Home Tags What can be deployed to intercept and log network traffic passing through the network?

what can be deployed to intercept and log network traffic passing through the network?