[ Thanks to steve
hill for this link. ]
“”So, surely, somebody can hack together a system to do
all of that logging in with SSH and checking stuff automatically,
right? Then, maybe they could put all the information together and
give you a neatly-arranged set of reports on the state of the whole
network that you could, say, view in your web browser? In a
nutshell, that’s what network monitoring software is supposed
to do.”