Solved

Monitor Internet Access

Posted on 2006-11-21
3
153 Views
Last Modified: 2010-03-18
I have a client with 100 workstations on a Windows 2003 domain.  All Internet traffic goes through a PIX Firewall.  Between 10-11:30am their T-1 is maxed, after 11:30am the goes back down to normal usage of about 1/4 the T-1.  Is there a simple/easy way to monitor internet traffic and find out what internal IP address is using all the bandwidth?  I have put monitors on the switches in the building, but that shows total bandwidth including inside file transfers from file servers etc.  

0
Comment
Question by:TriYoung
3 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17991258
how much money do you want to spend? you can look at a proxy solution
0
 
LVL 9

Accepted Solution

by:
FixingStuff earned 125 total points
ID: 18000360
You could use a packet/protocol analyzer to discover the high bandwidth users by IP.
Try www.ethereal.com it is free and well liked among net admins.
You will also need to setup the packet analyzer on a port that sees all your PIX traffic, in other words, not just any switch port.  You can place a hub in front of your inside interface of the PIX and connect your ethereal machine to the hub, or the more recommended method of a core switch that has port mirroring and connect your ethereal machine to the mirrored port.
I know this is not a real simple/easy way to monitor, but there is no simple/easy way that I know of. Hope this helps.
FS-
0
 

Author Comment

by:TriYoung
ID: 18031002
Thank you for your help, I am goign to try ethereal.  I set it up and it looks like this will do the trick.  Thanks.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question