ng
Generate, build, serve, and test Angular applications
TLDR
Create a new Angular application inside a directory
Add a new component to one's application
Add a new class to one's application
Add a new directive to one's application
Run the application with the following command in its root directory
Build the application
Run unit tests
Display the version of your current Angular installation
SYNOPSIS
ng [options] device
PARAMETERS
-i interface
Listen on the specified network interface.
-r file
Read data from the specified file, which must contain previously captured NetFlow data.
-l addr
Listen on the specified addr for Netflow traffic.
-w file
Write captured traffic to file.
-q
Quiet output (only display statistics).
-v level
Set verbosity level (0-3, default 1).
-h
Display help message and exit.
DESCRIPTION
The `ng` command is a network traffic analyzer that provides detailed information about network flows based on NetFlow data. It's a command-line tool designed to capture, analyze, and report on network traffic statistics, aiding in network monitoring, troubleshooting, and security analysis. It is used primarily to analyze network traffic from devices exporting flows like Cisco Routers. It can work with v5, v9 and ipfix data formats.
CAVEATS
The `ng` command relies on NetFlow data being properly configured and exported from network devices. Accuracy of analysis depends heavily on the quality and completeness of the NetFlow records.
DATA INTERPRETATION
Understanding NetFlow data is crucial for effective analysis with `ng`. Key fields include source/destination IP addresses, ports, protocol, and packet/byte counts. Understanding IP headers is important
The tool focuses on summarizing flows rather than providing raw packet captures.
HISTORY
The specific history of the `ng` command is not widely documented in readily available resources. Tools of this nature came into being with the deployment of netflow monitoring with the original intent of capturing utilization data for billing purposes. Over time these technologies and the tooling has been expanded for monitoring and security analytics.