. A small xload window
- should appear on your local display with nine horizontal lines. The
- label:
- "Ethernet Load %"
- should appear in the upper left hand corner, just below any additional
- title bars or other decorations provided by your window manager. If the
- program comes up without the nine lines, or without the "Ethernet Load"
- label, then either your resource file is not properly installed in the
- appropriate app-defaults directory, or you may have picked up the wrong
- xnetload image. Try re-running "make install" as root, or be sure to
- include the "./" in front of the command name.
-
- Good Luck!
-
- The following changes have been made to this directory since R3:
-
- o Now use Athena StripChart widget.
-
- o Understands WM_DELETE_WINDOW.
-
- o 3-26-92 Modified from xload to xnetload by Roger Smith,
- Sterling Software at NASA-Ames Research Center,
- Mountain View, Calif. rsmith@proteus.arc.nasa.gov
-
- Availability:
- ftp proteus.arc.nasa.gov:pub/XEnetload.tar.Z (or check archie)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 187]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- NETTEST
-
- nettest, nettestd - Performs client and server functions for
- timing data throughput
-
- The nettest and nettestd commands invoke client and server
- programs that are used for timing data throughput of various
- methods of interprocess communication. For TCP and OSI con-
- nections, the nettest program establishes a connection with
- the nettestd program, and then it does count writes of size
- bytes, followed by count reads of size bytes. For UDP, the
- nettest program performs only writes; reads are not per-
- formed. The nettestd program, if used with UDP connections,
- reads the data packets and prints a message for each data
- packet it receives. The number and size of the reads and
- writes may not correlate with the number and size of the
- actual data packets that are transferred; it depends on the
- protocol that is chosen. If you append an optional k (or K)
- to the size, count, or bufsize value, the number specified
- is multiplied by 1024.
-
- This source for nettest and nettestd are provided on an "as is"
- basis. Cray Research does not provide any support for this code
- (unless you are a customer who has purchased the UNICOS operating
- system).
-
- We will gladly take bug reports for nettest/nettestd. Suggested
- fixes are prefered to just bug reports. Changes to allow
- nettest/nettestd to run on other architectures are also welcomed. We
- will try to incorporate bugfixes and update the publicly available
- code, but we can make no guarantees.
-
- For copyright information, see the notice in each source file.
-
- Send bug-reports/fixes to:
- E-mail: dab@cray.com
- U.S. Mail: David Borman
- Cray Research, Inc.
- 655F Lone Oak Drive
- Eagan, MN 55121
- Notes:
-
- 1) The -b option to nettestd has not been tested...
- 2) The ISO code should work on a 4.4BSD system, but the
- gethostinfo() routine is specific to UNICOS...
-
- Availability:
- ftp sgi.com:/sgi/src/nettest
-
-
-
- NOCTools2 Working Group [Page 188]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- ETHERCK
-
- etherck is a simple program that displays Sun ethernet statistics.
- If you have a high percents of input errors that are due to "out of
- buffers", then you can run the "iepatch" script to patch a kernel
- that uses the Intel ethernet chip ("ie"). A back of the envelope
- calculation shows that a .25% input error rate gives about a 10%
- degradation of NFS performance if 8k packets are being used.
-
- In our environment at Legato, patching the ie buffer allocation made
- the input error rate drop more than 2 orders of magnitude. This was
- after we had applied other networking fixes (e.g., using Prestoserve,
- going from thin wire to twisted pair) and pushed a higher load on the
- server.
-
- Note that both etherck and iepatch must be run by root (or you can
- make etherck setgid kmem).
-
- Availability:
- send EMAIL to: request@legato.com
- with a Subject line: send unsupported etherck
-
- The following is part of the 'help' file from the Legato Email
- Server:
-
- This message comes to you from the request server at Legato.COM,
- request@Legato.COM. It received a message from you asking for help.
-
- The request server is a mail-response program. That means that you
- mail it a request, and it mails back the response.
-
- The request server is a very dumb program. It does not have much
- error checking. If you don't send it the commands that it
- understands, it will just answer "I don't understand you".
-
- The request server has 4 commands. Each command must be the first
- word on a line. The request server reads your entire message before
- it does anything, so you can have several different commands in a
- single message. The request server treats the "Subject:" header line
- just like any other line of the message. You can use any combination
- of upper and lower case letters in the commands.
-
- The request server's files are organized into a series of directories
- and subdirectories. Each directory has an index, and each
- subdirectory has an index. The top-level index gives you an overview
- of what is in the subdirectories, and the index for each subdirectory
- tells you what is in it.
-
-
-
-
- NOCTools2 Working Group [Page 189]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- The server has 4 commands:
-
- "help" command: The command "help" or "send help" causes the server to
- send you the help file. You already know this, of course,
- because you are reading the help file. No other commands are
- honored in a message that asks for help (the server figures
- that you had better read the help message before you do
- anything else).
-
- SEND a request to Legato to get the rest of the help file!
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 190]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- NETCK
-
- netck is a shar file that contains the sources to build "netck", a
- network checker that uses the rstat(3R) protocol to gather and print
- statistics from machines on the network. netck is useful to help
- understand what part of what machines are potential NFS bottlenecks.
- To get this file, send email to the request server with the command
- "send unsupported netck".
-
- Availability:
- same as ETHERCK (send email To: request@legato.com; subject:
- HELP)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 191]
-
- RFC 1470 FYI: Network Management Tool Catalog June 1993
-
-
- References
-
- [1] Stine, R., Editor, "FYI on a Network Management Tool Catalog:
- Tools for Monitoring and Debugging TCP/IP Internets and
- Interconnected Devices", FYI 2, RFC 1147, Sparta, Inc., April
- 1990.
-
- Security Considerations
-
- Security issues are not discussed in this memo.
-
- Authors' Addresses
-
- Robert M. Enger
- Advanced Network and Services
- 1875 Campus Commons Drive, Suite 220
- Reston, VA. 22091-1552
-
- Phone: 703-758-7722
- EMail: enger@reston.ans.net
-
-
- Joyce K. Reynolds
- Information Sciences Institute
- University of Southern California
- 4676 Admiralty Way
- Marina del Rey, CA 90292
-
- Phone: (310) 822-1511
- Email: JKREY@ISI.EDU
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NOCTools2 Working Group [Page 192]
-