360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
chan-sccp-b is an extension of the original chan-sccp implementation for the Asterisk soft-PBX. It lets you hook up a Cisco/SCCP Phone to your Asterisk server using the SCCP protocol, which works a lot better than the SIP firmware on the same phone. It provides full phone functionality instead of just a simple SIP channel provider. It offers functionality like shared lines, hotline functionality, guest login, dynamic speeddials, private line automatic ring-down (PLAR), personal softkey configurations, Dundi support, SCCP extended dialplan functions, manager support, and custom device state buttons.
The klish is a framework for implementing Cisco-like command-line interfaces on Unix systems. It is configurable through XML files. "Klish" stands for "Kommand Line Interface SHell". The klish is a fork of clish 0.7.3 developed by Graeme McKerrell. The klish has some new features, but it's as compatible as possible with clish's XML configuration files.
Counters.pl collects the CLI counters from network devices and produces custom reports. These counters can be reset independently of the SNMP counters, and when collected weekly, can highlight issues such as connection errors that you will not see looking at graphs produced from SNMP counters. They also contain information that is not available via SNMP. The reports can be viewed on a Web site and/or sent via email. There is a flexible configuration language in which reports can be specified. The format and style of the HTML reports are controlled by Template Toolkit templates and CSS. Currently only Cisco network equipment is supported.
check_nwc_health is a plugin for the Shinken (or Nagios/Icinga) monitoring system. It is used to check hardware health, environment, interfaces, pools, uptime, etc. of a great range of the most popular network components like switches, routers, firewalls, proxies, load balancers, etc. Currently it can monitor: Cisco IOS, Cisco Nexus, F5 BIG-IP, CheckPoint Firewall1, Juniper NetScreen, HP Procurve, Nortel, Brocade 4100/4900, EMC DS 4700, EMC DS 24, Allied Telesyn, and Blue Coat SG600.