Platform TACACS+ Network Map Throughput NOC View HA Failover Dashboards About ▶ Live Demo
99.999% uptime management · Built for ISP scale

Network management
that never
goes down.

Full-stack open-source NMS platform. TACACS+, SNMPv3, config backup, performance testing, firewall management, and unified observability — one appliance, zero vendor lock-in.

Self-hosted
Your infrastructure
<5min
Deploy time
Config history
INTERNET Transit Provider RT-EG-01-A Edge Router · ASR1001-X BGP UP SW-01-A Catalyst 3750 · 48-port TACACS ✓ ASA-EG-01 ASA 5512-X · VPN GW 4 VPN 5NinesNet-DC AD · LDAP · DNS VPN Client VPN Client NMS · 10.1.2.251 HA Active · v1.2.0 Gi0/1 Gi0/2
BGP · Established
TACACS+ · 3 devices · Auth active
ASA CPU 24% · 4 VPN sessions

Everything your network
needs in one place

Built from the ground up for real-world network operations — not a checkbox SaaS product.

SNMPv3 Monitoring

Full SNMPv3 AuthPriv support with SHA/AES. Poll CPU, memory, interfaces, errors, and custom OIDs from Cisco IOS, ASA, NX-OS, and more.

SHA · AES · MIB-II
🔑

TACACS+ AAA

Full TACACS+ management UI backed by tac_plus. Per-user privilege levels, command authorization, and per-session audit trails with AD/LDAP integration.

tac_plus · AD · Priv 15

Config Backup + Git

Automated config archival via Oxidized. Every change committed to Git with full diff viewer, rollback capability, and per-device history timeline.

Oxidized · Git · Diff
🛡

UFW Firewall Manager

Visual rule management for the NMS server's UFW firewall. Add, remove, and audit ingress/egress rules without touching the CLI.

UFW · iptables · Policy

Fail2Ban IDS

Real-time intrusion detection dashboard. View active jails, banned IPs, ban/unban actions, and brute-force attempt timelines by source IP and service.

SSH · NGINX · TACACS

Grafana Alerting

Full Grafana Unified Alerting integration. Configure threshold alerts, SMTP/webhook notifications, silence windows, and alert routing — all from the portal UI.

Prometheus · Loki · PD
📡

Syslog Aggregation

Centralized syslog collection from all Cisco devices via rsyslog + Loki. Full-text search, filter by severity, device, facility. All correlated in Grafana.

rsyslog · Loki · Search

White-Label MSP

Deploy the full platform under your own brand. No 5NinesNet references. Complete theming, custom logos, customer-isolated tenants, and security transparency docs.

OEM · Multi-tenant · Custom
🔒

Zero-Trust Transparency

Customer-deployable packet capture and audit export. Prove to your clients exactly what data the NMS touches — a key differentiator over closed-source competitors.

PCAP · SBOM · SOC2-ready
🗺

Interactive Network Map

Drag-and-drop topology canvas with multi-hop chain links, ghost/alias nodes, SNMP interface pickers, and live right-click editing. Your actual network — not a diagram tool.

Multi-hop · Alias · Live SNMP

Throughput & Performance Testing

Built-in iPerf3, ping, traceroute, and DNS test runner. Schedule recurring tests, clone existing ones, and visualize historical bandwidth and latency trends per device.

iPerf3 · Ping · Traceroute
🔁

High-Availability Failover

Active/Standby HA with VRRP VIP, automated rsync of Loki, Prometheus, syslog, and TACACS data. Preflight health checks before every sync. Zero-downtime management continuity.

VRRP · rsync · Preflight
📺

NOC Wall View

Full-screen NOC dashboard optimized for operations center displays. Real-time device health, BGP status, active alarms, and syslog stream — all auto-refreshing, zero interaction required.

Wall Display · Auto-Refresh · Alerts
🌐

Remote Nodes & Distributed Testing

Register remote NMS nodes via SSH key trust — no agents, no extra software. Performance tests run directly from the remote node via SSH so you measure real WAN throughput, not local loopback. UFW rules auto-scope to each enrolled node's IP.

SSH Trust · Zero-Agent · Zero-Trust UFW
🔐

Linux OS Authorization

AD group membership drives not just portal access but Linux OS sudo policy. Each role maps to precise sudoers rules — NOC gets service status and log reads only, admins get service management, super admins get full access. Applied with one click, validated by visudo.

sudoers · AD Groups · Per-Role
📈

Performance Metrics in Grafana

Every test result — latency, TCP throughput, UDP jitter, packet loss — is automatically pushed to Prometheus and available in Grafana. Dynamic dashboards with Source/Target dropdowns let you trend any test pair over time and correlate with SNMP interface errors on the same timeline.

Prometheus · Grafana · Time-Series
🗺

Static Routes Management

Add, remove, and manage persistent static routes on the NMS server directly from the portal. Routes are written to Netplan and survive reboots. Interface auto-detection, metric control, and one-click Apply — no CLI required.

Netplan · Persistent · No CLI

Operational visibility
at every layer

Grafana-powered panels fed by Prometheus, Loki, and SNMP Exporter. Real device data from your actual environment.

⬡ Device CPU Utilization 24 HOUR
RT-EG-01-A
12%
SW-01-A
7%
ASA-EG-01
24%
NMS Server
8%
5NinesNet-DC
19%
◈ Memory Pool Utilization LIVE
40%
RT-EG-01-A
30%
SW-01-A
60%
ASA-EG-01
10%
NMS Server
📡 Syslog Stream LIVE
09:41:02RT-EG-01-A%BGP-5-ADJCHANGE: Transit neighbor Up
09:40:55SW-01-A%LINK-3-UPDOWN: Interface Gi0/24, changed to up
09:38:11ASA-EG-01%ASA-4-106023: Deny tcp src 203.0.113.44/52881 dst 10.1.2.1/22
09:37:49RT-EG-01-A%OSPF-5-ADJCHG: Process 1, Nbr 10.1.1.1 Up
09:35:02ASA-EG-01%ASA-3-710003: TCP access denied by ACL from 45.146.164.100/34811
09:34:18NMS-Server%Fail2Ban: Ban 45.146.164.100 in jail sshd after 5 retries
09:33:41SW-01-A%SYS-5-CONFIG_I: Configured from console by ft on vty0
09:30:00RT-EG-01-A%SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 10.1.2.253 started
09:28:555NN-DC-01TACACS+ auth success: user ft from 10.1.3.14
⚡ Fail2Ban · Active Jails LIVE
3
Active Jails
14
Banned IPs
847
Blocked 24h
JailBannedAttempts 1hStatus
sshd11243● Active
nginx-http-auth218● Active
tacacs-auth14● Active
🔑 TACACS+ Auth Activity 7 DAYS
284Total auths
279Successful
5Failed
98.2%Success rate
Mon Tue Wed Thu Fri Sat Sun
ftpriv 15142 authRT-EG-01-A, SW-01-A, ASA
rmartinezpriv 798 authSW-01-A
achenread-only39 authRT-EG-01-A
unknown5 failASA-EG-01
⬙ Config Backup · Git Log 3/3 SYNCED
a3f9c2d ASA-EG-01: add static route for VPN pool 10.1.3.0/24 2m ago
8e1b447 RT-EG-01-A: update BGP prefix-list ZAYO-OUT 1h ago
c20d891 SW-01-A: configure port-security on Fa0/1-24 4h ago
--- a/ASA-EG-01/running-config 2h ago +++ b/ASA-EG-01/running-config 2m ago - route management 0.0.0.0 0.0.0.0 192.168.3.1 1 + route management 0.0.0.0 0.0.0.0 192.168.3.1 1 + route outside 10.1.3.0 255.255.255.0 10.1.1.5 1 + nat (outside,outside) source static obj-vpnpool obj-vpnpool

Up in five minutes.
Seriously.

01

Clone & Configure

Clone from GitHub. Edit a single config file with your device IPs, SNMP credentials, and SMTP settings.

git clone …
02

Run Bootstrap

One script installs all dependencies — FastAPI, Prometheus, Grafana, Loki, tac_plus, Oxidized, nginx, Fail2Ban, UFW.

./bootstrap.sh
03

Onboard Devices

Add routers, switches, and firewalls via the portal UI. Apply & Restart auto-generates snmp.yml and prometheus.yml.

Portal → Devices
04

Monitor & Audit

Full visibility from day one. Dashboards, alerts, TACACS audit logs, config diffs, and syslog — all live.

Dashboard → Live

Reports that write
themselves.

Scheduled PDF and CSV exports for network health, security posture, and compliance. Customer-ready on demand.

Network Health
Weekly Infrastructure Summary
Week of Mar 1–7, 2026
99.97%
Avg Uptime
12%
Peak CPU
3
Alerts Fired
9
Config Changes
Compliance
TACACS+ Access Audit
March 2026 · SOC2-ready
284
Auth Attempts
279
Successful
5
Failed
98.2%
Auth Rate
Security Posture
Monthly Threat Summary
March 2026 · Customer-facing
1,247
SSH Attempts
89
IPs Banned
0
Critical CVEs
100%
UFW Enforced

Intentional topology — not auto-discovery spaghetti.

Most NMS tools show you everything your network contains. 5NinesNet shows you everything your team needs to see. Curated multi-canvas views, drag-and-drop layout, ghost/alias nodes, and multi-hop chain links — your topology as a living document of network intent, not a scan result.

Gi0/1 → Gi0/24 → Gi0/1 RT-EG-01-A 10.1.2.1 ASA-EG-01 10.1.2.12 SW-01-A 10.1.2.11 SW-01-A alias 5NinesNet-DC 10.1.2.254 ⬡ Edit Link ⧉ Create Alias ✕ Delete Device

Multi-Hop Chain Links

Links store a full hops[] path — Source → via SW1 Gi0/24 → via ASA → Target. Each hop has SNMP interface pickers for in/out interfaces. Labels render on-canvas offset from the line.

Ghost / Alias Nodes

Right-click any device → Create Alias. The alias shares the same IP and SNMP data as the original, appears with a dashed border and numbered badge (② ③), and can connect to different parts of the topology. Deleting an alias never affects the original.

Live Right-Click Editing

Right-click any link to open the full hop-builder pre-filled with existing hops and interface assignments. Changes are saved via PATCH — no page reload, no data loss.

Color Ring Visual Grouping

All instances of the same physical device — original and all aliases — automatically share a unique color ring derived from the device ID. No configuration required.

Multi-Canvas Views

Separate canvases for WAN, per-site, management, and core topology. Each view is purposeful — your NOC team sees what matters for their scope. No spaghetti, no unused interfaces, no decommissioned devices cluttering the map.

Intentional vs Auto-Discovery

Auto-discovery tools map everything — unmanaged printers, loopbacks, VLAN interfaces, stale hosts. The map becomes unreadable in days. 5NinesNet puts you in control: you decide what goes on the canvas, and the result stays clean forever.

Know your network's real capacity.

Built-in iPerf3 TCP/UDP, ping, traceroute, and DNS tests. Run from the local NMS or SSH into any remote node to measure real WAN throughput from the network edge — not from the server room. Results feed directly into Grafana for time-series trending.

⚡ Performance Tests LIVE
NameTargetTypeLast Result
RT Edge Throughput 10.1.2.1 iPerf3 941 Mbps
ASA VPN Latency 10.1.2.12 Ping 2.1 ms
Copy of RT Edge Throughput 10.1.2.11 iPerf3 487 Mbps
BGP Path Trace 203.0.113.1 Traceroute 9 hops OK
RT-EG-01-A · iPerf3 Result LATEST
Download
941 Mbps
Upload
910 Mbps
Jitter
0.4 ms
Packet Loss
0.0%

iPerf3 Throughput Testing

Measure real TCP/UDP throughput between NMS and any network device or server. See download, upload, jitter, and packet loss per test run — with trend history.

Ping & Latency Monitoring

Continuous RTT tracking with min/avg/max and packet loss. Alerts fire when latency spikes above threshold. All data stored in Prometheus for Grafana trend visualization.

Traceroute Path Analysis

On-demand traceroute with hop-by-hop RTT and ICMP response analysis. Identify path changes, asymmetric routing, and transit provider issues before customers do.

Clone Test in One Click

Hit the ⧉ clone icon on any test row to instantly copy all settings — target, type, schedule, thresholds — prefilled with a "Copy of" prefix so you can modify and save without rebuilding from scratch.

Scheduled & On-Demand

Tests run on configurable intervals (every 5 min to every 24h) or triggered manually. Historical results surface in the dashboard so you can see when throughput degraded — even after the fact.

Test from the network edge, not the server room.

Register any remote NMS node in seconds. SSH key trust is installed automatically — no agents, no VPN tunnels, no manual copy-paste. Once enrolled, performance tests originate from that node's network vantage point, giving you real end-to-end measurements across your WAN.

🌐 Remote NMS Nodes LIVE
NodeIPSSHPorts
NYC-NMS-01 10.2.0.10 ● Trusted ✓ 5201 · 9090 · 3100
LAX-NMS-01 10.5.0.10 ● Trusted ✓ 5201 · 9090 · 3100
LHR-NMS-01 10.8.0.10 ⚠ Not verified Install Trust →
🔒 Zero-Trust UFW Rules AUTO
5201 ALLOW IN 10.2.0.10 # nms-remote-node:nyc
9090 ALLOW IN 10.2.0.10 # nms-remote-node:nyc
3100 ALLOW IN 10.2.0.10 # nms-remote-node:nyc
# No ALLOW Anywhere — scoped per node only

One-Click SSH Trust Install

Enter the remote node's SSH username and password. The portal automatically installs the SSH public key via sshpass, verifies passwordless access, and confirms all required ports are reachable — no manual copy-paste, no terminal required.

Zero-Trust Firewall Scoping

When a node is enrolled, UFW rules are automatically added scoped to that node's IP only — ports 5201, 9090, and 3100. Broad ALLOW Anywhere rules are removed. When a node is deleted, its rules are removed. The firewall always reflects exactly what's enrolled.

Port Verification from Remote

After trust is installed, the portal SSHes into the remote node and tests each required port back to the collector using netcat. You see green/red per port — not just "it worked" but proof that the network path is actually open end-to-end.

Auto-Creates Performance Endpoint

Adding a remote node automatically creates a Performance endpoint — no double-entry. Tests set to use that node as source will SSH in and run iperf3 from the remote site. Delete the node and the endpoint is cleaned up automatically.

Built for the operations floor.

Full-screen NOC dashboard optimized for wall displays and operations centers. Real-time device health, BGP status, active alarms, and syslog stream — auto-refreshing with zero operator interaction required.

March 13, 2026 · 14:37:09 UTC
● 3 UP ● 1 WARN BGP OK VPN 4 SESSIONS
RT-EG-01-A
10.1.2.1 · ASR1001-X
CPU12%
Memory40%
BGP● ESTAB
Interfaces4/4 UP
Uptime: 47d 12h 04m
SW-01-A
10.1.2.11 · Cat3750
CPU7%
Memory30%
TACACS● AUTH OK
Ports22/48 UP
Uptime: 12d 08h 41m
ASA-EG-01
10.1.2.12 · ASA 5512-X
CPU24%
Memory60%
VPN4 SESSIONS
ACL Hits847/hr
Uptime: 22d 19h 55m
NMS-01-A
10.1.2.253 · Active HA
CPU8%
Memory10%
HA Sync● IN SYNC
TACACS● RUNNING
Version: v1.2.0
📡 Syslog Stream
14:37:02RT-EG-01-A%BGP-5-ADJCHANGE: Transit neighbor Up
14:36:45SW-01-A%LINK-3-UPDOWN: Gi0/24 changed to up
14:35:11ASA-EG-01%ASA-4-106023: Deny tcp src 203.0.113.44/52881
14:34:18NMS-01-AFail2Ban: Ban 45.146.164.100 in jail sshd
14:33:02SW-01-A%SYS-5-CONFIG_I: Configured by ft on vty0
🌐 BGP Peers
203.0.113.1
Transit Provider
● ESTAB
Prefixes Advertised: 4
192.0.2.0/24 · 198.51.100.0/24
203.0.113.0/24 · 2001:DB8::/32
Session uptime: 47d

Wall Display Optimized

Designed for large screens and TV-mounted displays. High contrast, large font metrics, and auto-refresh — operators see everything at a glance without touching the keyboard.

Real-Time Data

SNMP metrics, BGP session state, VPN connections, TACACS auth status, and syslog stream all update live. Powered by Prometheus and Loki — no polling delay.

Alarm Prioritization

Critical alerts appear in red, warnings in amber, healthy in green. The NOC operator knows immediately what needs attention — and what can wait.

Management continuity through any failure.

Active/Standby HA with VRRP VIP failover, full data sync — Loki logs, Prometheus metrics, syslog, TACACS audit trails — so the standby node is ready to take over without data gaps.

Virtual IP (VRRP)
10.1.2.251
● ACTIVE
NMS-01-A
10.1.2.253
◎ STANDBY
NMS-02
10.1.2.252
Sync Paths (Active → Standby)
/etc/sudoers.d/ (synced first)
/var/lib/loki/ — log history
/var/lib/prometheus/ — metric TSDB
/var/log/network/ — syslog history
/var/log/tacacs/ — audit trail
setup.done — prevents wizard reset
Preflight Health Check
SSH key present and trusted
Loki running and ready
Prometheus data directory accessible
TACACS log path exists
Standby SSH reachable

VRRP Virtual IP

A single VIP (10.1.2.251) floats between nodes via keepalived VRRP. Devices, SNMP pollers, syslog forwarders, and TACACS clients always point to the VIP — failover is transparent.

Full Data Replication

HA sync replicates Loki log storage, Prometheus metric time-series, and all syslog/TACACS history. The standby node has your full operational history — not just configuration — so failover has zero audit gaps.

Preflight Before Sync

Before every sync run, the portal checks SSH trust, service readiness, and data path accessibility. If anything fails, an amber warning panel surfaces exactly which check failed — sync is blocked until it's clean.

Self-Healing Deploy

System scripts and sudoers entries are reinstalled on every update.sh run — not just at bootstrap. Configuration drift between nodes is eliminated automatically.

One-Command Deploy to Both Nodes

cd ~/nms-portal && git pull && sudo ./update.sh

The heart of
network security —
finally manageable.

TACACS+ (Terminal Access Controller Access-Control System Plus) controls who logs into your routers, switches, and firewalls — what commands they can run, and creates a full audit trail of every action. It is the authentication backbone of every serious enterprise and ISP network.

Why TACACS+ is hard to find working Most engineers know TACACS+ exists. Very few have a working, auditable deployment. Cisco ISE costs $18,000+/yr and requires a dedicated infrastructure team. The open-source tac_plus daemon is powerful but ships as a compiled binary with a cryptic flat-file config — no UI, no reports, no visibility into what's happening. 5NinesNet solves both problems.
🔑 TACACS+ Access Audit — March 2026 Auto-generated · PDF / CSV export
284
Total Auths
279
Successful
5
Failed
98.2%
Success Rate
UserDevicePrivCommandTimeResult
ftRT-EG-01-A15show bgp summary09:41✓ permit
ftASA-EG-0115crypto key generate rsa09:38✓ permit
rmartinezSW-01-A7show interfaces08:52✓ permit
rmartinezSW-01-A7configure terminal08:53✗ deny
unknownASA-EG-0103:14✗ auth fail

Powerful — but built for Cisco's revenue, not your team

  • Starts at $18,000+/year. Per-device licensing adds up fast.
  • Requires dedicated VM infrastructure and a full-time admin to operate properly.
  • Complex policy engine — weeks of training before it's usable.
  • Closed source. You cannot audit what data it collects or where it sends it.
  • Overkill for ISPs and mid-market MSPs who just need solid AAA.
Typical cost: $18,000 – $60,000+/yr

The open-source option — but you're on your own

  • Ships as a compiled binary — no source code available. You cannot verify what it does.
  • Configuration is a cryptic flat file. One syntax error silently breaks authentication.
  • No management UI. Every change requires SSH and a text editor.
  • No audit reports. No dashboards. No visibility into who logged in or what commands ran.
  • Completely unmaintained for most distributions. Community support only.
Typical cost: $0 — but your time costs money

Open-source tac_plus — with a full management layer on top

  • Full source code auditable. You see exactly what's running on your server.
  • Web UI for users, groups, privilege levels, and command authorization rules.
  • Grafana dashboard shows real-time auth activity, success/fail rates, heatmaps by hour.
  • Automated PDF/CSV audit reports — SOC2-ready, customer-deliverable.
  • Active Directory / LDAP integration. Break-glass emergency local accounts included.
Cost: $0 per device · Self-hosted · Yours forever
🔑

Authentication (AuthN)

Every login to every Cisco IOS, ASA, NX-OS, or other TACACS-capable device goes through the 5NinesNet TACACS+ server. Username and password validated against local users, Active Directory groups, or both. Failed auth attempts are logged, bannered, and trigger Fail2Ban rate limiting automatically.

PAP · CHAP · MSCHAPV2AD / LDAPLocal fallbackBreak-glass account
⚖️

Authorization (AuthZ)

Granular per-user and per-group command authorization. Privilege level 15 for senior engineers, level 7 for NOC read-only, level 1 for view-only. Specific commands can be permitted or denied per user per device — no more "give everyone enable" because it's easier.

Per-user priv levelsCommand permit/denyPer-device policyGroup inheritance
📋

Accounting (Acct) — Full Audit Trail

Every command entered on every device is logged with timestamp, username, source IP, device, and result. The accounting log is ingested by Loki, queryable in Grafana, and exportable as PDF/CSV. Answers "who ran that command at 2am" in under 10 seconds.

Per-command loggingLoki ingestionFull-text searchTamper-evident
📊

Grafana Dashboards + Automated Reports

Live Grafana dashboard shows authentication activity by hour (7-day heatmap), success/fail rates per user, top devices, and anomaly detection. Automated weekly PDF reports are customer-deliverable — show your client a signed, timestamped access audit without touching the CLI.

7-day heatmapPDF exportCSV exportSOC2-ready

Why engineers choose
5NinesNet

Feature 5NinesNet SolarWinds Traditional NMS Cloud NMS
Source Code Auditable✓ Full OSS
TACACS+ Management UI✓ FullBasic only
Git-based Config Backup✓ NativeAdd-onSaaS only
Fail2Ban / UFW Management✓ Built-in
Self-Hosted / On-Premise✓ AlwaysOptionVariesCloud only
White-Label / OEM✓ IncludedEnterprise tier
Zero-Trust Transparency✓ PCAP export
SSH Remote Performance Testing✓ NativeLimited
Linux OS Authorization (sudoers)✓ Per AD Group
Intentional Topology (No Auto-Sprawl)✓ By DesignAuto-onlyAuto-onlyAuto-only
Perf Metrics → Grafana (Native)✓ Built-inAdd-onSaaS only
Starting Price $0 / mo $18,000+/yr $5,000+/yr $199+/mo

Built for environments where
security is non-negotiable.

Engineered in the United States. Every component open source and auditable. No cloud dependencies, no telemetry, no black boxes — designed for the security posture of regulated industries, critical infrastructure, and government-adjacent environments.

🇺🇸

Engineered in the United States

Designed, built, and maintained in the United States by a network engineer with production ISP and enterprise infrastructure experience. No offshore development, no foreign dependencies in the core stack.

U.S. ORIGIN · U.S. STACK

Fully Auditable Open Source

Every component — FastAPI, Prometheus, Grafana, Loki, tac_plus, UFW, Fail2Ban, SSSD — has publicly audited source code. No proprietary daemons, no compiled blobs, no mystery processes on your management server.

OSS · AUDITABLE · NO BLOBS

Zero Telemetry, Zero Phone-Home

The portal never makes outbound connections to 5NinesNet or any third party. No license checks, no usage analytics, no crash reporting. What happens on your network stays on your network — verifiable by packet capture.

NO TELEMETRY · AIR-GAP READY

Air-Gap Deployable

Once bootstrapped, operates with zero internet connectivity. All dependencies install at setup time. Suitable for isolated environments, classified networks, and OT segments requiring strict network separation.

AIR-GAP · OT · ISOLATED

SBOM — Software Bill of Materials

Every release ships with a complete Software Bill of Materials listing every package, version, and license. Security teams can verify exactly what's running before deployment — a requirement in modern federal and enterprise procurement.

SBOM · CVE TRACKABLE · LICENSES
🛡

Defense-in-Depth by Default

Every install ships with UFW deny-all inbound, Fail2Ban intrusion detection, SSH hardening, TACACS+ per-command authorization, AD group-based Linux sudo policy, and TLS-only access. Security is the default posture — not an add-on.

UFW · FAIL2BAN · TACACS+ · TLS

Designed for Regulated Industries

5NinesNet is not pursuing FedRAMP certification today — that process takes years and significant investment. What we provide is something more immediately useful: a fully transparent, on-premise platform whose security posture is verifiable by any qualified engineer before a single device is managed.

🇺🇸
Engineered in the United States
Production-tested on real ISP and enterprise infrastructure
TARGET VERTICALS
State & Local Government
TACACS+ audit trails and AD integration meet most state agency IT requirements out of the box.
Defense Contractors & DIB
CMMC-adjacent posture: audit logs, access control, configuration management, and incident response tooling.
Critical Infrastructure & Utilities
ISPs, energy, water, and transport operators who need NMS platforms that run fully isolated.
Healthcare & Finance
On-premise deployment ensures PHI and PCI data never leaves your environment.
Built by an engineer
Farzam
Barabian-Eng
Network Engineer · ISP & Enterprise Infrastructure · Founder, 5NinesNet

5NinesNet started as an internal toolset for managing a production ISP infrastructure — BGP peering, MPLS VPNv4, ASA firewalls, Catalyst switching, and TACACS+ AAA at scale. After years of duct-taping open-source tools together, I built a unified platform that actually fits how network engineers work.

Everything is open source because transparency isn't a feature — it's the foundation. Your team should be able to audit exactly what's running on your network management server. That's why 5NinesNet is built on tools with readable source code, not black boxes.

Network Engineering ISP Infrastructure Cisco IOS / ASA / NX-OS BGP / MPLS / VPNv4 FastAPI / React
Technology Stack
FastAPI
Backend API
React + Vite
Frontend
Prometheus
Metrics
Grafana
Dashboards
Loki + Promtail
Log aggregation
🔑
tac_plus
TACACS+ daemon
Oxidized + Git
Config backup
🛡
UFW + Fail2Ban
Host hardening
nginx + SSL
Reverse proxy
Ubuntu 24.04
Base OS
Get Started

Ready for 99.999%?

Built by network engineers. Deployed at ISP scale. Open source forever.

Or try the live demo — launch it here →  ·  admin / demo123