Solved

Packet tracing

Posted on 2011-03-14
2
342 Views
Last Modified: 2012-06-27
I'm not sure if that is the correct Title "Packet Tracing" but this is what I would like to implement:

I need to make sure that our data flow, specifically our email flow, is following a certain path, or I should say to find out what path it comes in and out of our network. For example, when email enters our network we want to make sure that it flows seamlessly in a correct manner as well as when it leaves our network, not looping around, getting stuck somewhere, etc..
We have intermittent email problems every now and then(duplicate emails) and our network can be a little in depth so I want to know if there is a way I can follow email traffic and see the actual path it takes from the client to the gateway and vice versa. Even if email is flowing fine and that isnt the problem I would still like to know the flow of our traffic. I would like to see some sort of report I can look at to see all the different devices it stops at etc..
Thanks!
0
Comment
Question by:tolinrome
2 Comments
 
LVL 14

Accepted Solution

by:
JAN PAKULA earned 500 total points
ID: 35133285
use this http://www.wireshark.org/download.html to monitor packets

Jan MA CCNA
0
 
LVL 2

Expert Comment

by:tpl415
ID: 35133729
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question