Solved

Remote monitoring of utilization

Posted on 2004-04-09
5
174 Views
Last Modified: 2010-04-17


I am looking for a too/method to quickly determine the utilization by user at the remote centers.  All centers have Cisco routers and switches.  
0
Comment
Question by:JaysonJackson
  • 3
  • 2
5 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 10791453
If you want utilization by user, enable netflow on the router using the interface "ip route-cache flow" command:
http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_command_reference_chapter09186a00801a7ee7.html#wp1029889

You don't necessarily have to export the data, you can just use show commands to see the information.

If you want total utilization, not by user, you can use free MRTG http://www.mrtg.org
or get a 30-day eval of SolarWinds http://www.solarwinds.net
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 10791479
If you want to export the flow data, you can use freeware ntop
http://www.ntop.org/ntop.html

Alternatives include distributed Sniffer, something like LanHound http://www.ebf.net/products/lanhound/lanhound.htm
comes with distributed agents at a very reasonable cost


0
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 10807629
Are you still working on this? Do you need more information? More details from any specific product?
0
 

Author Comment

by:JaysonJackson
ID: 10809154
I used the ip route-cache flow but I did not see utilization on the screen.
0
 

Author Comment

by:JaysonJackson
ID: 10859680
Still looking for a utility that can show utilization on a remote system by user.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Thomson router 3 62
VLAN Tag for chained network device. 11 54
VPN protocal 18 64
Comms between vlans via router 2 22
In a WLAN, anything you broadcast over the air can be intercepted.  By default a wireless network is wide open to all until security is configured. Even when security is configured information can still be intercepted! It is very important that you …
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now