Monitor network traffic in the Dashboard tab



Similar documents
Cover. White Paper. (nchronos 4.1)

Monitoring the Switch

Lab VI Capturing and monitoring the network traffic

Network Forensics Network Traffic Analysis

EXPLORER. TFT Filter CONFIGURATION

Cover. User Guide. (Enterprise Edition)

Network Security: Workshop

Packet Sniffer A Comparative Study

How To Set Up Foglight Nms For A Proof Of Concept

Sniffer s Network Packet Analyzer. Basics

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

User Manual. (Enterprise Edition)

Network Probe User Guide

Edge Configuration Series Reporting Overview

Sample Network Analysis Report

inet Enterprise Features Fact Sheet

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Colasoft Capsa Technical White Paper. Maximize Network Value

Question: 3 When using Application Intelligence, Server Time may be defined as.

Troubleshooting TCP/IP Networks with Wireshark

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Colasoft Capsa User Manual. Maximize Network Value

Packet Capture and Expert Troubleshooting with the Viavi Solutions T-BERD /MTS-6000A

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

NMS300 Network Management System

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SonicWALL GMS Custom Reports

Sage ERP Accpac Online

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Using Double-Take Through a Firewall

What communication protocols are used to discover Tesira servers on a network?

Citrix NetScaler Load Balancer Configuration

Lab 1: Packet Sniffing and Wireshark

Wireshark Tutorial INTRODUCTION

NVMS User Manual

Cisco Prime Network Analysis Module Software 5.1 for Nexus 1010

Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers

UC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One

IntraVUE Diagnostics. Device Failure

AlliedWare Plus OS How To Use sflow in a Network

Network Simulation Traffic, Paths and Impairment

Dell SonicWALL report portfolio

A FAULT MANAGEMENT WHITEPAPER

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

VMware vrealize Operations for Horizon Administration

Final for ECE374 05/06/13 Solution!!

GPRS and 3G Services: Connectivity Options

Introduction VOIP in an Network VOIP 3

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Distinct. Network Monitor. User s Guide

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Network Troubleshooting with the LinkView Classic Network Analyzer

Fortinet Network Security NSE4 test questions and answers:

Networks - EtherNet IP Course (Version 5.1)

Software. Quidview 56 CAMS 57. XLog NTAS 58

Cisco IPS Manager Express

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Analyze Traffic with Monitoring Interfaces and Packet Forwarding

Flow Analysis Versus Packet Analysis. What Should You Choose?

Network Management Deployment Guide

Monitoring and analyzing audio, video, and multimedia traffic on the network

Top-Down Network Design

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Network Configuration Settings

Simulation of wireless ad-hoc sensor networks with QualNet

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Network Security. Network Packet Analysis

Network Load Balancing

DDoS Protection Technology White Paper

Per-Flow Queuing Allot's Approach to Bandwidth Management

COMP416 Lab (1) Wireshark I. 23 September 2013

Analysis of a DDoS Attack

Firewall Defaults and Some Basic Rules

Cisco Performance Visibility Manager 1.0.1

The OSI and TCP/IP Models. Lesson 2

Reporting. Understanding Advanced Reporting Features for Managers

High Speed Transfers Using the Aspera Node API! Aspera Live Webinars November 6, 2012!

Basic and most important functions

A Research Study on Packet Sniffing Tool TCPDUMP

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Overview of Network Traffic Analysis

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

20 Command Line Tools to Monitor Linux Performance

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management How to forward logs...

Tcpdump Lab: Wired Network Traffic Sniffing

Network setup and troubleshooting

Wireshark Tutorial. Figure 1: Packet sniffer structure

NetFlow Analytics for Splunk

Transcription:

As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa makes it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network traffic monitor feature, we can quickly identify network bottleneck and detect network abnormities. This article is to discuss how we can monitor network traffic with Capsa's network traffic monitor feature. Monitor network traffic in the Dashboard tab If we want to have a graphical view of the statistics or get a trend chart of the network traffic, then we can use the graphs in the Dashboard tab. It provides a great many of statistic graphs from global network to a specific node. You are able to as well create almost any kind of graph based on any MAC address, IP address and protocol, etc. With these graphs, you can easily find out anomalies of the network and get useful statistics. 1 / 10

Figure 1: monitor network traffic in the Dashboard tab Monitor network traffic in the Summary tab The Summary tab provides general information of the entire network or the selected node in the Node Explorer window. In the Summary tab we can get a quick view of the total traffic, real-time traffic, broadcast traffic, multicast traffic and so on. When we switch among the node 2 / 10

in the Node Explorer window, corresponding traffic information will be provided. 3 / 10

Figure 2: monitor network traffic in the Summary tab Monitor network traffic in the Physical Endpoint and IP Endpoint tabs In these two endpoint tabs (Physical Endpoint and IP Endpoint), we can monitor network traffic information of each physical address node and IP address node, both local and remote. With their easy sorting feature we can easily find out the nodes with abnormal traffic, such as which hosts are generating or have generated the largest traffic. 4 / 10

Figure 3: monitor network traffic by endpoints Monitor network traffic in the Protocol tab The Protocol tab lists all protocols applied in your network transmission. In the Protocol tab we can monitor network traffic by each protocol. By analyzing the protocols in the network traffic, we can easily understand what applications are consuming the network bandwidth, for 5 / 10

example, the HTTP stands for website browsing, and the POP3 stands for email, etc. 6 / 10

Figure 4: monitor network traffic in the Protocol tab Monitor network traffic in the conversation tabs The conversations are shown in four tabs: Physical Conversation, IP Conversation, TCP Conversation and UDP Conversation. We can monitor network traffic by each conversation type and the figure out which conversation has generated the largest network traffic. 7 / 10

Figure 5: monitor network traffic by conversations Monitor network traffic in the Matrix tab The Matrix tab visualizes all network connections and traffic details in one single graph. The weight of the lines between the nodes indicates the traffic volume and the color indicates the status. As we move the cursor on a specific node, network traffic details of the node will be 8 / 10

provided. 9 / 10

Figure 6: monitor network traffic in the Matrix tab As we can see, with Capsa we can not only monitor network traffic in convenience, but also analyze network traffic in deferent levels, thus enables us quickly and efficiently detect network abnormities and troubleshoot network problems. Download Now 10 / 10