eNMS - A vendor-agnostic NMS designed for network automation

  •        19

eNMS is an open source web application designed to help automate networks graphically. Nodes and links can be created either one by one by specifying all properties manually, or all at once by importing an Excel spreadsheet. Once created, all objects are displayed in a sortable and searchable table, from which they can be edited and deleted. The dashboard provides a graphical overview of all objects with dynamic charts.

http://enms.readthedocs.io/en/latest/base/general.html
https://github.com/afourmy/eNMS

Tags
Implementation
License
Platform

   




Related Projects

trigger - Trigger is a robust network automation toolkit written in Python that was designed for interfacing with network devices

  •    Python

Trigger is a robust network automation toolkit written in Python that was designed for interfacing with network devices and managing network configuration and security policy. It increases the speed and efficiency of managing large-scale networks while reducing the risk of human error. Started by the AOL Network Security team in 2006, Trigger was originally designed for security policy management on firewalls, routers, and switches. It has since been expanded to be a full-featured network automation toolkit.

napalm - Network Automation and Programmability Abstraction Layer with Multivendor support

  •    Python

NAPALM (Network Automation and Programmability Abstraction Layer with Multivendor support) is a Python library that implements a set of functions to interact with different router vendor devices using a unified API. NAPALM supports several methods to connect to the devices, to manipulate configurations or to retrieve data.

Network Security Toolkit (NST)

  •    Javascript

Network Security Toolkit (NST) is a bootable ISO image (Live DVD) based on Fedora 18 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanc

Network Asset Manager

  •    

Network Asset Manager is a Hardware and Software Inventory Management application. It is simple to use and collects information on all hardware and software components of your PC's and Servers on the network remotely.

Pawikan Network Management System

  •    

Pawikan is an open-source highly scalable network management system for small, medium, and large-scale networks. It aims to ease up network management of a complex network using its cool features such as network discovery and automatic configuration.


h-inventory

  •    VBScript

Web-based hardware/software inventory management for Windows, Linux, BSD computers. H-Inventory provides incident and intervention management, user and network management, network maps, services monitoring and application deployment.

GNU Modular Network Management System

  •    

GMNMs - GNU Modular Network Management System: A PHP / MySQL system for managing various network services via plugins. Currently Inventory, DHCP, and LTSP. Would like management for Imaging / Ghosting, WOL, and more.

Intelligent Network Management

  •    C++

WHEREAMI is an intelligent and self-learning network detection and configuration utility. With this capability, a user can just walk to a network range and WHEREAMI will self determine and connect to that network with relevant policies.

lnd - Lightning Network Daemon

  •    Go

The Lightning Network Daemon (lnd) - is a complete implementation of a Lightning Network node and currently deployed on testnet3 - the Bitcoin Test Network. lnd has several pluggable back-end chain services including btcd (a full-node) and neutrino (a new experimental light client). The project's codebase uses the btcsuite set of Bitcoin libraries, and also exports a large set of isolated re-usable Lightning Network related libraries within it.

graphpath - Graphpath generates an ASCII network diagram from the route table of a Unix/Linux

  •    Shell

Graphpath generates an ASCII network diagram from the route table of a Unix/Linux router. It's a BSDRP's tool. None: it's just a shell script using standards tools (route, arp, ifconfig on *BSD and ip on Linux).

PeerVPN - the open source peer-to-peer VPN

  •    C

PeerVPN is a software that builds virtual ethernet networks between multiple computers. Such a virtual network can be useful to facilitate direct communication that applications like file sharing or gaming may need. Often, such direct communication is made impossible or very difficult by firewalls or NAT devices.

Network Managment / Inventory System

  •    VBScript

PHP front end to RRDTool, networking inventory system, network management system utilizing AJAX and MySQL for search/database functions. ClearSite helps alleviate administration, by constantly updating and discovering data on its own!

Local Network Management System

  •    PHP

Open Source Local Network Management System for cable Network operators, using PHP and C programming. Design for best security performance and controllling all users on MAC addresses with session ID as to login and logout.

DeepNeuralClassifier - Deep neural network using rectified linear units to classify hand written symbols from the MNIST dataset

  •    Julia

Example scripts for a deep, feed-forward neural network have been written from scratch. No machine learning packages are used, providing an example of how to implement the underlying algorithms of an artificial neural network. The code is written in the Julia, a programming language with a syntax similar to Matlab. The neural network is trained on the MNIST dataset of handwritten digits. On the test dataset, the neural network correctly classifies 98.42 % of the handwritten digits. The results are pretty good for a fully connected neural network that does not contain a priori knowledge about the geometric invariances of the dataset like a Convolutional Neural Network would.

ReactiveNetwork - Android library listening network connection state and Internet connectivity with RxJava Observables

  •    Java

ReactiveNetwork is an Android library listening network connection state and Internet connectivity with RxJava Observables. It's a successor of Network Events library rewritten with Reactive Programming approach. Library supports both new and legacy network monitoring strategies. Min sdk version = 9. Please note: Due to memory leak in WifiManager reported in issue 43945 in Android issue tracker it's recommended to use Application Context instead of Activity Context.

Cheops-ng A Network Management Tool

  •    C

Cheops-ng is a Network management tool for mapping your network and monitoring your network. It has host/network discovery functionality as well as OS detection. It does a port scan of each computer to tell what services are running.

ONIE - Open Network Install Environment

  •    C

The Open Network Install Environment (ONIE) is an open source initiative that defines an open "install environment" for modern networking hardware. ONIE enables an open networking hardware ecosystem where end users have a choice among different network operating systems.

scapy - Scapy: the Python-based interactive packet manipulation program & library

  •    Python

Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work.

netcap - A framework for secure and scalable network traffic analysis

  •    Go

The Netcap (NETwork CAPture) framework efficiently converts a stream of network packets into highly accessible type-safe structured data that represent specific protocols or custom abstractions. These audit records can be stored on disk or exchanged over the network, and are well suited as a data source for machine learning algorithms. Since parsing of untrusted input can be dangerous and network data is potentially malicious, implementation was performed in a programming language that provides a garbage collected memory safe runtime. It was developed for a series of experiments in my bachelor thesis: Implementation and evaluation of secure and scalable anomaly-based network intrusion detection. Currently, the thesis serves as documentation until the wiki is ready, it is included at the root of this repository (file: mied18.pdf). Slides from my presentation at the Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities are available on researchgate.