99.999% uptime management · Built for ISP scale

Network management
that never
goes down.

Full-stack open-source NMS built by engineers who manage real ASNs. TACACS+, SNMP, config backup, firewall management, and unified observability — one platform, zero vendor lock-in.

Self-hosted
Your infrastructure
<5min
Deploy time
Config history
LIVE · 99.999%
nms@5ninesnet:~

Everything your network
needs in one place

Built from the ground up for real-world network operations — not a checkbox SaaS product.

SNMPv3 Monitoring

Full SNMPv3 AuthPriv support with SHA/AES. Poll CPU, memory, interfaces, errors, and custom OIDs from Cisco IOS, ASA, NX-OS, and more.

SHA · AES · MIB-II
🔑

TACACS+ AAA

Full TACACS+ management UI backed by tac_plus. Per-user privilege levels, command authorization, and per-session audit trails with AD/LDAP integration.

tac_plus · AD · Priv 15

Config Backup + Git

Automated config archival via Oxidized. Every change committed to Git with full diff viewer, rollback capability, and per-device history timeline.

Oxidized · Git · Diff
🛡

UFW Firewall Manager

Visual rule management for the NMS server's UFW firewall. Add, remove, and audit ingress/egress rules without touching the CLI.

UFW · iptables · Policy

Fail2Ban IDS

Real-time intrusion detection dashboard. View active jails, banned IPs, ban/unban actions, and brute-force attempt timelines by source IP and service.

SSH · NGINX · TACACS

Grafana Alerting

Full Grafana Unified Alerting integration. Configure threshold alerts, SMTP/webhook notifications, silence windows, and alert routing — all from the portal UI.

Prometheus · Loki · PD
📡

Syslog Aggregation

Centralized syslog collection from all Cisco devices via rsyslog + Loki. Full-text search, filter by severity, device, facility. All correlated in Grafana.

rsyslog · Loki · Search

White-Label MSP

Deploy the full platform under your own brand. No 5NinesNet references. Complete theming, custom logos, customer-isolated tenants, and security transparency docs.

OEM · Multi-tenant · Custom
🔒

Zero-Trust Transparency

Customer-deployable packet capture and audit export. Prove to your clients exactly what data the NMS touches — a key differentiator over closed-source competitors.

PCAP · SBOM · SOC2-ready

Operational visibility
at every layer

Grafana-powered panels fed by Prometheus, Loki, and SNMP Exporter. Real device data from your actual environment.

⬡ Device CPU Utilization 24 HOUR
RT-EG-01-A
12%
SW-01-A
7%
ASA-EG-01
24%
NMS Server
8%
5NinesNet-DC
19%
◈ Memory Pool Utilization LIVE
40%
RT-EG-01-A
30%
SW-01-A
60%
ASA-EG-01
10%
NMS Server
📡 Syslog Stream LIVE
09:41:02RT-EG-01-A%BGP-5-ADJCHANGE: AS6461 neighbor 66.28.4.1 Up
09:40:55SW-01-A%LINK-3-UPDOWN: Interface Gi0/24, changed to up
09:38:11ASA-EG-01%ASA-4-106023: Deny tcp src 203.0.113.44/52881 dst 10.1.2.1/22
09:37:49RT-EG-01-A%OSPF-5-ADJCHG: Process 1, Nbr 10.1.1.1 Up
09:35:02ASA-EG-01%ASA-3-710003: TCP access denied by ACL from 45.146.164.100/34811
09:34:18NMS-Server%Fail2Ban: Ban 45.146.164.100 in jail sshd after 5 retries
09:33:41SW-01-A%SYS-5-CONFIG_I: Configured from console by ft on vty0
09:30:00RT-EG-01-A%SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 10.1.2.253 started
09:28:555NN-DC-01TACACS+ auth success: user ft from 10.1.3.14
⚡ Fail2Ban · Active Jails LIVE
3
Active Jails
14
Banned IPs
847
Blocked 24h
JailBannedAttempts 1hStatus
sshd11243● Active
nginx-http-auth218● Active
tacacs-auth14● Active
🔑 TACACS+ Auth Activity 7 DAYS
284Total auths
279Successful
5Failed
98.2%Success rate
Mon Tue Wed Thu Fri Sat Sun
ftpriv 15142 authRT-EG-01-A, SW-01-A, ASA
rmartinezpriv 798 authSW-01-A
achenread-only39 authRT-EG-01-A
unknown5 failASA-EG-01
⬙ Config Backup · Git Log 3/3 SYNCED
a3f9c2d ASA-EG-01: add static route for VPN pool 10.1.3.0/24 2m ago
8e1b447 RT-EG-01-A: update BGP prefix-list ZAYO-OUT 1h ago
c20d891 SW-01-A: configure port-security on Fa0/1-24 4h ago
--- a/ASA-EG-01/running-config 2h ago +++ b/ASA-EG-01/running-config 2m ago - route management 0.0.0.0 0.0.0.0 192.168.3.1 1 + route management 0.0.0.0 0.0.0.0 192.168.3.1 1 + route outside 10.1.3.0 255.255.255.0 10.1.1.5 1 + nat (outside,outside) source static obj-vpnpool obj-vpnpool

Up in five minutes.
Seriously.

01

Clone & Configure

Clone from GitHub. Edit a single config file with your device IPs, SNMP credentials, and SMTP settings.

git clone …
02

Run Bootstrap

One script installs all dependencies — FastAPI, Prometheus, Grafana, Loki, tac_plus, Oxidized, nginx, Fail2Ban, UFW.

./bootstrap.sh
03

Onboard Devices

Add routers, switches, and firewalls via the portal UI. Apply & Restart auto-generates snmp.yml and prometheus.yml.

Portal → Devices
04

Monitor & Audit

Full visibility from day one. Dashboards, alerts, TACACS audit logs, config diffs, and syslog — all live.

Dashboard → Live

Reports that write
themselves.

Scheduled PDF and CSV exports for network health, security posture, and compliance. Customer-ready on demand.

Network Health
Weekly Infrastructure Summary
Week of Mar 1–7, 2026
99.97%
Avg Uptime
12%
Peak CPU
3
Alerts Fired
9
Config Changes
Compliance
TACACS+ Access Audit
March 2026 · SOC2-ready
284
Auth Attempts
279
Successful
5
Failed
98.2%
Auth Rate
Security Posture
Monthly Threat Summary
March 2026 · Customer-facing
1,247
SSH Attempts
89
IPs Banned
0
Critical CVEs
100%
UFW Enforced

The heart of
network security —
finally manageable.

TACACS+ (Terminal Access Controller Access-Control System Plus) controls who logs into your routers, switches, and firewalls — what commands they can run, and creates a full audit trail of every action. It is the authentication backbone of every serious enterprise and ISP network.

Why TACACS+ is hard to find working Most engineers know TACACS+ exists. Very few have a working, auditable deployment. Cisco ISE costs $18,000+/yr and requires a dedicated infrastructure team. The open-source tac_plus daemon is powerful but ships as a compiled binary with a cryptic flat-file config — no UI, no reports, no visibility into what's happening. 5NinesNet solves both problems.
🔑 TACACS+ Access Audit — March 2026 Auto-generated · PDF / CSV export
284
Total Auths
279
Successful
5
Failed
98.2%
Success Rate
UserDevicePrivCommandTimeResult
ftRT-EG-01-A15show bgp summary09:41✓ permit
ftASA-EG-0115crypto key generate rsa09:38✓ permit
rmartinezSW-01-A7show interfaces08:52✓ permit
rmartinezSW-01-A7configure terminal08:53✗ deny
unknownASA-EG-0103:14✗ auth fail

Powerful — but built for Cisco's revenue, not your team

  • Starts at $18,000+/year. Per-device licensing adds up fast.
  • Requires dedicated VM infrastructure and a full-time admin to operate properly.
  • Complex policy engine — weeks of training before it's usable.
  • Closed source. You cannot audit what data it collects or where it sends it.
  • Overkill for ISPs and mid-market MSPs who just need solid AAA.
Typical cost: $18,000 – $60,000+/yr

The open-source option — but you're on your own

  • Ships as a compiled binary — no source code available. You cannot verify what it does.
  • Configuration is a cryptic flat file. One syntax error silently breaks authentication.
  • No management UI. Every change requires SSH and a text editor.
  • No audit reports. No dashboards. No visibility into who logged in or what commands ran.
  • Completely unmaintained for most distributions. Community support only.
Typical cost: $0 — but your time costs money

Open-source tac_plus — with a full management layer on top

  • Full source code auditable. You see exactly what's running on your server.
  • Web UI for users, groups, privilege levels, and command authorization rules.
  • Grafana dashboard shows real-time auth activity, success/fail rates, heatmaps by hour.
  • Automated PDF/CSV audit reports — SOC2-ready, customer-deliverable.
  • Active Directory / LDAP integration. Break-glass emergency local accounts included.
Cost: $0 per device · Self-hosted · Yours forever
🔑

Authentication (AuthN)

Every login to every Cisco IOS, ASA, NX-OS, or other TACACS-capable device goes through the 5NinesNet TACACS+ server. Username and password validated against local users, Active Directory groups, or both. Failed auth attempts are logged, bannered, and trigger Fail2Ban rate limiting automatically.

PAP · CHAP · MSCHAPV2AD / LDAPLocal fallbackBreak-glass account
⚖️

Authorization (AuthZ)

Granular per-user and per-group command authorization. Privilege level 15 for senior engineers, level 7 for NOC read-only, level 1 for view-only. Specific commands can be permitted or denied per user per device — no more "give everyone enable" because it's easier.

Per-user priv levelsCommand permit/denyPer-device policyGroup inheritance
📋

Accounting (Acct) — Full Audit Trail

Every command entered on every device is logged with timestamp, username, source IP, device, and result. The accounting log is ingested by Loki, queryable in Grafana, and exportable as PDF/CSV. Answers "who ran that command at 2am" in under 10 seconds.

Per-command loggingLoki ingestionFull-text searchTamper-evident
📊

Grafana Dashboards + Automated Reports

Live Grafana dashboard shows authentication activity by hour (7-day heatmap), success/fail rates per user, top devices, and anomaly detection. Automated weekly PDF reports are customer-deliverable — show your client a signed, timestamped access audit without touching the CLI.

7-day heatmapPDF exportCSV exportSOC2-ready

Why engineers choose
5NinesNet

Feature 5NinesNet SolarWinds ClearBox Auvik
Source Code Auditable✓ Full OSS
TACACS+ Management UI✓ FullPartial
Git-based Config Backup✓ NativeAdd-onSaaS only
Fail2Ban / UFW Management✓ Built-in
Self-Hosted✓ AlwaysOptionCloudCloud
White-Label / OEM✓ IncludedEnterprise
Zero-Trust Transparency✓ PCAP export
Starting Price $0 / mo $18,000+/yr $5,000+/yr $199+/mo
Built by an engineer
Farzam
Barabian-Eng
Network Engineer · ASN 53730 · Founder, 5NinesNet

5NinesNet started as an internal toolset for managing Railhead's production ISP infrastructure — BGP peering, MPLS VPNv4, ASA firewalls, Catalyst switching, and TACACS+ AAA at scale. After years of duct-taping open-source tools together, I built a unified platform that actually fits how network engineers work.

Everything is open source because transparency isn't a feature — it's the foundation. Your team should be able to audit exactly what's running on your network management server. That's why 5NinesNet is built on tools with readable source code, not black boxes.

Network Engineering ASN 53730 Cisco IOS / ASA / NX-OS BGP / MPLS / VPNv4 ISP Infrastructure FastAPI / React
Technology Stack
FastAPI
Backend API
React + Vite
Frontend
Prometheus
Metrics
Grafana
Dashboards
Loki + Promtail
Log aggregation
🔑
tac_plus
TACACS+ daemon
Oxidized + Git
Config backup
🛡
UFW + Fail2Ban
Host hardening
nginx + SSL
Reverse proxy
Ubuntu 24.04
Base OS
Get Started

Ready for 99.999%?

Built by network engineers. Deployed at ISP scale. Open source forever.

▶ Try Live Demo →

Username: admin  ·  Password: demo123