RFCs in HTML Format


RFC 1470

Network Working Group                                           R. Enger
Request for Comments: 1470                                           ANS
FYI: 2                                                       J. Reynolds
Obsoletes: 1147                                                      ISI
                                                                 Editors
                                                               June 1993


               FYI on a Network Management Tool Catalog:
          Tools for Monitoring and Debugging TCP/IP Internets
                       and Interconnected Devices



NOCTools2 Working Group                                         [Page 1]

RFC 1470 FYI: Network Management Tool Catalog June 1993 The tools described in this catalog are in no way endorsed by the IETF. For the most part, we have neither evaluated the tools in this catalog, nor validated their descriptions. Most of the descriptions of commercial tools have been provided by vendors. Caveat Emptor. Acknowledgements This catalog is the result of work on the part of the NOCTools2 Working Group of the User Services Area of the IETF. The following individuals made especially notable contributions: Chris Myers, Darren Kinley, Gary Malkin, Mohamed Ellozy, and Mike Patton. Current Postings The current contents of the NOCtools catalog may be retrieved via anonymous FTP from wuarchive.wustl.edu. The entries are stored as individual files in the directory /doc/noctools. "No-Writeups" Appendix This section contains references to tools which are known to exist, but which have not been fully cataloged. If anyone wishes to author an entry for one of these tools please contact us at: noctools-request@merit.edu Keep in mind that if these or other tools are included in the future, they will be available in the on-line version of the catalog. Each mention is separated by a <form-feed> for improved readability. If you intend to actually print-out this section of the catalog, then you should probably strip-out the <ff>. How to Submit/Update an Entry 1) review the template included below to determine what information you will need to collect, 2) review the keywords to see what your indexing options are, 3) assemble (update) catalog entry to include results of 1) and 2). 4) Submit your entry using either of the following two methods: a) Post your submission to: comp.internet.noctools.submissions b) Email your submission to: noctools-entries@merit.edu New entries will be circulated automatically upon reception. As time permits, the NOCtools editors will review recent submissions and incorporate them into the master indexes. Enquiries regarding the NOCTools2 Working Group [Page 2]
RFC 1470 FYI: Network Management Tool Catalog June 1993 status of a submission should be E-Mailed to: noctools-request@merit.edu Those submitting an entry to the catalog should insure that any E- mail addresses provided are correct and functional. Either the catalog editors or prospective users of your tool may wish to reach you. NOCTools2 Working Group [Page 3]
RFC 1470 FYI: Network Management Tool Catalog June 1993 TEMPLATE NAME <tool-name> KEYWORDS [<keyword-A1>[,<keyword-A2>[,...,<keyword-An>]]]; [<keyword-B1>[,<keyword-B2>[,...,<keyword-Bn>]]]; [<keyword-C1>[,<keyword-C2>[,...,<keyword-Cn>]]]; [<keyword-D1>[,<keyword-D2>[,...,<keyword-Dn>]]]; [<keyword-E1>[,<keyword-E2>[,...,<keyword-En>]]]. ABSTRACT <summary of the tool> <summary of the tool> <summary of the tool> MECHANISM <high level technical details of how it works> <high level technical details of how it works> <high level technical details of how it works> CAVEATS <any warnings or cautions> <any warnings or cautions> <any warnings or cautions> BUGS <any warnings or cautions> <any warnings or cautions> <any warnings or cautions> LIMITATIONS <any warnings or cautions> <any warnings or cautions> <any warnings or cautions> HARDWARE REQUIRED <list any hardware requirements> <list any hardware requirements> <list any hardware requirements> NOCTools2 Working Group [Page 4]
RFC 1470 FYI: Network Management Tool Catalog June 1993 SOFTWARE REQUIRED <list any software requirements> <list any software requirements> <list any software requirements> AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL <How to acquire the tool.> <Location/Contact Info to access/obtain tool> CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY <Contact info for person responsible for catalog entry> DATE OF MOST RECENT UPDATE TO THIS CATALOG ENTRY <YYMMDD> Keywords This catalog uses "keywords" for terse characterizations of the tools. Keywords are abbreviated attributes of a tool or its use. To allow cross-comparison of tools, uniform keyword definitions have been developed, and are given below. Following the definitions, there is an index of catalog entries by keyword. Keyword Definitions The keywords are always listed in a prefined order, sorted first by the general category into which they fall, and then alphabetically. The categories that have been defined for management tool keywords are: o the general management area to which a tool relates or a tool's functional role; o the network resources or components that are managed; o the mechanisms or methods a tool uses to perform its functions; o the operating system and hardware environment of a tool; and o the characteristics of a tool as a hardware product or software release. NOCTools2 Working Group [Page 5]
RFC 1470 FYI: Network Management Tool Catalog June 1993 The keywords used to describe the general management area or functional role of a tool are: Alarm a reporting/logging tool that can trigger on specific events within a network. Analyzer a traffic monitor that reconstructs and interprets pro- tocol messages that span several packets. Benchmark a tool used to evaluate the performance of network com- ponents. Control a tool that can change the state or status of a remote network resource. Debugger a tool that by generating arbitrary packets and moni- toring traffic, can drive a remote network component to various states and record its responses. Generator a traffic generation tool. Manager a distributed network management system or system com- ponent. Map a tool that can discover and report a system's topology or configuration. Reference a tool for documenting MIB structure or system confi- guration. Routing a packet route discovery tool. Security a tool for analyzing or reducing threats to security. Status a tool that remotely tracks the status of network com- ponents. NOCTools2 Working Group [Page 6]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Traffic a tool that monitors packet flow. The keywords used to identify the network resources or components that a tool manages are: Bridge a tool for controlling or monitoring LAN bridges. CHAOS a tool for controlling or monitoring implementations of the CHAOS protocol suite or network components that use it. DECnet a tool for controlling or monitoring implementations of the DECnet protocol suite or network components that use it. DNS a Domain Name System debugging tool. Ethernet a tool for controlling or monitoring network components on ethernet LANs. FDDI a tool for controlling or monitoring network components on FDDI LANs or WANs. IP a tool for controlling or monitoring implementations of the TCP/IP protocol suite or network components that use it. OSI a tool for controlling or monitoring implementations of the OSI protocol suite or network components that use it. NFS a Network File System debugging tool. Ring a tool for controlling or monitoring network components on Token Ring LANs. NOCTools2 Working Group [Page 7]
RFC 1470 FYI: Network Management Tool Catalog June 1993 SMTP an SMTP debugging tool. Star a tool for controlling or monitoring network components on StarLANs. The keywords used to describe a tool's mechanism are: CMIS a network management system or component based on CMIS/CMIP, the Common Management Information System and Protocol. Curses a tool that uses the "curses" tty interface package. Eavesdrop a tool that silently monitors communications media (e.g., by putting an ethernet interface into "promiscu- ous" mode). NMS the tool is a component of or queries a Network Manage- ment System. Ping a tool that sends packet probes such as ICMP echo mes- sages; to help distinguish tools, we do not consider NMS queries or protocol spoofing (see below) as probes. Proprietary a distributed tool that uses proprietary communications techniques to link its components. RMON a tool which employs the RMON extensions to SNMP. SNMP a network management system or component based on SNMP, the Simple Network Management Protocol. Spoof a tool that tests operation of remote protocol modules by peer-level message exchange. X a tool that uses X-Windows. NOCTools2 Working Group [Page 8]
RFC 1470 FYI: Network Management Tool Catalog June 1993 The keywords used to describe a tool's operating environment are: DOS a tool that runs under MS-DOS. HP a tool that runs on Hewlett-Packard systems. Macintosh a tool that runs on Macintosh personal computers. OS/2 a tool that runs under the OS/2 operating system. Standalone an integrated hardware/software tool that requires only a network interface for operation. Sun a tool that runs on Sun Microsystems platforms. (binary distribution built for use on a Sun.) UNIX a tool that runs under 4.xBSD UNIX or related OS. VMS a tool that runs under DEC's VMS operating system. The keywords used to describe a tool's characteristics as a hardware or software acquisition are: Free a tool is available at no charge, though other restric- tions may apply (tools that are part of an OS distribu- tion but not otherwise available are not listed as "free"). Library a tool packaged with either an Application Programming Interface (API) or object-level subroutines that may be loaded with programs. Sourcelib a collection of source code (subroutines) upon which developers may construct other tools. NOCTools2 Working Group [Page 9]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Tools Indexed by Keywords Following is an index of the most up-to-date catalog entries sorted by keyword, which is available via: news comp.networks.noctools.tools ftp wuarchive.wustl.edu:/doc/noctool This index can be used to locate the tools with a particular attribute: tools are listed under each keyword that characterizes them. The keywords and the subordinate lists of tools under them are in alphabetical order. Alarm ----- CMIP Library Dual Manager Eagle EMANATE EtherMeter LanProbe LANWatch MONET NetMetrix Load Monitor NetMetrix Protocol Analyzer NETMON for Windows NETscout NOCOL SNMP Libraries and Utilities from Empire Technologies SNMP Libraries and Utilities from SNMP Research snmpd from Empire Technologies SpiderMonitor XNETMON from SNMP Research xnetmon from Wellfleet Analyzer -------- LANVista LANWatch NetMetrix Protocol Analyzer NETscout PacketView Sniffer SpiderMonitor NOCTools2 Working Group [Page 10]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Benchmark --------- hammer & anvil iozone LADDIS LANVista nhfsstone SPIMS spray ttcp XNETMON from SNMP Research CMIS ---- CMIP library Generic Managed System MIB Browser Control ------- CMIP Library Dual Manager Eagle MIB Manager from Empire Technologies MONET NETMON for Windows proxyd SNMP Libraries and Utilities from Empire Technologies SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System snmpd from Empire Technologies TokenVIEW XNETMON from SNMP Research Debugger -------- Ethernet Box II LANVista NetMetrix Traffic Generator ping from UCB SPIMS XNETMON from SNMP Research Generator --------- hammer & anvil LADDIS LANVista NOCTools2 Working Group [Page 11]
RFC 1470 FYI: Network Management Tool Catalog June 1993 NetMetrix Traffic Generator nhfsstone ping ping from UCB Sniffer SpiderMonitor spray TTCP Manager ------- Beholder CMIP Library CMU SNMP Distribution decaddrs by Wellfleet Dual Manager EMANATE Ethernet Box II getone by Wellfleet Interactive Network Map LanProbe LANVista MIB Manager from Empire Technologies MONET NetLabs CMOT Agent NetLabs SNMP Agent NETMON for Windows NETscout NNStat NOCOL OverVIEW SAS/CPE for Open Systems Software SNMP Development Kit SNMP Libraries and Utilities from Empire Technologies SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System snmpd from Empire Technologies tokenview Tricklet Wollongong-Manager XNETMON from SNMP Research XNETMON from Wellfleet xnetperfmon Map --- decaddrs by Wellfleet Dual Manager NOCTools2 Working Group [Page 12]
RFC 1470 FYI: Network Management Tool Catalog June 1993 etherhostprobe EtherMeter Interactive Network Map LanProbe NETMON for Windows Network Integrator I NPRV SNMP Libraries and Utilities from SNMP Research XNETMON by SNMP Research XNETMON by Wellfleet Reference --------- EMANATE ethernet-codes HyperMIB MIB Manager from Empire Technologies XNETMON Routing ------- arp decaddrs by Wellfleet etherhostprobe getone by Wellfleet hopcheck MONET net_monitor NETMON for Windows netstat NPRV ping from UCB query traceroute Security -------- Computer Security Checklist Dual Manager Eagle EMANATE LAN Patrol SNMP Libraries and Utilities from SNMP Research XNETMON by SNMP Research xnetperfmon NOCTools2 Working Group [Page 13]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Status ------ Beholder CMIP Library CMU SNMP DiG dnsstats doc Dual Manager EMANATE fping getone by Wellfleet host Internet Rover lamers LanProbe mconnect MONET net_monitor Netlabs CMOT Agent Netlabs SNMP Agent NETscout NNStat NOCOL NPRV OverVIEW ping ping from UCB proxyd from SNMP Research SAS/CPE SNMP Development Kit SNMP Libraries and Utilities from Empire Technologies SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System PSI SNMP snmpd from Empire Technologies snmpd from SNMP Research TokenVIEW Tricklet vrfy XNETMON by SNMP Research xnetmon by Wellfleet xnetperfmon xup NOCTools2 Working Group [Page 14]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Traffic ------- etherfind EtherMeter Ethernet Box II EtherView getethers LAN Patrol LanProbe LANVista LANWatch ENTM MONET NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator NETMON by Mitre NETscout netwatch Network Integrator I nfswatch nhfsstone NNStat ositrace PacketView Sniffer SpiderMonitor spray tcpdump tcplogger trpt ttcp XNETMON by SNMP Research Bridge ------ decaddrs by Wellfleet EMANATE MIB Manager from Empire Technologies MONET proxyd by SNMP Research SAS/CPE SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System snmpd from SNMP Research XNETMON from SNMP Research NOCTools2 Working Group [Page 15]
RFC 1470 FYI: Network Management Tool Catalog June 1993 CHAOS ----- Interactive Network Map LANWatch DECnet ------ decaddrs by Wellfleet LANVista LANWatch MONET net_monitor NetMetrix Protocol Analyzer NETMON for Windows NETscout Sniffer SNMP Libraries and Utilities from SNMP Research SpiderMonitor XNETMON from SNMP Research xnetperfmon from SNMP Research DNS --- DiG dnsstats doc lamers LANWatch NetMetrix Protocol Analyzer NOCOL Ethernet -------- arp Beholder Eagle EMANATE etherfind etherhostprobe EtherMeter Ethernet Box II ethernet-codes EtherView getethers LAN Patrol LanProbe LANVista LANWatch NOCTools2 Working Group [Page 16]
RFC 1470 FYI: Network Management Tool Catalog June 1993 ENTM Interactive Network Map MONET NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator NETMON for Windows NETscout netwatch Network Integrator I nfswatch NNStat PacketView proxyd from SNMP Research SAS/CPE Sniffer SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research SpiderMonitor tcpdump XNETMON from SNMP Research xnetperfmon from SNMP Research FDDI ---- EMANATE ethernet-codes NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator nfswatch SAS/CPE SNMP Libraries and utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research XNETMON from SNMP Research IP -- arp CMU SNMP Dual Manager Eagle EMANATE etherfind NOCTools2 Working Group [Page 17]
RFC 1470 FYI: Network Management Tool Catalog June 1993 etherhostprobe EtherView fping getone from Wellfleet hammer & anvil hopcheck Internet Rover LanProbe LANVista LANWatch ENTM Interactive Network Map MIB Manager from Empire Technologies MONET net_monitor Netlabs CMOT Agent Netlabs SNMP Agent NetMetrix Load Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator NETMON by Mitre NETMON for Windows NETscout netstat netwatch nfswatch nhfsstone NNStat NOCOL NPRV OverVIEW PacketView ping ping from UCB proxyd from SNMP Research query SAS/CPE SNMP Development Kit SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research PSI SNMP snmpd from Empire Technologies snmpd from SNMP Research PSI SNMP SpiderMonitor SPIMS spray tcpdump NOCTools2 Working Group [Page 18]
RFC 1470 FYI: Network Management Tool Catalog June 1993 tcplogger traceroute trpt ttcp XNETMON from SNMP Research xnetmon from Wellfleet xnetperfmon from SNMP Research OSI --- CMIP Library Dual Manager EMANATE LANVista LANWatch Netlabs CMOT Agent NetMetrix Protocol Analyzer NETMON for Windows NETscout NOCOL ositrace proxyd from SNMP Research SAS/CPE Sniffer SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research SpiderMonitor SPIMS XNETMON from SNMP Research xnetperfmon from SNMP Research NFS --- etherfind EtherView iozone LADDIS NetMetrix NFS Monitor NetMetrix Protocol Analyzer NETscout nfswatch nhfsstone Sniffer tcpdump NOCTools2 Working Group [Page 19]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Ring ---- Eagle EMANATE Interactive Network Map LANVista LANWatch NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator NETMON by Mitre NETMON for Windows NETscout netwatch PacketView proxyd from SNMP Research Sniffer SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research TokenVIEW XNETMON from SNMP Research xnetperfmon from SNMP Research SMTP ---- host Internet Rover LANWatch mconnect NetMetrix Protocol Analyzer Sniffer vrfy Star ---- EMANATE Interactive Network Map LAN Patrol LANWatch NETMON for Windows NETscout proxyd from SNMP Research Sniffer SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research NOCTools2 Working Group [Page 20]
RFC 1470 FYI: Network Management Tool Catalog June 1993 XNETMON from SNMP Research xnetperfmon from SNMP Research Curses ------ Eagle Internet Rover net_monitor nfswatch NOCOL PSI SNMP Eavesdrop --------- etherfind Ethernet Box II EtherView LAN Patrol LANVista LANWatch ENTM NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetNetrix Traffic Generator NETMON from Mitre NETscout netwatch nfswatch NNStat OSITRACE PacketView Sniffer SpiderMonitor tcplogger trpt NMS --- CMU SNMP decaddrs from Wellfleet Dual Manager EMANATE EtherMeter Ethernet Box II getone from Wellfleet Interactive Network Map MONET NOCTools2 Working Group [Page 21]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Netlabs CMOT Agent Netlabs SNMP Agent NETMON for Windows NETscout NNStat NOCOL OverVIEW proxyd from SNMP Research SNMP Development Kit SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research PSI SNMP snmpd from Empire Technologies snmpd from SNMP Research TokenVIEW XNETMON from SNMP Research xnetmon from Wellfleet xnetperfmon from SNMP Research Ping ---- etherhostprobe fping getethers hopcheck Interactive Network Map Internet Rover LANWatch net_monitor NOCOL NPRV ping ping from UCB spray traceroute ttcp XNETMON from SNMP Research xup Proprietary ----------- Eagle EtherMeter Ethernet Box II LanProbe LANVista TokenVIEW NOCTools2 Working Group [Page 22]
RFC 1470 FYI: Network Management Tool Catalog June 1993 RMON ---- Beholder SNMP ---- Beholder CMU SNMP decaddrs from Wellfleet Dual Manager EMANATE getone from Wellfleet Interactive Network Map MIB Manager from Empire Technologies MONET Netlabs SNMP Agent NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator NETMON for Windows NETscout NOCOL OverVIEW proxyd from SNMP Research SNMP Development Kit SNMP Libraries and utilities from SNMP Research SNMP Packaged Agent System from SNMP Research PSI SNMP snmpd from Empire Technologies snmpd from SNMP Research Wollongong-Manager XNETMON from SNMP Research xnetmon from Wellfleet xnetperfmon from SNMP Research Spoof ----- DiG doc Internet Rover host LADDIS mconnect nhfsstone NOCOL query SPIMS NOCTools2 Working Group [Page 23]
RFC 1470 FYI: Network Management Tool Catalog June 1993 vrfy X - Dual Manager Interactive Network Map MIB Manager from Empire Technologies NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator SAS/CPE PSI SNMP XNETMON from SNMP Research xnetperfmon from SNMP Research xup DEC --- Wollongong-Manager DOS --- Computer Security Checklist Ethernet Box II hammer & anvil hopcheck iozone LAN Patrol LANVista netmon NETMON for Windows netwatch OverVIEW PacketView ping SAS/CPE SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research TokenVIEW Wollongong-Manager xnetperfmon from SNMP Research NOCTools2 Working Group [Page 24]
RFC 1470 FYI: Network Management Tool Catalog June 1993 HP -- iozone SAS/CPE xup Macintosh --------- HyperMIB OS/2 ---- Beholder Tricklet Standalone ---------- LANVista Sniffer SNMP Packaged Agent System from SNMP Research SpiderMonitor Sun --- Avatar SunSNMPD Wollongong Manager UNIX ---- arp CMIP Library CMU SNMP decaddrs from Wellfleet DiG doc dnsstats Eagle etherfind etherhostprobe EtherView fping getethers getone from Wellfleet host Interactive Network Map Internet Rover iozone LADDIS NOCTools2 Working Group [Page 25]
RFC 1470 FYI: Network Management Tool Catalog June 1993 lamers mconnect MIB Manager from Empire Technologies MONET net_monitor Dual Manager NetMetrix Load Monitor NetMetrix NFS Monitor NetMetrix Protocol Analyzer NetMetrix Traffic Generator NETMON from Mitre NETscout netstat Network Integrator I nfswatch nhfsstone NNStat NOCOL OSITRACE ping ping from UCB proxyd from SNMP Research query SAS/CPE SNMP Development Kit SNMP Libraries and Utilities from Empire Technologies SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research PSI SNMP snmpd from Empire Technologies snmpd from SNMP Research SPIMS spray tcpdump tcplogger traceroute Tricklet trpt ttcp vrfy XNETMON from SNMP Research xnetmon from Wellfleet xnetperfmon from SNMP Research VMS --- arp ENTM NOCTools2 Working Group [Page 26]
RFC 1470 FYI: Network Management Tool Catalog June 1993 fping net_monitor netstat NPRV ping SNMP Libraries and Utilities from SNMP Research tcpdump traceroute ttcp xnetperfmon from SNMP Research Free ---- arp Beholder CMIP Library CMU SNMP Distribution DiG dnsstats doc ENTM fping getethers hammer & anvil hopcheck host Interactive Network Map Internet Rover iozone lamers net_monitor netmon from Mitre netstat netwatch nfswatch nhfsstone NNStat NOCOL NPRV OSITRACE PING ping from UCB query SNMP Development Kit tcpdump tcplogger traceroute Tricklet NOCTools2 Working Group [Page 27]
RFC 1470 FYI: Network Management Tool Catalog June 1993 trpt ttcp vrfy Library ------- CMIP Library CMU SNMP Dual Manager NetMetrix Protocol Analyzer NetMetrix Traffic Generator proxyd from SNMP Research SAS/CPE Sourcelib --------- Beholder CMIP Library CMU SNMP EMANATE HyperMIB Interactive Network Map Internet Rover LANWatch MIB Manager from Empire Technologies net_monitor NETMON for Windows NOCOL proxyd from SNMP Research SNMP Development Kit SNMP Libraries and Utilities from Empire Technologies SNMP Libraries and Utilities from SNMP Research SNMP Packaged Agent System from SNMP Research snmpd from SNMP Research SpiderMonitor Tricklet XNETMON from SNMP Research xnetperfmon from SNMP Research Tool Descriptions This section is an updated collection of brief descriptions of tools for managing TCP/IP internets. These entries are in alphabetical order, by tool name. The entries all follow a standard format. Immediately after the NAME of a tool are its associated KEYWORDS. Keywords are terse descriptions of the purposes or attributes of a tool. A more NOCTools2 Working Group [Page 28]
RFC 1470 FYI: Network Management Tool Catalog June 1993 detailed description of a tool's purpose and characteristics is given in the ABSTRACT section. The MECHANISM section describes how a tool works. In CAVEATS, warnings about tool use are given. In BUGS, known bugs or bug-report procedures are given. LIMITATIONS describes the boundaries of a tool's capabilities. HARDWARE REQUIRED and SOFTWARE REQUIRED relate the operational environment a tool needs. Finally, in AVAILABILITY, pointers to vendors, online repositories, or other sources for a tool are given. Where tool names conflict, the vendor name is used as well. For example, MITRE, and SNMP Research each submitted an updated description of a tool called, "NETMON". These tools were independently developed, are functionally different, and run in different environments. MITRE's tool is listed as "NETMON_MITRE," and the tool from SNMP Research as "NETMON_WINDOWS_SNMP_RESEARCH". NOCTools2 Working Group [Page 29]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog ARP NAME arp KEYWORDS routing; ethernet, IP;; UNIX, VMS; free. ABSTRACT Arp displays and can modify the internet-to-ethernet address translations tables used by ARP, the address resolution protocol. MECHANISM The arp program accesses operating system memory to read the ARP data structures. CAVEATS None. BUGS None known. LIMITATIONS Only the super user can modify ARP entries. HARDWARE REQUIRED No restrictions. SOFTWARE REQUIRED BSD UNIX or related OS, or VMS. AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL Available via anonymous FTP from uunet.uu.net, in directory bsd-sources/src/etc. Available with 4.xBSD UNIX and related operating systems. For VMS, available as part of TGV MultiNet IP software package, as well as Wollongong's WIN/TCP and Process Software Corporation's TCPware for VMS. CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY This entry maintained by the NOCtools editors. Send email to noctools-request@merit.edu. NOCTools2 Working Group [Page 30]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog AVATAR-SNMP-TOOLKIT NAME SNMP Application Development Toolkit KEYWORDS manager;;SNMP;;sourcelib. ABSTRACT snmpapi is an api toolkit for developing SNMP applications and agents. The toolkit is simple and very fast that can be used for any type of application. It is very well suited for embedded systems such as bridges or routers. An example MIB II agent for Sun Sparcstations is provided. snmpapi is distributed in source form only. MECHANISM snmpapi is a library of C functions. CAVEATS None. BUGS None known. LIMITATIONS None. HARDWARE REQUIRED No restrictions. AVAILABILITY Available now. For more information, send e-mail to info@avatar.com. NOCTools2 Working Group [Page 31]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog AVATAR-SUNSNMPD NAME sunsnmpd KEYWORDS manager;;snmp;sun;. ABSTRACT sunsnmpd is a fully supported SNMP agent with MIB II support for Sun Sparscations running SunOS 4.1 or higher. sunsnmpd supports both SNMP GET and SET operations. MECHANISM sundnmpd is a daemon process which starts up at boot time from the rc.local file. It uses /dev/kmem to access kernel structures. CAVEATS None. BUGS None known. LIMITATIONS Must be started by a super user. HARDWARE REQUIRED Sun Sparcstations. AVAILABILITY Available now. Site licensing only. For more information, send e-mail to info@avatar.com. NOCTools2 Working Group [Page 32]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog ChameLAN-100 NAME ChameLAN 100 KEYWORDS analyzer, benchmark, debugger, generator, map, reference, status, traffic; bridge, DECnet, ethernet, FDDI, IP, OSI, NFS, ring; eavesdrop, SNMP, X; standalone, UNIX. ABSTRACT Tekelec's ChameLAN 100 is a portable diagnostic system for monitoring and simulation of FDDI, Ethernet and Token Ring networks -- simultaneously. Protocol analysis of multiple topologies, as well as mixed topoloies simultaneously, is a key feature of the product family. Tekelec's proprietary FDDI hardware guarantees complete real-time analysis of networks and network components at the full ring bandwidth of 125 Mbps. It passively connects to the network and captures 100 percent of the data, measures performance and isolates real-time problems. The simulation option offers full bandwidth load generation that allows you to create and simulate any network condition. It gives you the ability to inject errors and misformed frames. A set of confidence tests allow simple evaluation of new equipment. A ring map feature displays network topology and status of all nodes via the SMT process. Monitoring of FDDI, Ethernet and Token Ring allows the user to: view network status in real time; view network, node, or node pair statistics; capture frames; control capture using trigger and filter capabilities; view real-time statistics; view captured frames in decoded format; and view the last frame transmitted by each station. The following Real-Time Network Statistics of FDDI, Ethernet and Token Ring networks is displayed: frame rate, runts, byte rate, jabbers, CRC/align errors, and collisions. Product developers can use the ChameLAN 100 to observe NOCTools2 Working Group [Page 33]
RFC 1470 FYI: Network Management Tool Catalog June 1993 and control various events to help debug their FDDI, Ethernet and Token Ring products. End users can perform real-time monitoring to test and diagnose problems that may occur when developing, installing or managing FDDI, Ethernet and Token Ring networks and network products. End users can use the ChameLAN 100 to aid in the installation and maintenance of Ethernet and Token Ring networks. To isolate specific network trouble spots the ChameLAN 100 uses filtering and triggering techniques for data capture. Higher level protocol decode includes TCP/IP, OSI and DECnet protocol suites. Protocol decode of IPX, SNMP, XTP, and AppleTalk are also supported. Development of additional protocol decodes is also under development. The ChameLAN 100 family also offers a Protocol Management Development System (PMDS) that enables users to develop custom protocol decode suites. The FDDI, Ethernet and Token Ring hardware interfaces feature independent processing power. Real-time data is monitored unobtrusively at full bandwidth without affecting network activity. Real-time data may also be saved to a 120MB or optional 200MB hard disk drive for later analysis. FDDI data is captured at 125 megabits per second (Mbps), Ethernet at 10 Mbps and Token Ring at 4 or 16 Mbps. MECHANISM This portable, standalone unit incorporates the power of UNIX, X-Windows and Motif. Its UNIX-based programming interface facilitates development of customized monitoring and simulation applications. The ChameLAN 100 may connect to the network at any location using standard equipment. Standard graphical Motif/X-Windows and TCP/IP allow remote control through Ethernet and 10Base T interfaces. Tekelec also offers a rackmounted model -- ChameLAN 100-X. Both models can be controlled via a Sun Workstation remotely. CAVEATS none. BUGS none known. NOCTools2 Working Group [Page 34]
RFC 1470 FYI: Network Management Tool Catalog June 1993 LIMITATIONS none reported. HARDWARE REQUIRED None. The ChameLAN 100 is a self-contained unit, and includes its own interface cards. It installs into a network with standard interface connectors. SOFTWARE REQUIRED None. AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL The ChameLAN 100 product famil y is available commercially. For more information or a free demo, call or write: 1.800.tek.elec Tekelec 26580 West Agoura Road Calabasas, CA 91302 Phone: 818.880.5656 Fax: 818.880.6993 The ChameLAN 100 is listed on the GSA schedule. CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY Todd Koch Public Relations Specialist 818.880.7718 Internet: todd.koch@tekelec.com NOCTools2 Working Group [Page 35]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog CMU_SNMP NAME The CMU SNMP Distribution KEYWORDS manager, status; IP; NMS, SNMP; UNIX; free, sourcelib. ABSTRACT The CMU SNMP Distribution includes source code for an SNMP agent, several SNMP client applications, an ASN.1 library, and supporting documentation. The agent compiles into about 10 KB of 68000 code. The distribution includes a full agent that runs on a Kinetics FastPath2/3/4, and is built into the KIP appletalk/ethernet gateway. The machine independent portions of this agent also run on CMU's IBM PC/AT based router. The applications are designed to be useful in the real world. Information is collected and presented in a useful format and is suitable for everyday status monitoring. Input and output are interpreted symbolically. The tools can be used without referencing the RFCs. MECHANISM SNMP. CAVEATS None. BUGS None reported. Send bug reports to sw0l+snmp@andrew.cmu.edu. ("sw0l" is "ess double-you zero ell.") LIMITATIONS None reported. HARDWARE REQUIRED The KIP gateway agent runs on a Kinetics FastPath2/3/4. Otherwise, no restrictions. SOFTWARE REQUIRED The code was written with efficiency and portability in mind. The applications compile and run on the follow- NOCTools2 Working Group [Page 36]
RFC 1470 FYI: Network Management Tool Catalog June 1993 ing systems: IBM PC/RT running ACIS Release 3, Sun3/50 running SUNOS 3.5, and the DEC microVax running Ultrix 2.2. They are expected to run on any system with a Berkeley socket interface. AVAILABILITY This distribution is copyrighted by CMU, but may be used and sold without permission. Consult the copy- right notices for further information. The distribu- tion is available by anonymous FTP from the host lancaster.andrew.cmu.edu (128.2.13.21) as the files pub/cmu-snmp.9.tar, and pub/kip-snmp.9.tar. The former includes the libraries and the applications, and the latter is the KIP SNMP agent. Please direct questions, comments, and bug reports to sw0l+snmp@andrew.cmu.edu. ("sw0l" is "ess double-you zero ell.") If you pick up this package, please send a note to the above address, so that you may be notified of future enhancements/changes and additions to the set of applications (several are planned). NOCTools2 Working Group [Page 37]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog COMPUTER-SECURITY-CHECKLIST NAME Computer Security Checklist KEYWORDS security; DOS. ABSTRACT This program consists of 858 computer security ques- tions divided up in thirteen sections. The program presents the questions to the user and records their responses. After answering the questions in one of the thirteen sections, the user can generate a report from the questions and the user's answers. The thirteen sections are: telecommunications security, physical access security, personnel security, systems develop- ment security, security awareness and training prac- tices, organizational and management security, data and program security, processing and operations security, ergonomics and error prevention, environmental secu- rity, and backup and recovery security. The questions are weighted as to their importance, and the report generator can sort the questions by weight. This way the most important issues can be tackled first. MECHANISM The questions are displayed on the screen and the user is prompted for a single keystroke reply. When the end of one of the thirteen sections is reached, the answers are written to a disk file. The question file and the answer file are merged to create the report file. CAVEATS None. BUGS None known. LIMITATIONS None reported. HARDWARE REQUIRED No restrictions. NOCTools2 Working Group [Page 38]
RFC 1470 FYI: Network Management Tool Catalog June 1993 SOFTWARE REQUIRED DOS operating system. AVAILABILITY A commercial product available from: C.D., Ltd. P.O. Box 58363 Seattle, WA 98138 (206) 243-8700 NOCTools2 Working Group [Page 39]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog CMIP-LIBRARY NAME CMIP Library KEYWORDS manager; osi; cmis; unix; free, sourcelib. ABSTRACT The CMIP Library implements the functionality of the Common Management Information Service/Protocol as in the full international standards (ISO 9595, ISO 9596) published in 1990. It is designed to work with the ISODE package and can act as a building block for the construction of CMIP-based agent and manager applications. MECHANISM The CMIP library uses ISO ROS, ACSE and ASN.1 presentation, as implemented in ISODE, to provide its service. CAVEATS None. BUGS None known. LIMITATIONS None known. HARDWARE REQUIRED Has been tested on SUN 3 and SUN 4 architectures. SOFTWARE REQUIRED The ISODE protocol suite, BSD UNIX. AVAILABILITY The CMIP library and related management tools built upon it, known as OSIMIS (OSI Management Information Service), are publicly available from University College London, England via FTP and FTAM. To obtain information regarding a copy send email to osimis-request@cs.ucl.ac.uk or call +44 71 380 7366. NOCTools2 Working Group [Page 40]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog DECADDRS NAME decaddrs, decaroute, decnroute, xnsroutes, bridgetab KEYWORDS manager, map, routing; bridge, DECnet; NMS, SNMP; UNIX. ABSTRACT These commands display private MIB information from Wellfleet systems. They retrieve and format for display values of one or several MIB variables from the Wellfleet Communications private enterprise MIB, using the SNMP (RFC1098). In particular these tools are used to examine the non-IP modules (DECnet, XNS, and Bridg- ing) of a Wellfleet system. Decaddrs displays the DECnet configuration of a Wellfleet system acting as a DECnet router, showing the static parameters associated with each DECnet inter- face. Decaroute and decnroute display the DECnet inter-area and intra-area routing tables (that is area routes and node routes). Xnsroutes displays routes known to a Wellfleet system acting as an XNS router. Bridgetab displays the bridge forwarding table with the disposition of traffic arriving from or directed to each station known to the Wellfleet bridge module. All these commands take an IP address as the argument and can specify an SNMP community for the retrieval. One SNMP query is performed for each row of the table. Note that the Wellfleet system must be operating as an IP router for the SNMP to be accessible. MECHANISM Management information is exchanged by use of SNMP. CAVEATS None. BUGS None known. LIMITATIONS None reported. HARDWARE REQUIRED Distributed and supported for Sun 3 systems. NOCTools2 Working Group [Page 41]
RFC 1470 FYI: Network Management Tool Catalog June 1993 SOFTWARE REQUIRED Distributed and supported for SunOS 3.5 and 4.x. AVAILABILITY Commercial product of: Wellfleet Communications, Inc. 12 DeAngelo Drive Bedford, MA 01730-2204 (617) 275-2400 NOCTools2 Working Group [Page 42]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog DIG NAME DiG KEYWORDS status; DNS; spoof; UNIX; free. ABSTRACT DiG (domain information groper), is a command line tool which queries DNS servers in either an interactive or a batch mode. It was developed to be more convenient/flexible than nslookup for gathering perfor- mance data and testing DNS servers. MECHANISM Dig is built on a slightly modified version of the bind resolver (release 4.8). CAVEATS none. BUGS None known. LIMITATIONS None reported. HARDWARE REQUIRED No restrictions. SOFTWARE REQUIRED BSD UNIX. AVAILABILITY DiG is available via anonymous FTP from venera.isi.edu in pub/dig.2.0.tar.Z. NOCTools2 Working Group [Page 43]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog EMANATE_SNMP_RESEARCH NAME EMANATE: Enhanced MANagement Agent Through Extensions from SNMP Research. KEYWORDS alarm, control, manager, reference, security, status; bridge, Ethernet, FDDI, IP, OSI, ring, star; NMS, SNMP; sourcelib. ABSTRACT The EMANATE system provides a run-time extensible SNMP agent that dynamically reconfigures an agent's MIB without having to recompile, relink, or restart the agent. An EMANATE capable SNMP agent can support zero, one, or many subagents and dynamically reconfigure to connect or disconnect those subagents' MIBs. The EMANATE system consists of several logically independent components and subsystems: o Master SNMP agent which contains an API to communicate with subagents. o Subagents which implement various MIBS. o Subagent Developer's Kit which contains tools to assist in the implementation of subagents. o EMANATE libraries which provide the API for the subagent. MECHANISM A concise API allows a standard means of communication between the master and subagents. System dependent mechanisms are employed for transfer of information between the master and subagents. CAVEATS None. BUGS None known. LIMITATIONS None reported. NOCTools2 Working Group [Page 44]
RFC 1470 FYI: Network Management Tool Catalog June 1993 HARDWARE REQUIRED Multiple platforms including PC's, workstations, hosts, and servers are supported. Contact SNMP Research for more details. SOFTWARE REQUIRED C compiler. AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL This is a commercial product available under license from: SNMP Research 3001 Kimberlin Heights Road Knoxville, TN 37920-9716 Attn: John Southwood, Sales and Marketing (615) 573-1434 (Voice) (615) 573-9197 (FAX) CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY users@seymour1.cs.utk.edu NOCTools2 Working Group [Page 45]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog ETHERFIND_SUN NAME etherfind KEYWORDS traffic; ethernet, IP, NFS; eavesdrop; UNIX. ABSTRACT Etherfind examines the packets that traverse a network interface, and outputs a text file describing the traffic. In the file, a single line of text describes a single packet: it contains values such as protocol type, length, source, and destination. Etherfind can print out all packet traffic on the ethernet, or traffic for the local host. Further packet filtering can be done on the basis of protocol: IP, ARP, RARP, ICMP, UDP, ND, TCP, and filtering can also be done based on the source, destination addresses as well as TCP and UDP port numbers. MECHANISM In usual operations, and by default, etherfind puts the interface in promiscuous mode. In 4.3BSD UNIX and related OSs, it uses a Network Interface Tap (NIT) to obtain a copy of traffic on an ethernet interface. CAVEATS None. BUGS None known. LIMITATIONS Minimal protocol information is printed. Can only be run by the super user. The syntax is painful. HARDWARE REQUIRED Ethernet. SOFTWARE REQUIRED SunOS. AVAILABILITY Executable included in Sun OS "Networking Tools and Programs" software installation option. NOCTools2 Working Group [Page 46]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog ETHERNET-CODES NAME ethernet-codes KEYWORDS reference; ethernet, fddi; ; ; ; ABSTRACT Mike Patton of MIT LCS has compiled a very comprehensive list of the IEEE numbers used on Ethernet and FDDI (with some permutation). This file contains collected information on the various codes used on IEEE 802.3 and EtherNet. There are three "pages": type codes, vendor codes, and the uses of multicast (including broadcast) addresses. MECHANISM FTP the file and use it like a secret decoder ring. CAVEATS Since this information is from collected wisdom, there are certainly omissions. BUGS Mike welcomes any further additions. They can be sent to a special mailbox that he has set up: MAP=EtherNet-codes@LCS.MIT.Edu LIMITATIONS See caveats. HARDWARE REQUIRED No restrictions. SOFTWARE REQUIRED No restrictions. NOCTools2 Working Group [Page 47]
RFC 1470 FYI: Network Management Tool Catalog June 1993 AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL The file is stored as flat, non-compressed ASCII text. It can be FTP'ed from: ftp.lcs.mit.edu Retreive the file: /pub/map/EtherNet-codes To submit additions or obtain further assistance, send email to: MAP=EtherNet-codes@LCS.MIT.Edu CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY This entry maintained by the NOCtools editors. Send email to noctools-request@merit.edu NOCTools2 Working Group [Page 48]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog GENERIC-MANAGED-SYSTEM NAME Generic Managed System KEYWORDS manager; osi; cmis; unix; free, sourcelib ABSTRACT The Generic Managed System (GMS) implements the functions that would be common to any OSI managed system. These include the parseing of CMIS requests, selection of managed objects according to the scoping and filtering rules, handling of notifications and event forwarding discriminators etc. The intention is that the implementors should use the GMS as a basis for their own managed object implementations. A support environment is provided to assist with this. MECHANISM The GMS uses the UCL CMIP library plus a library of C++ objects representing common managed objects and attribute types. CAVEATS The system is still experimental, is subject to change and is not yet well documented. BUGS See above. LIMITATIONS None known. HARDWARE REQUIRED Has been tested on SUN 3 and SUN 4 architectures. SOFTWARE REQUIRED The ISODE protocol suite, BSD UNIX, UCL CMIP Library, GNU C++ (g++). AVAILABILITY The CMIP library and related management tools built upon it, known as OSIMIS (OSI Management Information Service), are publicly available from University College London, England via FTP and FTAM. To obtain information regarding a copy send email to osimis-request@cs.ucl.ac.uk or call +44 71 380 7366. NOCTools2 Working Group [Page 49]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog GETETHERS NAME getethers KEYWORDS Traffic; Ethernet; Ping; UNIX; Free ABSTRACT Getethers runs through all addresses on an ethernet segment (a.b.c.1 to a.b.c.254) and pings each address, and then determines the ethernet address for that host. It produces a list, in either plain ASCII, the file format for the Excelan Lanalyzer, or the file format for the Network General Sniffer, of hostname/ethernet address pairs for all hosts on the local nework. The plain ASCII list optionally includes the vendor name of the ethernet card in each system, to aid in the determination of the identity of unknown systems. MECHANISM Getethers uses a raw IP socket to generate ICMP echo requests and receive ICMP echo replies, and then examines the kernel ARP table to determine the ethernet address of each responding system. CAVEATS Assumes that the ethernet it is looking at is either a Class C IP network, or part of a Class B IP network that is subnetted with a netmask of 255.255.255.0. (This is easy to change, but it's compiled in.) BUGS None known. LIMITATIONS None. HARDWARE REQUIRED Has been tested on Sun-3 and Sun-4 (SPARC) systems under SunOS 4.1.x, DEC VAXes under 4.3BSD. SOFTWARE REQUIRED Runs under SunOS 4.x and 4.3BSD; should be easy to port to any other Berkeley-like system. Requires raw sockets and the ioctl calls to get at the ARP table. NOCTools2 Working Group [Page 50]
RFC 1470 FYI: Network Management Tool Catalog June 1993 AVAILABILITY AND CONTACT POINT FOR INFORMATION ABOUT THIS TOOL Public domain, and freely distributable. Available via anonymous FTP from harbor.ecn.purdue.edu; also has been posted to comp.sources.unix. The current version is Version 1.4 from May 1992. Contact point: Dave Curry Purdue University Engineering Computer Network 1285 Electrical Engineering Bldg. West Lafayette, IN 47907-1285 davy@ecn.purdue.edu CONTACT POINT FOR CHANGES TO THIS CATALOG ENTRY Dave Curry (see address above). NOCTools2 Working Group [Page 51]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog GETONE_WELLFLEET NAME getone, getmany, getroute, getarp, getaddr, getif, getid. KEYWORDS manager, routing, status; IP; NMS, SNMP; UNIX. ABSTRACT These commands retrieve and format for display values of one or several MIB variables (RFC1066) using the SNMP (RFC1098). Getone and getmany retrieve arbitrary MIB variables; getroute, getarp, getaddr, and getif retrieve and display tabular information (routing tables, ARP table, interface configuration, etc.), and getid retrieves and displays system name, identifica- tion and boot time. Getone <target> <mibvariable> retrieves and displays the value of the designated MIB variable from the specified target system. The SNMP community name to be used for the retrieval can also be specified. Getmany works similarly for groups of MIB variables rather than individual values. The name of each variable, its value and its data type is displayed. Getroute returns information from the ipRoutingTable MIB structure, displaying the retrieved information in an accessible format. Getarp behaves similarly for the address translation table; getaddr for the ipAddressTable; and getif displays information from the interfaces table, supplemented with information from the ipAddressTable. Getid displays the system name, identification, ipFor- warding state, and the boot time and date. All take a system name or IP address as an argument and can specify an SNMP community for the retrieval. One SNMP query is performed for each row of the table. MECHANISM Queries SNMP agent(s). CAVEATS None. BUGS None known. NOCTools2 Working Group [Page 52]
RFC 1470 FYI: Network Management Tool Catalog June 1993 LIMITATIONS None reported. HARDWARE REQUIRED Distributed and supported for Sun 3 systems. SOFTWARE REQUIRED Distributed and supported for SunOS 3.5 and 4.x. AVAILABILITY Commercial product of: Wellfleet Communications, Inc. 12 DeAngelo Drive Bedford, MA 01730-2204 (617) 275-2400 NOCTools2 Working Group [Page 53]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog HAMMER_ANVIL NAME hammer & anvil KEYWORDS benchmark, generator; IP; DOS; free. ABSTRACT Hammer and Anvil are the benchmarking programs for IP routers. Using these tools, gateways have been tested for per-packet delay, router-generated traffic over- head, maximum sustained throughput, etc. MECHANISM Tests are performed on a gateway in an isolated testbed. Hammer generates packets at controlled rates. It can set the length and interpacket interval of a packet stream. Anvil counts packet arrivals. CAVEATS Hammer should not be run on a live network. BUGS None reported. LIMITATIONS Early versions of hammer could not produce inter-packet intervals shorter than 55 usec. HARDWARE REQUIRED Hammer runs on a PC/AT or compatible, and anvil requires a PC or clone. Both use a Micom Interlan NI5210 for LAN interface. SOFTWARE REQUIRED MS-DOS. AVAILABILITY Hammer and anvil are copyrighted, though free. Copies are available from pub/eutil on husc6.harvard.edu. NOCTools2 Working Group [Page 54]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog HOPCHECK NAME hopcheck KEYWORDS routing; IP; ping; DOS; free. ABSTRACT Hopcheck is a tool that lists the gateways traversed by packets sent from the hopcheck-resident PC to a desti- nation. Hopcheck uses the same mechanism as traceroute but is for use on IBM PC compatibles that have ethernet connections. Hopcheck is part of a larger TCP/IP pack- age that is known as ka9q that is for use with packet radio. Ka9q can coexist on a PC with other TCP/IP packages such as FTP Inc's PC/TCP, but must be used independently of other packages. Ka9q was written by Phil Karn. Hopcheck was added by Katie Stevens, dkstevens@ucdavis.edu. Unlike traceroute, which requires a UNIX kernel mod, hopcheck will run on the standard, unmodified ka9q release. MECHANISM See the description in traceroute. CAVEATS See the description in traceroute. BUGS None known. HARDWARE REQUIRED IBM PC compatible with ethernet network interface card; ethernet card supported through FTP spec packet driver. SOFTWARE REQUIRED DOS. AVAILABILITY Free for radio amateurs and educational institutions; others should contact Phil Karn, karn@ka9q.bellcore.com. Available via anonymous FTP at ucdavis.edu, in the directory "dist/nethop". NOCTools2 Working Group [Page 55]
RFC 1470 FYI: Network Management Tool Catalog June 1993
RFC 1470 FYI: Network Management Tool Catalog June 1993 CAVEATS none. BUGS See Product Release Notice. LIMITATIONS Limitations on number of management agents and network management daemons not known at this time. HARDWARE REQUIRED Sun SPARC workstations and servers DEC DECstations and DECsystems Motorola MPC (Delta 8000 series) 3/486 PC and PC-compatible 16 MB RAM n20 MB free disk space for installation Color monitor strongly recommended SOFTWARE REQUIRED SunOS 4.1-1 or greater & OpenWindows 2.0 or greater (SUN) X Windows, 11.4 or greater RISC ULTRIX 4.1 or greater (DEC) R32V2 (Motorola) Open Desktop 1.1 or greater (3/486) Provided on 1/4" cartridge, TK-50 or 3 1/2" diskettes, as appropriate, in cpio format. AVAILABILITY A commercial product of: The Wollongong Group, Inc. 1129 San Antonio Rd Palo Alto, CA. 94303 ph.: (800) 962 - 8649 (in California) (800) 872 - 8649 (outside California) fax: (415) 962 - 0286 NOCTools2 Working Group [Page 168]
RFC 1470 FYI: Network Management Tool Catalog June 1993 Internet Tool Catalog XNETDB NAME Xnetdb KEYWORDS database, manager, map, monitoring, status; IP; Ping, SNMP, Unix, X; free. ABSTRACT Xnetdb is a network monitoring tool based on X Windows and SNMP which also has integrated database and statistic viewing capabilities. Xnetdb will determine and display the status of routers and circuits it has been told to monitor by querying the designated sites and displaying the result. It can also query the status of certain designated SNMP variables, such as a default route for an important router. Additionally, it also has integrated database functionality in that it can display additional information about a site or circuit such as the equipment at the site, the contact person(s) for the site, and other useful information. Finally it can gather designated statistical information about a circuit and display it on demand. MECHANISM Xnetdb uses SNMP or ping to monitor things which its configured to monitor. It dynamically builds a network map on its display by querying entities and obtaining IP addresses and subnet masks. A configuration file tells xnetdb which IP hosts you want to monitor. CAVEATS While "ping" can be used to monitor hosts, more useful results are obtained using SNMP. BUGS Bugs and other assorted topics are discussed on the xnetdb mailing list. To join, send a note to "xnetdb-request@oar.net". LIMITATIONS None. HARDWARE REQUIRED No restrictions. NOCTools2 Working Group [Page 169]
RFC 1470 FYI: Network Management Tool Catalog June 1993 SOFTWARE REQUIRED Most any variety of UNIX plus X-Windows and/or OpenWindows. AVAILABILITY Available via anonymous ftp from ftp.oar.net (currently 131.187.1.102) in the directory /pub/src. Special arrangements can be made for sites without direct IP access by sending a note to "xnetdb-request@oar.net". There are minimal licensing restrictions - these are detailed within the package. NOCTools2 Working Group [Page 170]
RFC 1470 FYI: Network Management Tool Catalog June 1993
RFC 1470 FYI: Network Management Tool Catalog June 1993 VRFY vrfy.tar.Z (Version 921021) 'vrfy' is a tool to verify email addresses and mailing lists. In its simplest form it takes an address "user@domain", figures out the MX hosts for "domain", and issues the SMTP command VRFY at the primary MX host (optionally all), or at "domain" itself if no MX hosts exist. Without "domain" it goes to "localhost". More complex capabilities are: recursively expanding forward files or mailing lists, and detecting mail forwarding loops. Full-blown RFC822 address specifications are understood. Syntax checking can be carried out either locally or remotely. Various options are provided to exploit alternative protocol suites if necessary, and to print many forms of verbose output. Obvious limitations exist, but on average it works pretty well. Needless to say you need internet (nameserver and SMTP) access. See the man page and the extensive documentation in the source for further details. Please send comments and suggestions to Eric Wassenaar <e07@nikhef.nl> If you want to receive notification of updates, please send an email with the keyword "subscribe" in the subject or the body to the address <net-dist-request@nikhef.nl> available as: nikhefh.nikhef.nl:/pub/network/vrfy.tar.Z NOCTools2 Working Group [Page 185]
RFC 1470 FYI: Network Management Tool Catalog June 1993 XNETLOAD NAME xnetload - ethernet load average display for X SYNOPSIS xnetload[-toolkitoption ...] [-scale integer] [-update seconds] [-hl color] [-highlight color] [-jumpscroll pixels] [-label string] [-nolabel] host DESCRIPTION The xnetload program displays a periodically updating histo- gram of the ethernet load average for the specified host. The resulting graph is scaled as 0% to 100%, where 0% corresponds to 0mbs and 100% corresponds to 10mbs. NOTE: The specified host must be running rpc.etherd. This program has been run using X11R4 and X11R5, under the following operating systems: SUNOS 4.1.0 SUNOS 4.1.1 ULTRIX V4.2 IRIX 3.3.2 Assuming the Imake templates and Rules are in order and in the proper place on your system, these programs should compile and link straightforward by running the following sequence: xmkmf make Then, as root, issue the following: make install make install.man Then, on your host system, (or on any other system you can rlogin or rsh into) start the etherd daemon with the following (must be root): /usr/etc/rpc.etherd le0 & where le0 is the mnemonic for the primary ethernet interface. To start the xnetload program, the following command line is suggested: ./xnetload -hl red host & NOCTools2 Working Group [Page 186]
RFC 1470 FYI: Network Management Tool Catalog June 1993 where "host" is the name of any reachable network node (including LOCALHOST) that is running the etherd daemon. A small xload window should appear on your local display with nine horizontal lines. The label: "Ethernet Load %" should appear in the upper left hand corner, just below any additional title bars or other decorations provided by your window manager. If the program comes up without the nine lines, or without the "Ethernet Load" label, then either your resource file is not properly installed in the appropriate app-defaults directory, or you may have picked up the wrong xnetload image. Try re-running "make install" as root, or be sure to include the "./" in front of the command name. Good Luck! The following changes have been made to this directory since R3: o Now use Athena StripChart widget. o Understands WM_DELETE_WINDOW. o 3-26-92 Modified from xload to xnetload by Roger Smith, Sterling Software at NASA-Ames Research Center, Mountain View, Calif. rsmith@proteus.arc.nasa.gov Availability: ftp proteus.arc.nasa.gov:pub/XEnetload.tar.Z (or check archie) NOCTools2 Working Group [Page 187]
RFC 1470 FYI: Network Management Tool Catalog June 1993 NETTEST nettest, nettestd - Performs client and server functions for timing data throughput The nettest and nettestd commands invoke client and server programs that are used for timing data throughput of various methods of interprocess communication. For TCP and OSI con- nections, the nettest program establishes a connection with the nettestd program, and then it does count writes of size bytes, followed by count reads of size bytes. For UDP, the nettest program performs only writes; reads are not per- formed. The nettestd program, if used with UDP connections, reads the data packets and prints a message for each data packet it receives. The number and size of the reads and writes may not correlate with the number and size of the actual data packets that are transferred; it depends on the protocol that is chosen. If you append an optional k (or K) to the size, count, or bufsize value, the number specified is multiplied by 1024. This source for nettest and nettestd are provided on an "as is" basis. Cray Research does not provide any support for this code (unless you are a customer who has purchased the UNICOS operating system). We will gladly take bug reports for nettest/nettestd. Suggested fixes are prefered to just bug reports. Changes to allow nettest/nettestd to run on other architectures are also welcomed. We will try to incorporate bugfixes and update the publicly available code, but we can make no guarantees. For copyright information, see the notice in each source file. Send bug-reports/fixes to: E-mail: dab@cray.com U.S. Mail: David Borman Cray Research, Inc. 655F Lone Oak Drive Eagan, MN 55121 Notes: 1) The -b option to nettestd has not been tested... 2) The ISO code should work on a 4.4BSD system, but the gethostinfo() routine is specific to UNICOS... Availability: ftp sgi.com:/sgi/src/nettest NOCTools2 Working Group [Page 188]
RFC 1470 FYI: Network Management Tool Catalog June 1993 ETHERCK etherck is a simple program that displays Sun ethernet statistics. If you have a high percents of input errors that are due to "out of buffers", then you can run the "iepatch" script to patch a kernel that uses the Intel ethernet chip ("ie"). A back of the envelope calculation shows that a .25% input error rate gives about a 10% degradation of NFS performance if 8k packets are being used. In our environment at Legato, patching the ie buffer allocation made the input error rate drop more than 2 orders of magnitude. This was after we had applied other networking fixes (e.g., using Prestoserve, going from thin wire to twisted pair) and pushed a higher load on the server. Note that both etherck and iepatch must be run by root (or you can make etherck setgid kmem). Availability: send EMAIL to: request@legato.com with a Subject line: send unsupported etherck The following is part of the 'help' file from the Legato Email Server: This message comes to you from the request server at Legato.COM, request@Legato.COM. It received a message from you asking for help. The request server is a mail-response program. That means that you mail it a request, and it mails back the response. The request server is a very dumb program. It does not have much error checking. If you don't send it the commands that it understands, it will just answer "I don't understand you". The request server has 4 commands. Each command must be the first word on a line. The request server reads your entire message before it does anything, so you can have several different commands in a single message. The request server treats the "Subject:" header line just like any other line of the message. You can use any combination of upper and lower case letters in the commands. The request server's files are organized into a series of directories and subdirectories. Each directory has an index, and each subdirectory has an index. The top-level index gives you an overview of what is in the subdirectories, and the index for each subdirectory tells you what is in it. NOCTools2 Working Group [Page 189]
RFC 1470 FYI: Network Management Tool Catalog June 1993 The server has 4 commands: "help" command: The command "help" or "send help" causes the server to send you the help file. You already know this, of course, because you are reading the help file. No other commands are honored in a message that asks for help (the server figures that you had better read the help message before you do anything else). SEND a request to Legato to get the rest of the help file! NOCTools2 Working Group [Page 190]
RFC 1470 FYI: Network Management Tool Catalog June 1993 NETCK netck is a shar file that contains the sources to build "netck", a network checker that uses the rstat(3R) protocol to gather and print statistics from machines on the network. netck is useful to help understand what part of what machines are potential NFS bottlenecks. To get this file, send email to the request server with the command "send unsupported netck". Availability: same as ETHERCK (send email To: request@legato.com; subject: HELP) NOCTools2 Working Group [Page 191]
RFC 1470 FYI: Network Management Tool Catalog June 1993 References [1] Stine, R., Editor, "FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices", FYI 2, RFC 1147, Sparta, Inc., April 1990



Back to RFC index

 

 



Sponsered-Sites:

Register domain name and transfer | Cheap webhosting service | Domain name registration

 

 

""