Web Hosting Security

  Home arrow Web Hosting Security arrow Monitor Your Network with PacketFence
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

Monitor Your Network with PacketFence
By: Joe Eitel
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 3
    2010-12-22

    Table of Contents:
  • Monitor Your Network with PacketFence
  • Supported Features

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Monitor Your Network with PacketFence


    (Page 1 of 2 )

    If your computer has been giving you trouble, chances are the last thing you want to do is download yet another thing that will possibly slow it down—unless that “thing” is PacketFence.

    So, what is PacketFence? According to its creators, it’s a fully supported and trusted free and open source network access control, otherwise known as an NAC system. Some of its features include “a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, and integration with the Snort IDS and the Nessus vulnerability scanner.”

    In case you don’t speak geek, PacketFence breaks it down for users like this: if your network is a breeding ground for worms, PacketFence is for you. If you have no idea who connects to your network and who owns a particular computer, PacketFence is for you. If you have no way of mapping a network policy violation to a user, PacketFence is for you.

    Essentially, the system is intended to be used to secure networks of all sizes, from very small to very large. And if this isn’t enough to convince you to download the system, consider this: it’s used by banks, colleges and universities, engineering companies, manufacturing businesses, and school boards across the country.

    Features

    For the average home user, the previously-listed features may not have seemed very impressive. After all, not all of us are familiar with what 802.1X support means (though we’ll get to that in a moment). To put things in simpler terms, here are some simple, straight forward, and much needed tasks with which PacketFence can help home users:

    • Block an iPod’s wireless access

    • Forbid rogue access points

    • Perform routine compliance checks

    • Eliminate Peer-to-Peer traffic

    • Provide guest access

    • Simplify VLAN management

    The more cryptic-sounding PacketFence features are just as integral, important, and useful to the system as the more simplified features just listed. Thankfully, the PacketFence website provides a rundown of what some of these features actually mean -- and even more important, what they actually do. Read on to learn about these features.

    More Web Hosting Security Articles
    More By Joe Eitel

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap