[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 332
  • Last Modified:

sniffer pro 2.5

Can I use sniffer pro 2.5 to capture the traffic such as from my network to internet ?

for example ,if my corporate ip addresses is in the 202.183.1.0/24 net , then I want to capture anyone from 202.183.1.0/24 suppose to google ,this is because I want to know where the employee is going.

I saw that I can only capture the traffic from only my network, such as from 202.183.1.0/24 net to only 202.183.1.0/24 net.Have any method I can set up ?
0
sirator
Asked:
sirator
1 Solution
 
lrmooreCommented:
Of course you can use the sniffer to capture all traffic. You can also setup filters to only capture one source address to any and any to that one address. I would assume that since you have a full class C subnet that you are a large enough company to have a firewall. Do you use NAT on the firewall? You need to plug the sniffer into the same hub/switch as the inside of the firewall. If it is a switch, you need to create a mirror or monitor port for the sniffer, or put the firewall and the sniffer on a hub and plug the hub into the switch.
0
 
mbrunerCommented:
As usual, lrmoore is right.  

One additional note though.  Be careful when using hubs.  Not all of them flood ALL data to all ports.  Many of them now learn MAC addresses and send unicast data only to the appropriate ports (much like a switch).  I ran across this problem a while back.  I was using a 3Com hub and found I was only recieving broadcast traffic when sniffing.  I spent a long time searching for a cheap, "dumb" hub to use to get the results I needed.  

Anyway, hope it helps.  Good luck!!
0
 
siratorAuthor Commented:
Thanks so much
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now