Internet Bandwidth utilisation

Posted on 2002-07-21
Last Modified: 2013-11-29
I want to monitor the internet bandiwidth utilisation by individual PC accessing internet thr Proxy.
Also want to monitor Cisco router and bridge.
Need some tool
Question by:m_praveen
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 79

Expert Comment

ID: 7168093

Author Comment

ID: 7230463
monitoring is possible with mrtg on Cisco devices.
But I want to monitor the internet bandwidth utilised by individual PC which are usually behind proxy.
LVL 79

Accepted Solution

lrmoore earned 50 total points
ID: 7230548
I don't know of any tool that can do that. You're proxy should have some monitoring, logging capability, but the problem is that the proxy uses its own IP address as the source address. Everything between your proxy and the internet has the same source IP. You need something on the user side. A sniffer would give you a breakdown of protocols, top talkers, percentage of useage of the LAN by PC:

If you want percentage of utilization of the Internet bandwidth by user, you have to monitor at the egress point which is the serial interface of the router. All the router sees is traffic to/from the proxy.

Expert Comment

ID: 9155511
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
Post your closing recommendations!  No comment means you don't care.
LVL 18

Expert Comment

by:John Gates, CISSP
ID: 9356894
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

PAQ / Award points to Irmoore

Please leave any comments here within the next seven days.


EE Cleanup Volunteer

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor ( Top Charts is a view in which you can set seve…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question