Monitoring bandwidth use and abuse

Posted on 2011-04-19
Last Modified: 2012-05-11
Hi, wanted to ask if there is a simple utility that can show me the list of lan users and their current bandwidth usage?

something like the router lan clients page would be great

bonus points if it has alerts when someone gets over a certain limit

a sub-question is:

Can I block torrent downloading as a protocol, even though my vigor router does not specifically allow protocol filtering? We are in a Windows 2003 Server domain.
Question by:darkbluegr
    LVL 7

    Accepted Solution

    Consider implementing a Linux Distro already set up for IP & Traffic Shaping.

    Enables Traffic Shaping, and P2P filtering, and it's free.

    LVL 4

    Assisted Solution

    Try PRTG Network Monitor

    You can use it to monitor the workstations on your network then get a top 10 report showing the highest bandwidth usage which will help you track down which workstation/user is using the most network bandwidth. You can also setup email alerts/notifications for the bandwidth sensor using PRTG.

    For blocking uTorrent - can you please post the make and model of your router?

    Author Comment

    Thanks for the replies - using a vigor 3300 right now.

    Wondering if its better use of money to invest in a lower-end cisco router or buy a lan monitoring/management software...
    LVL 9

    Assisted Solution

    Consider using packettrap ( The pt360 Tool Suite is free and covers lot of features along with monitoring. It comes with out of the box support for MS Exchange, SQL, and Active Directory. It monitors to help IT Admins and network engineers prevent application failures and identify degradations early.

    LVL 4

    Assisted Solution

    Hi again,
    It’s not easy to configure a firewall to block uTorrent because torrent clients use different ports and let people easily change the ports they're using if you try block them.

    You should configure your firewall to allow only the network traffic that you want and then block everything else - that should stop people being able to use uTorrent. Be careful though - if you change this you it will break any network application that you have not specifically allowed through the firewall. It’s a good way to find out what’s using the network and its best practice to configure firewalls in this way.

    I guess the other problem you have is that people have been installing uTorrent on their PCs on your network?
    You need to make sure that users do not have admin rights on their workstations – this stops them being able to install lots of junk and changing settings etc – making your job harder.

    Have a look at Goverlan – it gives you lots of tools for administering your desktops.
    For example you could use it to generate a report of all the workstations on your network that have uTorrent installed!

    PRTG is really for network monitoring. What is the underlying problem?

    Being able to monitor everything your network? – PRTG
    Monitor network bandwidth usage? – PRTG
    You suspect that uTorrent (or something else) is using all your network bandwidth?
    - Re-configure your firewall to block all unwanted traffic.
    You suspect that people have been installing & using uTorrent and other unwanted applications on your network - Re-configure your firewall and use Goverlan to get a report of applications installed on workstations.

    Just my thoughts anyway, hope that helps...
    LVL 9

    Expert Comment

    If you are looking at monitoring bandwidth and stopping torrent best would be to use transparent proxy like squid.


    Author Closing Comment

    good info thank  you~

    Featured Post

    Enabling OSINT in Activity Based Intelligence

    Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

    Join & Write a Comment

    Some time ago I was asked to set up a web portal PC to put at our entrance. When customers arrive, they could see a webpage 'promoting' our company. So I tried to set up a windows 7 PC as a kiosk PC.......... I will spare you all the annoyances I…
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    732 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now