Traffic files can be selected and replayed at the touch of a button. Traffic files can also be organised into groups for replaying and exporting to other users. Traffic IQ Professional can import many different types of network capture files for replaying including NetMon, Ethereal, TcpDump, WinDump, LibPcap, Redhat Linux. When replaying traffic you have complete control over the parameters used including IP and MAC addresses, ports, time to live (TTL), delay and direction.
Traffic Scan Lists
Traffic Scan Lists can be created easily using the point and click user interface. These powerful scan lists can be used for replaying traffic from entire classes of IP addresses and ports to an individual machine, group, range or class of IP addresses and ports. Scan lists can be used with both standard protocols and threat traffic.
Using the built-in report viewer you can quickly and easily determine exactly what traffic was sent, the parameters used and clearly see if the traffic was successfully sent and received (permitted) or if the traffic was blocked (denied).
Traffic File Editor
The Traffic File Editor can be used to open any traffic file for review or to modify its contents. This is a very useful feature when auditing and verifying the recognition and response capabilities of intrusion detection and prevention systems.
The Command Prompt is a powerful tool that enables users to run individual or groups of traffic files from the command line. This is particularly useful for automating tests and for scheduling batches of tests to run at a particular day or time. The command line supports all of the advance replay parameter and network settings within the graphical user interface.
The easy to use point and click graphical network settings interface within Traffic IQ Professional allows users to quickly configure very simple to highly complex audit and test scenarios, including support for multiple gateways, network address translation and random sequence number generation.
Traffic IQ Professional is supplied with a fully maintained and extensive traffic library containing more than 3000 standard protocol and threat traffic files. The traffic library is updated regularly with approximately 50 new threat traffic files added each month, ensuring you are always up to date with the latest attack and exploit traffic.