Lawful interception
Traffic analysis
Health map
Traffic decode logs
Connections
Cloning a website
Network audit