Our Products 5NinesNet SecureEdge Who It's For Problems We Solve NMS Platform TACACS+ HA Failover Pricing About ▶ Live Demo
Built for ISPs · MSPs · Regulated networks

Pass audits.
Control access.
Eliminate vendor lock-in.

A managed network management platform for teams that can't afford black-box tools or silent telemetry. Deployed on your infrastructure. Auditable down to the source. Supported by the engineer who built it — with commercial SLAs when you need them.

Self-hosted
Your infrastructure
<5min
Deploy time
Config history
INTERNET Transit Provider RT-EG-01-A Edge Router · ASR1001-X BGP UP SW-01-A Catalyst 3750 · 48-port TACACS ✓ ASA-EG-01 ASA 5512-X · VPN GW 4 VPN 5NinesNet-DC AD · LDAP · DNS VPN Client VPN Client NMS · 10.1.2.251 HA Active · v1.2.0 Gi0/1 Gi0/2
BGP · Established
TACACS+ · 3 devices · Auth active
ASA CPU 24% · 4 VPN sessions
NEW PRODUCT
S

Turn OPNsense into a security operations platform.

A modern security workspace for firewall control, VPN visibility, threat detection, DNS protection, and safer network changes — with real-time VPN/Proxy/Tor detection that no other firewall at this price point offers.

OPNsense is powerful. SecureEdge makes it operational.

Explore SecureEdge → See Both Products

Two specialized portals.
One engineering relationship.

5NinesNet builds focused network management products — not sprawling all-in-one suites. Each portal does one job well, runs on your infrastructure, and is backed by the engineer who wrote the code.

N
Product · 01

NMS Portal

A managed network management platform for monitoring, AAA, and observability. TACACS+, SNMPv3, config backup, HA failover, performance testing — everything network operators need to manage BGP, MPLS, and multi-vendor fleets.

TACACS+ AAA SNMPv3 Config Backup HA Failover White-Label MSP
Built for
ISPs · MSPs · NetOps
Pricing
From $2,988/yr
Explore Features → ▶ Live Demo
NEW
S
Product · 02

5NinesNet SecureEdge

Turns OPNsense into a complete security operations platform. Featuring real-time VPN/Proxy/Tor detection — an exclusive capability that catches rotating residential proxies every 10 seconds. Plus firewall operations, IDS/IPS, DNS filtering, GeoIP, CrowdSec, and commit-confirm safety — from one modern workspace.

★ Dynamic VPN Detection ⇋ Site-to-Site IPsec Firewall Rules IDS/IPS · Suricata DNS · GeoIP CrowdSec Commit-Confirm
Built for
SMBs · Homelabs · MSPs
Pricing
From $1,488 one-time
Explore SecureEdge →
WHICH PRODUCT DO I NEED?

If you're managing routers, switches, and TACACS+ at ISP or enterprise scale — start with NMS Portal. If you're running an OPNsense firewall and want modern day-to-day security operations — start with 5NinesNet SecureEdge. Many customers deploy both; we offer a bundled engagement when that makes sense.

Three teams. One platform.

5NinesNet isn't for everyone. It's built for teams with specific network management requirements that generic SaaS tools can't meet.

🌐
PERSONA 01

ISPs & Carriers

"We run BGP with multiple transits. We have dozens of devices. TACACS+ is mission-critical. Our config history is a mess of SCP dumps nobody trusts."

  • ✓ BGP session monitoring + peer status
  • ✓ TACACS+ with per-command audit trail
  • ✓ Git-backed config archival (Oxidized)
  • ✓ HA failover between NMS nodes
  • ✓ No per-device licensing fees
See TACACS+ deep dive →
PERSONA 02

MSPs & Network Providers

"We sell managed network services. We need customer-isolated tenants, white-label reports under our brand, and a platform we can stand behind without rebuilding from scratch."

  • ✓ White-label theming (your brand, not ours)
  • ✓ Multi-tenant customer isolation
  • ✓ Customer-facing audit reports (PDF/CSV)
  • ✓ Per-customer Grafana dashboards
  • ✓ MSP partner tier with volume pricing
See MSP edition →
🛡
PERSONA 03

Gov · Defense · Critical Infra

"We run air-gapped. Our procurement team asks for SBOMs. We can't deploy anything that phones home. Every component must be verifiable before it touches our network."

  • ✓ Air-gap deployable (zero external calls)
  • ✓ Full SBOM with every release
  • ✓ Verifiable with tcpdump — no telemetry
  • ✓ Full source code auditable pre-deployment
  • ✓ US-based engineering, no foreign code deps
See trust & transparency →

The reasons engineers actually call us.

Stripped of marketing language, here are the five network management problems that drive buyers to 5NinesNet. If any of these sound like your week, we should talk.

✗ THE PROBLEM

"You got audited last week. Nobody could tell the auditor who ran conf t on the edge router at 2am on March 3rd."

✓ THE SOLUTION

Full TACACS+ command accounting. Every command, every user, every device, every timestamp — searchable in Grafana, exportable as PDF.

✗ THE PROBLEM

"Your security team can't let you deploy the SaaS NMS. It phones home with your network topology. Procurement is stuck."

✓ THE SOLUTION

Zero outbound telemetry. Verifiable with tcpdump before you sign. Full SBOM with every release.

✗ THE PROBLEM

"Cisco ISE quote came back at $40K/year just for the licenses. We're a 12-device network."

✓ THE SOLUTION

Flat appliance pricing. No per-device licensing. Same TACACS+ capability Cisco charges for — plus monitoring, config backup, and HA in the same platform.

✗ THE PROBLEM

"Our vendor support is a ticket queue in another time zone. When the border router went down, we got a Tier-1 script-reader asking us to reboot."

✓ THE SOLUTION

Your support tickets reach the engineer who wrote the code. Not a call center. Not Tier 1. The person who knows the commit history.

✗ THE PROBLEM

"What if our NMS vendor gets acquired or shuts down? We've got 200 device configs depending on their software working forever."

✓ THE SOLUTION

Source escrow is built in — the code is yours from day one. If we vanish, your team forks the repo and keeps running. Vendor-proof by design.

Everything your network
needs in one place

Built from the ground up for real-world network operations — not a checkbox SaaS product.

🔑

TACACS+ AAA

Full TACACS+ management UI backed by tac_plus. Per-user privilege levels, command authorization, and per-session audit trails with AD/LDAP integration.

tac_plus · AD · Priv 15

SNMPv3 Monitoring

Full SNMPv3 AuthPriv support with SHA/AES. Poll CPU, memory, interfaces, errors, and custom OIDs from Cisco IOS, ASA, NX-OS, and more.

SHA · AES · MIB-II

Config Backup + Git

Automated config archival via Oxidized. Every change committed to Git with full diff viewer, rollback capability, and per-device history timeline.

Oxidized · Git · Diff
🔁

High-Availability Failover

Active/Standby HA with VRRP VIP, automated rsync of Loki, Prometheus, syslog, and TACACS data. Preflight health checks before every sync. Zero-downtime management continuity.

VRRP · rsync · Preflight

White-Label MSP

Deploy the full platform under your own brand. No 5NinesNet references. Complete theming, custom logos, customer-isolated tenants, and security transparency docs.

OEM · Multi-tenant · Custom
See all 17 capabilities

Operational visibility
at every layer

Grafana-powered panels fed by Prometheus, Loki, and SNMP Exporter. Real device data from your actual environment.

⬡ Device CPU Utilization 24 HOUR
RT-EG-01-A
12%
SW-01-A
7%
ASA-EG-01
24%
NMS Server
8%
5NinesNet-DC
19%
◈ Memory Pool Utilization LIVE
40%
RT-EG-01-A
30%
SW-01-A
60%
ASA-EG-01
10%
NMS Server
📡 Syslog Stream LIVE
09:41:02RT-EG-01-A%BGP-5-ADJCHANGE: Transit neighbor Up
09:40:55SW-01-A%LINK-3-UPDOWN: Interface Gi0/24, changed to up
09:38:11ASA-EG-01%ASA-4-106023: Deny tcp src 203.0.113.44/52881 dst 10.1.2.1/22
09:37:49RT-EG-01-A%OSPF-5-ADJCHG: Process 1, Nbr 10.1.1.1 Up
09:35:02ASA-EG-01%ASA-3-710003: TCP access denied by ACL from 45.146.164.100/34811
09:34:18NMS-Server%Fail2Ban: Ban 45.146.164.100 in jail sshd after 5 retries
09:33:41SW-01-A%SYS-5-CONFIG_I: Configured from console by ft on vty0
09:30:00RT-EG-01-A%SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 10.1.2.253 started
09:28:555NN-DC-01TACACS+ auth success: user ft from 10.1.3.14
⚡ Fail2Ban · Active Jails LIVE
3
Active Jails
14
Banned IPs
847
Blocked 24h
JailBannedAttempts 1hStatus
sshd11243● Active
nginx-http-auth218● Active
tacacs-auth14● Active
🔑 TACACS+ Auth Activity 7 DAYS
284Total auths
279Successful
5Failed
98.2%Success rate
Mon Tue Wed Thu Fri Sat Sun
ftpriv 15142 authRT-EG-01-A, SW-01-A, ASA
rmartinezpriv 798 authSW-01-A
achenread-only39 authRT-EG-01-A
unknown5 blockedFail2Ban auto-ban
⬙ Config Backup · Git Log 3/3 SYNCED
a3f9c2d ASA-EG-01: add static route for VPN pool 10.1.3.0/24 2m ago
8e1b447 RT-EG-01-A: update BGP prefix-list ZAYO-OUT 1h ago
c20d891 SW-01-A: configure port-security on Fa0/1-24 4h ago
--- a/ASA-EG-01/running-config 2h ago +++ b/ASA-EG-01/running-config 2m ago - route management 0.0.0.0 0.0.0.0 192.168.3.1 1 + route management 0.0.0.0 0.0.0.0 192.168.3.1 1 + route outside 10.1.3.0 255.255.255.0 10.1.1.5 1 + nat (outside,outside) source static obj-vpnpool obj-vpnpool

Up in five minutes.
Seriously.

01

Clone & Configure

Clone from GitHub. Edit a single config file with your device IPs, SNMP credentials, and SMTP settings.

git clone …
02

Run Bootstrap

One script installs all dependencies — FastAPI, Prometheus, Grafana, Loki, tac_plus, Oxidized, nginx, Fail2Ban, UFW.

./bootstrap.sh
03

Onboard Devices

Add routers, switches, and firewalls via the portal UI. Apply & Restart auto-generates snmp.yml and prometheus.yml.

Portal → Devices
04

Monitor & Audit

Full visibility from day one. Dashboards, alerts, TACACS audit logs, config diffs, and syslog — all live.

Dashboard → Live

Reports that write
themselves.

Scheduled PDF and CSV exports for network health, security posture, and compliance. Customer-ready on demand.

Network Health
Weekly Infrastructure Summary
Week of Mar 1–7, 2026
99.97%
Avg Uptime
12%
Peak CPU
3
Alerts Fired
9
Config Changes
Compliance
TACACS+ Access Audit
March 2026 · Auditor-ready
284
Auth Attempts
279
Successful
5
Failed
98.2%
Auth Rate
Security Posture
Monthly Threat Summary
March 2026 · Customer-facing
1,247
SSH Attempts
89
IPs Banned
0
Critical CVEs
100%
UFW Enforced

Intentional topology — not auto-discovery spaghetti.

Most NMS tools show you everything your network contains. 5NinesNet shows you everything your team needs to see. Curated multi-canvas views, drag-and-drop layout, ghost/alias nodes, and multi-hop chain links — your topology as a living document of network intent, not a scan result.

Gi0/1 → Gi0/24 → Gi0/1 RT-EG-01-A 10.1.2.1 ASA-EG-01 10.1.2.12 SW-01-A 10.1.2.11 SW-01-A alias 5NinesNet-DC 10.1.2.254 ⬡ Edit Link ⧉ Create Alias ✕ Delete Device

Multi-Hop Chain Links

Links store a full hops[] path — Source → via SW1 Gi0/24 → via ASA → Target. Each hop has SNMP interface pickers for in/out interfaces. Labels render on-canvas offset from the line.

Ghost / Alias Nodes

Right-click any device → Create Alias. The alias shares the same IP and SNMP data as the original, appears with a dashed border and numbered badge (② ③), and can connect to different parts of the topology. Deleting an alias never affects the original.

Live Right-Click Editing

Right-click any link to open the full hop-builder pre-filled with existing hops and interface assignments. Changes are saved via PATCH — no page reload, no data loss.

Color Ring Visual Grouping

All instances of the same physical device — original and all aliases — automatically share a unique color ring derived from the device ID. No configuration required.

Multi-Canvas Views

Separate canvases for WAN, per-site, management, and core topology. Each view is purposeful — your NOC team sees what matters for their scope. No spaghetti, no unused interfaces, no decommissioned devices cluttering the map.

Intentional vs Auto-Discovery

Auto-discovery tools map everything — unmanaged printers, loopbacks, VLAN interfaces, stale hosts. The map becomes unreadable in days. 5NinesNet puts you in control: you decide what goes on the canvas, and the result stays clean forever.

Know your network's real capacity.

Built-in iPerf3 TCP/UDP, ping, traceroute, and DNS tests. Run from the local NMS or SSH into any remote node to measure real WAN throughput from the network edge — not from the server room. Results feed directly into Grafana for time-series trending.

⚡ Performance Tests LIVE
NameTargetTypeLast Result
RT Edge Throughput 10.1.2.1 iPerf3 941 Mbps
ASA VPN Latency 10.1.2.12 Ping 2.1 ms
Copy of RT Edge Throughput 10.1.2.11 iPerf3 487 Mbps
BGP Path Trace 203.0.113.1 Traceroute 9 hops OK
RT-EG-01-A · iPerf3 Result LATEST
Download
941 Mbps
Upload
910 Mbps
Jitter
0.4 ms
Packet Loss
0.0%

iPerf3 Throughput Testing

Measure real TCP/UDP throughput between NMS and any network device or server. See download, upload, jitter, and packet loss per test run — with trend history.

Ping & Latency Monitoring

Continuous RTT tracking with min/avg/max and packet loss. Alerts fire when latency spikes above threshold. All data stored in Prometheus for Grafana trend visualization.

Traceroute Path Analysis

On-demand traceroute with hop-by-hop RTT and ICMP response analysis. Identify path changes, asymmetric routing, and transit provider issues before customers do.

Clone Test in One Click

Hit the ⧉ clone icon on any test row to instantly copy all settings — target, type, schedule, thresholds — prefilled with a "Copy of" prefix so you can modify and save without rebuilding from scratch.

Scheduled & On-Demand

Tests run on configurable intervals (every 5 min to every 24h) or triggered manually. Historical results surface in the dashboard so you can see when throughput degraded — even after the fact.

Test from the network edge, not the server room.

Register any remote NMS node in seconds. SSH key trust is installed automatically — no agents, no VPN tunnels, no manual copy-paste. Once enrolled, performance tests originate from that node's network vantage point, giving you real end-to-end measurements across your WAN.

🌐 Remote NMS Nodes LIVE
NodeIPSSHPorts
NYC-NMS-01 10.2.0.10 ● Trusted ✓ 5201 · 9090 · 3100
LAX-NMS-01 10.5.0.10 ● Trusted ✓ 5201 · 9090 · 3100
LHR-NMS-01 10.8.0.10 ⚠ Not verified Install Trust →
🔒 Zero-Trust UFW Rules AUTO
5201 ALLOW IN 10.2.0.10 # nms-remote-node:nyc
9090 ALLOW IN 10.2.0.10 # nms-remote-node:nyc
3100 ALLOW IN 10.2.0.10 # nms-remote-node:nyc
# No ALLOW Anywhere — scoped per node only

One-Click SSH Trust Install

Enter the remote node's SSH username and password. The portal automatically installs the SSH public key via sshpass, verifies passwordless access, and confirms all required ports are reachable — no manual copy-paste, no terminal required.

Zero-Trust Firewall Scoping

When a node is enrolled, UFW rules are automatically added scoped to that node's IP only — ports 5201, 9090, and 3100. Broad ALLOW Anywhere rules are removed. When a node is deleted, its rules are removed. The firewall always reflects exactly what's enrolled.

Port Verification from Remote

After trust is installed, the portal SSHes into the remote node and tests each required port back to the collector using netcat. You see green/red per port — not just "it worked" but proof that the network path is actually open end-to-end.

Auto-Creates Performance Endpoint

Adding a remote node automatically creates a Performance endpoint — no double-entry. Tests set to use that node as source will SSH in and run iperf3 from the remote site. Delete the node and the endpoint is cleaned up automatically.

Built for the operations floor.

Full-screen NOC dashboard optimized for wall displays and operations centers. Real-time device health, BGP status, active alarms, and syslog stream — auto-refreshing with zero operator interaction required.

March 13, 2026 · 14:37:09 UTC
● 3 UP ● 1 WARN BGP OK VPN 4 SESSIONS
RT-EG-01-A
10.1.2.1 · ASR1001-X
CPU12%
Memory40%
BGP● ESTAB
Interfaces4/4 UP
Uptime: 47d 12h 04m
SW-01-A
10.1.2.11 · Cat3750
CPU7%
Memory30%
TACACS● AUTH OK
Ports22/48 UP
Uptime: 12d 08h 41m
ASA-EG-01
10.1.2.12 · ASA 5512-X
CPU24%
Memory60%
VPN4 SESSIONS
ACL Hits847/hr
Uptime: 22d 19h 55m
NMS-01-A
10.1.2.253 · Active HA
CPU8%
Memory10%
HA Sync● IN SYNC
TACACS● RUNNING
Version: v1.2.0
📡 Syslog Stream
14:37:02RT-EG-01-A%BGP-5-ADJCHANGE: Transit neighbor Up
14:36:45SW-01-A%LINK-3-UPDOWN: Gi0/24 changed to up
14:35:11ASA-EG-01%ASA-4-106023: Deny tcp src 203.0.113.44/52881
14:34:18NMS-01-AFail2Ban: Ban 45.146.164.100 in jail sshd
14:33:02SW-01-A%SYS-5-CONFIG_I: Configured by ft on vty0
🌐 BGP Peers
203.0.113.1
Transit Provider
● ESTAB
Prefixes Advertised: 4
192.0.2.0/24 · 198.51.100.0/24
203.0.113.0/24 · 2001:DB8::/32
Session uptime: 47d

Wall Display Optimized

Designed for large screens and TV-mounted displays. High contrast, large font metrics, and auto-refresh — operators see everything at a glance without touching the keyboard.

Real-Time Data

SNMP metrics, BGP session state, VPN connections, TACACS auth status, and syslog stream all update live. Powered by Prometheus and Loki — no polling delay.

Alarm Prioritization

Critical alerts appear in red, warnings in amber, healthy in green. The NOC operator knows immediately what needs attention — and what can wait.

Management continuity through any failure.

Active/Standby HA with VRRP VIP failover, full data sync — Loki logs, Prometheus metrics, syslog, TACACS audit trails — so the standby node is ready to take over without data gaps.

Virtual IP (VRRP)
10.1.2.251
● ACTIVE
NMS-01-A
10.1.2.253
◎ STANDBY
NMS-02
10.1.2.252
Sync Paths (Active → Standby)
/etc/sudoers.d/ (synced first)
/var/lib/loki/ — log history
/var/lib/prometheus/ — metric TSDB
/var/log/network/ — syslog history
/var/log/tacacs/ — audit trail
setup.done — prevents wizard reset
Preflight Health Check
SSH key present and trusted
Loki running and ready
Prometheus data directory accessible
TACACS log path exists
Standby SSH reachable

VRRP Virtual IP

A single VIP (10.1.2.251) floats between nodes via keepalived VRRP. Devices, SNMP pollers, syslog forwarders, and TACACS clients always point to the VIP — failover is transparent.

Full Data Replication

HA sync replicates Loki log storage, Prometheus metric time-series, and all syslog/TACACS history. The standby node has your full operational history — not just configuration — so failover has zero audit gaps.

Preflight Before Sync

Before every sync run, the portal checks SSH trust, service readiness, and data path accessibility. If anything fails, an amber warning panel surfaces exactly which check failed — sync is blocked until it's clean.

Self-Healing Deploy

System scripts and sudoers entries are reinstalled on every update.sh run — not just at bootstrap. Configuration drift between nodes is eliminated automatically.

One-Command Deploy to Both Nodes

cd ~/nms-portal && git pull && sudo ./update.sh

The heart of
network security —
finally manageable.

TACACS+ (Terminal Access Controller Access-Control System Plus) controls who logs into your routers, switches, and firewalls — what commands they can run, and creates a full audit trail of every action. It is the authentication backbone of every serious enterprise and ISP network.

Why TACACS+ is hard to find working Most engineers know TACACS+ exists. Very few have a working, auditable deployment. Cisco ISE costs $18,000+/yr and requires a dedicated infrastructure team. The open-source tac_plus daemon is powerful but ships as a compiled binary with a cryptic flat-file config — no UI, no reports, no visibility into what's happening. 5NinesNet solves both problems.
🔑 TACACS+ Access Audit — March 2026 Auto-generated · PDF / CSV export
284
Total Auths
279
Successful
5
Failed
98.2%
Success Rate
UserDevicePrivCommandTimeResult
ftRT-EG-01-A15show bgp summary09:41✓ permit
ftASA-EG-0115crypto key generate rsa09:38✓ permit
rmartinezSW-01-A7show interfaces08:52✓ permit
rmartinezSW-01-A7configure terminal08:53✗ deny
unknownASA-EG-01brute-force · auto-banned03:14✗ blocked

Powerful — but built for Cisco's revenue, not your team

  • Starts at $18,000+/year. Per-device licensing adds up fast.
  • Requires dedicated VM infrastructure and a full-time admin to operate properly.
  • Complex policy engine — weeks of training before it's usable.
  • Closed source. You cannot audit what data it collects or where it sends it.
  • Overkill for ISPs and mid-market MSPs who just need solid AAA.
Typical cost: $18,000 – $60,000+/yr

The open-source option — but you're on your own

  • Ships as a compiled binary — no source code available. You cannot verify what it does.
  • Configuration is a cryptic flat file. One syntax error silently breaks authentication.
  • No management UI. Every change requires SSH and a text editor.
  • No audit reports. No dashboards. No visibility into who logged in or what commands ran.
  • Completely unmaintained for most distributions. Community support only.
Typical cost: $0 — but your time costs money

Open-source tac_plus — with a full management layer on top

  • Full source code auditable. You see exactly what's running on your server.
  • Web UI for users, groups, privilege levels, and command authorization rules.
  • Grafana dashboard shows real-time auth activity, success/fail rates, heatmaps by hour.
  • Automated PDF/CSV audit reports — auditor-ready, customer-deliverable.
  • Active Directory / LDAP integration. Break-glass emergency local accounts included.
Cost: $0 per device · Self-hosted · Yours forever
🔑

Authentication (AuthN)

Every login to every Cisco IOS, ASA, NX-OS, or other TACACS-capable device goes through the 5NinesNet TACACS+ server. Username and password validated against local users, Active Directory groups, or both. Failed auth attempts are logged, bannered, and trigger Fail2Ban rate limiting automatically.

PAP · CHAP · MSCHAPV2AD / LDAPLocal fallbackBreak-glass account
⚖️

Authorization (AuthZ)

Granular per-user and per-group command authorization. Privilege level 15 for senior engineers, level 7 for NOC read-only, level 1 for view-only. Specific commands can be permitted or denied per user per device — no more "give everyone enable" because it's easier.

Per-user priv levelsCommand permit/denyPer-device policyGroup inheritance
📋

Accounting (Acct) — Full Audit Trail

Every command entered on every device is logged with timestamp, username, source IP, device, and result. The accounting log is ingested by Loki, queryable in Grafana, and exportable as PDF/CSV. Answers "who ran that command at 2am" in under 10 seconds.

Per-command loggingLoki ingestionFull-text searchTamper-evident
📊

Grafana Dashboards + Automated Reports

Live Grafana dashboard shows authentication activity by hour (7-day heatmap), success/fail rates per user, top devices, and anomaly detection. Automated weekly PDF reports are customer-deliverable — show your client a signed, timestamped access audit without touching the CLI.

7-day heatmapPDF exportCSV exportAuditor-ready

A managed platform, not a DIY download.

5NinesNet is a commercial network management platform built on a fully auditable open-source foundation. What you're buying is the engineering relationship: deployment, tuning, updates, and the engineer who built it on the other end of your support tickets.

PROFESSIONAL
From $2,988
/ year · per appliance

Single-site deployments that need a real vendor relationship — someone to call when it matters, a tested update channel, and commercial terms.

  • ✓ Full platform deployment & tuning
  • ✓ Business-hours support (email + phone)
  • ✓ Tested update channel
  • ✓ HA pair (active + standby)
  • ✓ Quarterly health review
  • ✓ Auditor-ready report templates
Request Quote →
MOST POPULAR
MSP
From $5,988
/ year · per appliance

For service providers billing their own customers. White-label the portal, isolate tenants, and deliver signed audit reports under your brand — not ours.

  • ✓ Everything in Professional
  • Full white-label theming & logo
  • ✓ Multi-tenant customer isolation
  • ✓ Customer-facing branded reports
  • ✓ Priority support (4-hour response)
  • ✓ Unlimited HA nodes per license
  • ✓ MSP partner portal access
Request Quote →
ENTERPRISE
Custom
Let's scope it together

For carriers, regional ISPs, and regulated environments where the NMS is production-critical and standard tiers don't fit.

  • ✓ Everything in MSP
  • ✓ Custom SLA (24×7 available)
  • Direct engineering engagement
  • ✓ Compliance evidence assistance
  • ✓ Custom integrations & APIs
  • ✓ Multi-region active-active
  • ✓ Dedicated onboarding program
Talk to Us →
OPEN-CORE TRUST MODEL

The source is public. That's a feature, not a price.

Every line of the platform is auditable before you buy and after you deploy. This isn't a free alternative to the paid editions — it's your insurance policy against vendor lock-in. If we vanish tomorrow, your team keeps the code and keeps running. Evaluate on GitHub, audit it with your security team, then engage when you want the engineer who built it on the other end of your support tickets.

View Source →
WHAT EVERY PAID ENGAGEMENT INCLUDES
The engineer who built it
Your support tickets go to the person who wrote the code — not a Tier-1 help desk.
Production deployment
We provision, tune for your network, and validate before sign-off. You don't touch bootstrap scripts.
Source escrow, built in
The code is yours to audit, fork, and keep — vendor risk mitigated by design, not contract clause.
Zero telemetry, verified
No outbound phone-home. Prove it yourself with tcpdump. Your data never leaves your network.

Why engineers choose
5NinesNet

Feature 5NinesNet SolarWinds Traditional NMS Cloud NMS
Source Code Auditable✓ Full OSS
TACACS+ Management UI✓ FullBasic only
Git-based Config Backup✓ NativeAdd-onSaaS only
Fail2Ban / UFW Management✓ Built-in
Self-Hosted / On-Premise✓ AlwaysOptionVariesCloud only
White-Label / OEM✓ IncludedEnterprise tier
Zero-Trust Transparency✓ PCAP export
SSH Remote Performance Testing✓ NativeLimited
Linux OS Authorization (sudoers)✓ Per AD Group
Intentional Topology (No Auto-Sprawl)✓ By DesignAuto-onlyAuto-onlyAuto-only
Perf Metrics → Grafana (Native)✓ Built-inAdd-onSaaS only
Starting Price From $2,988/yr $18,000+/yr $5,000+/yr $199+/mo
WHEN TO CHOOSE EACH

5NinesNet isn't the right answer for every network. Here's when you should pick a competitor — and when you shouldn't.

CHOOSE CISCO ISE IF

You're already locked into the Cisco ecosystem with an enterprise agreement, need a Fortune 500 vendor name on procurement paperwork, and budget isn't a constraint.

CHOOSE SOLARWINDS IF

You need mass auto-discovery across a sprawling heterogeneous network, Windows-centric operations, and you're comfortable with the vendor's security track record.

CHOOSE DATADOG IF

You want SaaS simplicity, have no data-residency constraints, and your network data can leave your infrastructure. You're willing to pay usage-based pricing that scales with your network.

CHOOSE 5NinesNet IF

You need auditability, your data has to stay on your infrastructure, you'd rather talk to the engineer who built it than a Tier-1 queue, and you want vendor-lock-in protection written into the architecture itself.

Built for environments where
security is non-negotiable.

Engineered in the United States. Every component open source and auditable. No cloud dependencies, no telemetry, no black boxes — designed for the security posture of regulated industries, critical infrastructure, and government-adjacent environments.

US-Based Engineering

Designed, built, and maintained in the United States by a network engineer with production ISP and enterprise infrastructure experience. No offshore development, no foreign dependencies in the core stack.

U.S. ORIGIN · U.S. STACK

Fully Auditable Open Source

Every component — FastAPI, Prometheus, Grafana, Loki, tac_plus, UFW, Fail2Ban, SSSD — has publicly audited source code. No proprietary daemons, no compiled blobs, no mystery processes on your management server.

OSS · AUDITABLE · NO BLOBS

Zero Telemetry, Zero Phone-Home

The portal never makes outbound connections to 5NinesNet or any third party. No license checks, no usage analytics, no crash reporting. What happens on your network stays on your network — verifiable by packet capture.

NO TELEMETRY · AIR-GAP READY

Air-Gap Deployable

Once bootstrapped, operates with zero internet connectivity. All dependencies install at setup time. Suitable for isolated environments, classified networks, and OT segments requiring strict network separation.

AIR-GAP · OT · ISOLATED

SBOM — Software Bill of Materials

Every release ships with a complete Software Bill of Materials listing every package, version, and license. Security teams can verify exactly what's running before deployment — a requirement in modern federal and enterprise procurement.

SBOM · CVE TRACKABLE · LICENSES
🛡

Defense-in-Depth by Default

Every install ships with UFW deny-all inbound, Fail2Ban intrusion detection, SSH hardening, TACACS+ per-command authorization, AD group-based Linux sudo policy, and TLS-only access. Security is the default posture — not an add-on.

UFW · FAIL2BAN · TACACS+ · TLS

Designed for Regulated Industries

5NinesNet provides what most compliance-focused platforms don't: a fully transparent, on-premise architecture whose security posture is verifiable by any qualified engineer before a single device is managed. Full source code, SBOM, zero telemetry, and air-gap operation — the foundation your security team actually needs.

US-Based Engineering
Production-tested on real ISP and enterprise infrastructure
TARGET VERTICALS
Independent ISPs & Regional Carriers
BGP monitoring, config backup, TACACS+ AAA, and HA failover — the management stack ISPs actually run, without the per-device licensing of enterprise NMS.
MSPs & Network Service Providers
White-label deployment, multi-tenant customer isolation, and customer-deliverable audit reports. Monetize network management without building it from scratch.
State & Local Government
TACACS+ audit trails and AD integration meet most state agency IT requirements out of the box.
Critical Infrastructure & Utilities
Energy, water, and transport operators who need NMS platforms that run fully isolated — no cloud dependencies, no outbound telemetry.
Defense Contractors & DIB
Audit logs, access control, configuration management, and incident response tooling suitable for evidence in security reviews.
About the Builder
Farzam
Barabian-Eng
CCIE #59401 · Network Architect · Founder, 5NinesNet
CERTIFICATION
CCIE #59401
Cisco Certified Internetwork Expert
EXPERIENCE
20+ Years
Enterprise · Operations · Security
PLATFORMS
IOS · ASA · NX-OS
IOS-XR · FortiGate · OPNsense
DISCIPLINES
BGP · MPLS · VPNv4
TACACS+ · AAA · HA

CCIE network architect with 20+ years across enterprise design, operations, and security. Spent that time building, breaking, and rebuilding networks at the layer where vendor marketing meets pf state tables — and got opinionated about what actually matters when something's on fire at 3 AM.

5NinesNet is the home for the work that came out of that — managed network infrastructure that doesn't require a six-figure contract and a year-long deployment to actually use. The portal is part of it: a control plane for OPNsense-based deployments built on the principle that if you can't reproduce it from a clean install in 30 minutes, you don't actually own it.

CCIE #59401 Production ISP BGP Multi-homed Cisco IOS / ASA / NX-OS / IOS-XR FortiGate OPNsense FastAPI / React
GitHub Schedule a call →
Technology Stack
FastAPI
Backend API
React + Vite
Frontend
Prometheus
Metrics
Grafana
Dashboards
Loki + Promtail
Log aggregation
🔑
tac_plus
TACACS+ daemon
Oxidized + Git
Config backup
🛡
UFW + Fail2Ban
Host hardening
nginx + SSL
Reverse proxy
Ubuntu 24.04
Base OS

Network Management That
Never Goes Down.

Watch how 5NinesNet handles TACACS+ AAA, iperf3 performance testing, HA failover, and more — in 30 seconds.

GET FREE DEMO →
Get Started

Ready for 99.999%?

Let's scope your deployment. The engineer who built it will be on the call.

Or try the live demo — launch it here →  ·  Credentials provided on request.