Solved

How to capture all traffice on a network without disruptions.

Posted on 2011-02-15
3
328 Views
Last Modified: 2012-05-11
What is the easiest way to capture all traffic on a network, lets say for 8 hours (9-5)? In the days of hubs this would be easy, just plug your laptop into the hub, but nowadays with switched Ethernet you cannot see all traffic from the switch. I guess then you have to somehow get between the switch and the dsl modem (or T1 access device). How do you do that without disrupting traffic?
0
Comment
Question by:HardwareDude
3 Comments
 
LVL 16

Accepted Solution

by:
Kalpesh Chhatrala earned 500 total points
ID: 34903560
0
 
LVL 4

Expert Comment

by:lcappelli
ID: 34903563
Port Monitoring on a Cisco Switch:

You do not say who makes the switch, on a cisco switch you can have every port's traffic mirrored to  a single port, without disrupting any traffic, just cpu cycles, and put a laptop with wire-shark on the mirror port and sniff every frame, just like a hub used to!

This feature is called Catalyst Switched Port Analyzer (SPAN)

here is more info

http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml

0
 
LVL 5

Expert Comment

by:nomorefuzzylogic
ID: 34905344
or you could connect a hub followed by a switch to one port on your Internet router and then a PC onto the hub. All traffic will then come out of the one port on the Internet router through the hub to the switch which will then split the traffic. Your PC on the hub will be able to see all the traffic.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now