1. PuTTY for SSH Access DOWNLOAD
PuTTY is a Secure Shell (SSH) client that runs on Windows. You can use PuTTY to access remote network devices (Routers, switches, firewalls, Unix Servers etc) using the secure SSH protocol. With an increased emphasis on security, most network devices can now be remotely accessed via SSH. PuTTY supports SSH versions 1 and 2 along with Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). With a single click of a button, you can also log a session for later review. PuTTY also supports Telnet.
2. PumpKIN TFTP Server DOWNLOAD
Most network devices use the Trivial File Transfer Protocol (TFTP) as the primary way to transfer system image files or configuration files, so a simple, stable TFTP server is an essential part of a network administrator toolkit. PumpKIN TFTP server provides a simple, easy to use GUI and runs on all versions of Windows. PumpKIN also plays .wav files to provide audio alerts indicating the state of a TFTP transfer- A feature that is very handy for multitasking network administrators.
3. Kiwi Syslog Server DOWNLOAD
Because most network devices use the Syslog protocol to generate system messages, deploying a centralized Syslog server is often recommended. Additionally, network administrators might occasionally need a local Syslog server that can be quickly deployed for testing or troubleshooting purposes. Kiwi Syslog server is an easy to use but versatile tool that runs on all versions of Windows. Kiwi Syslog provides the built in ability to listen to Simple Network Management Protocol (SNMP) traps, too. An additional useful feature is that Kiwi will monitor the free disk space on the server itself. When the disk space falls below a configured threshold, Kiwi generates email and audio alerts- a very useful feature that prevents messages being lost due to lack of disk space.
4. Nmap Network scanner DOWNLOAD
Originally developed as a hacker tool, mainstream networking professionals now use Nmap for security testing of firewalls, routers, and intrusion detection systems. Nmap can generate ping sweeps to scan a range of IP addresses, verify the working of specific TCP or UDP ports on a target machine, quickly scan the TCP or UDP ports on a target host, and use OS fingerprinting techniques to make an educated guess about the OS running on the target devices. Nmap use may be prohibited in many secure environments and can trigger IDS alarms, so always check your corporate security policies before using Nmap.
5. Ethereal Protocol Analyzer DOWNLOAD
Ethereal is a commercial grade network and protocol analyzer that can be installed over both Windows and Linux platforms. Ethereal is basicaly a traffic sniffer which can analyze more than 700 network protocols.