3ae47bac4e
Signed-off-by: Benjamin Drung <benjamin.drung@profitbricks.com>
36 lines
1.3 KiB
Plaintext
36 lines
1.3 KiB
Plaintext
Source: fastnetmon
|
|
Maintainer: Pavel Odintsov <pavel.odintsov@gmail.com>
|
|
Section: net
|
|
Priority: optional
|
|
Standards-Version: 4.0.0
|
|
# debhelper 8 - squeeze, 9 - wheezy/jessie
|
|
Build-Depends: clang,
|
|
cmake,
|
|
debhelper (>= 8),
|
|
libboost-all-dev,
|
|
libboost-regex-dev,
|
|
libboost-system-dev,
|
|
libboost-thread-dev,
|
|
libgeoip-dev,
|
|
libgpm-dev,
|
|
liblog4cpp5-dev,
|
|
libncurses5-dev,
|
|
libpcap-dev
|
|
Homepage: https://fastnetmon.com/
|
|
|
|
Package: fastnetmon
|
|
Architecture: any
|
|
Depends: ${misc:Depends}, ${shlibs:Depends}
|
|
Description: Very fast DDoS analyzer with sflow/netflow/mirror support
|
|
FastNetMon is a very high performance distributed denial-of-service attack
|
|
(DDoS attack) detector built on top of multiple packet capture engines:
|
|
NetFlow, IPFIX, sFLOW.
|
|
.
|
|
It can detect hosts in your networks sending or receiving large volumes of
|
|
packets/bytes/flows per second. It can call an external script to notify you,
|
|
switch off a server, or blackhole the client.
|
|
.
|
|
To enable sFLOW, simply specify IP of the server running FastNetMon and specify
|
|
(configurable) port 6343. To enable netflow, simply specify IP of the server
|
|
running FastNetMon and specify (configurable) port 2055.
|