Network security tools can be used to audit the network.
By monitoring the network, an administrator can assess what type of information an attacker would be able to gather. For example, by attacking and flooding the CAM table of a switch, an administrator learn which switch ports are vulnerable to MAC flooding and can correct the issue.
Network security tools can also be used as penetration test tools. Penetration testing is a simulated attack and helps to determine how vulnerable the network is when under a real attack.
Weaknesses within the configuration of networking devices can be identified based on penetration test results.
Changes can be made to make the devices more resilient to attacks.
Such tests can damage the network and should be carried out under very controlled conditions.
An offline test bed network that mimics the actual production network is ideal.