?
Solved

Network Choaking Isuue

Posted on 2011-09-28
3
Medium Priority
?
179 Views
Last Modified: 2012-05-12
Hi,
We have a Network choak in our organization very badly but we couldnot trace the cause of the Network Hog...
Ethereal is also helpful during taht period.

Will you provide the steps i should follow whenever such issues arise..

Regards
ramu


0
Comment
Question by:RAMU CH
3 Comments
 
LVL 3

Expert Comment

by:jrgcomputing
ID: 36716466
How big is your network?

If its quite big look at vlans as this will isolate areas and narrow your search down
0
 
LVL 8

Accepted Solution

by:
Dan Muzrall earned 2000 total points
ID: 36716524
First thing you'll want to do is evaluate your existing hardware and software to know exactly what you have for resources.

Second, you'll want to have your network configuration well documented.

* If you are running managed switches, the built-in web interface should offer tools to help you identify  at least the physical port generating the traffic.  Using your network documentation, you can determine where that physical port is, and address that particular machine.  Depending on the switch, you may even be able to disable that port.

*  Consider implementing a solution using MRTG or PRTG for monitoring your equipment as well.  both are powerful tools and allow traffic graphing of SNMP-enabled devices.

* Use network sniffing tools like Wireshark, EtherReal, etc. to monitor traffic.
0
 
LVL 1

Author Closing Comment

by:RAMU CH
ID: 36961042
Thanks
0

Featured Post

Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
In this article, we’ll look at how to deploy ProxySQL.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question