Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Packet tracing

Posted on 2011-03-14
2
Medium Priority
?
349 Views
Last Modified: 2012-06-27
I'm not sure if that is the correct Title "Packet Tracing" but this is what I would like to implement:

I need to make sure that our data flow, specifically our email flow, is following a certain path, or I should say to find out what path it comes in and out of our network. For example, when email enters our network we want to make sure that it flows seamlessly in a correct manner as well as when it leaves our network, not looping around, getting stuck somewhere, etc..
We have intermittent email problems every now and then(duplicate emails) and our network can be a little in depth so I want to know if there is a way I can follow email traffic and see the actual path it takes from the client to the gateway and vice versa. Even if email is flowing fine and that isnt the problem I would still like to know the flow of our traffic. I would like to see some sort of report I can look at to see all the different devices it stops at etc..
Thanks!
0
Comment
Question by:tolinrome
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 14

Accepted Solution

by:
JAN PAKULA earned 2000 total points
ID: 35133285
use this http://www.wireshark.org/download.html to monitor packets

Jan MA CCNA
0
 
LVL 2

Expert Comment

by:tpl415
ID: 35133729
0

Featured Post

Plesk WordPress Toolkit

Plesk's WordPress Toolkit allows server administrators, resellers and customers to manage their WordPress instances, enabling a variety of development workflows for WordPress admins of all skill levels, from beginners to pros.

See why 2/3 of Plesk servers use it.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This program is used to assist in finding and resolving common problems with wireless connections.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question