Introduction - If you have any usage issues, please Google them yourself
1. With sniffer functionality. 2. Capable of packet filtering 3. Be able to analyze the data packets, and can even log on the system testing and analysis. 4. To set detection rules can refer to the snort rules. 5. Can the rules set by user' s own alarm, record, or even to respond to. 6. Be able to generate intrusion detection system log to record all detected events.