네트워크 모니터링 종합 도구 세트

OpUtils는 네트워크 엔지니어가 IT 자원을 모니터링, 진단 & 트러블슈팅할 수 있도록 도와주는 종합적인 모니터링 도구입니다.
  • 연결된 모든 포트를 찾기 위한 스위치 포트 맵퍼
  • 네트워크에서 사용하는 IP를 추적하는 IP 주소 매니저
  • 권한이 없는 네트워크 접근을 탐지하는 Rogue 탐지
  • 라우터 / 스위치의 구성 파일 백업
성공 사례
"Oputils은 네트워크에 관련된 문제를 최종 사용자가 알아차리기 전에 모니터링하는 단일 인터페이스를 제공해 줍니다."
- Jude Croyle, Director - IT, Meet Minneapolis » 더 보기
Rogue Systems Detection

Detect Wired and Wireless Rogue Systems/Devices

Network Monitoring - Summary View  

OpUtils periodically scans the routers and subnets to detect any new systems/devices found in the network. Initially it lists all the systems/devices discovered in the network. The Administrator has to verify and mark all the valid systems/devices in the network. During subsequent scans, if any new device/system is detected in the network, it get listed. This includes all types of devices like desktops/laptops (wired), mobile users (wireless), routers, switches, etc.

Rogue Systems Detection Features

  • Periodically scans the network to detect any new systems/devices
  • Ability to mark systems/devices as trusted, guest, and rogue
  • Shows the switch and port to which a system/device is connected
  • Alert when a new system/device is detected or when the guest validity expires.
  • Supports blocking of switch ports to prevent unauthorised access.


Rogue Detection is a useful tool that I use often. First devices get "discovered" by various scans, then utilizing all the host information displayed by OpUtils you can classify the host as either Trusted, Guest, or Rogue. If you classify the host as rogue you can block the device right from the Rogue Detection tool.

  Carl Vonhassel, State of Connecticut Judicial Branch More >>

Trusted Systems

Initially, OpUtils will list all the discoverd systems. The Administrator has to verify and mark all the valid network systems/devices as Trusted. The systems/devices that are marked as trusted will not be shown as rogue again.

Rogue Systems

When an unauthorised rogue system is found in the network, the Administrator can mark them as a Rogue Device and take appropriate action.

Allow Guest Access

There might be situations where there is a need to allow certain systems to access the network resources for a temporary period. For example, a personnel from a different branch visits your office for a month or a student enrolled for a semester need to be given access till he/she completes the semester. In such cases, the administrators can specify a period till which a particular system need to be considered as valid. Devices that are allowed guest access can any time be moved into allowed or rogue list. The administrators will also be notified when the allowed period expires.

Block Unauthorised Access

The administrators are notified about unauthorised access as soon as it is detected. When combined with Switch Port Mapping, it also provides the details of the switch and port through which the rogue system is accessing the network. The switch port can be blocked or unblocked from within OpUtils. This enables them to act quickly in blocking the access.

Instant Alert Notification

OpUtils notifies the administrators about the detection of any unauthorised network access instantly. The notification can be through email and or by playing a sound. Email notifications can be effected to multiple persons.

For more details on rogue detection, refer to the Rogue Detection Tool topic in the online help. Refer to Rogue Detection Knowledge Base for troubleshooting tips.

Switch Port & IP Address Management
Switch Port Mapper IP Address Manager Rogue Detection Wake On LAN MAC-IP Resolver DHCP Scope Monitor Cisco Config File Manager SNMP Bandwidth Monitor OpUtils Download View Online Demo