Solved

WiFi Monitoring

Posted on 2014-07-20
8
206 Views
Last Modified: 2014-08-09
I have a client who would like to monitor web activity. The network he wants to monitor is a guest WiFi network, on a completely separate ISP than their corporate network.
The Wifi access point is an ISP provided router, and does not appear to have any logging capabilities.

I am open to both hardware/software suggestions.... the only caveat, it has to be easy.
Having tested several options (WireShark, and several other less well known) none have the capability to provide him a simple read out of activity. Everything appears to require an IT guy to interpret the output, or a secondary program to analyze the data.

Does anyone know a product that will give him a simple read out for web activity?
0
Comment
Question by:PeppeLaPew
8 Comments
 
LVL 13

Expert Comment

by:duncanb7
Comment Utility
What you mean , "read out for web activity" ?
You can save all activity in cap file or save it in csv format
Could you explain it in more detail ? Probably, wireshark is really popular

Dunca
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
I use CommView and (like Wireshark) the simple tools are packet sniffing tools and are not user oriented.

For an easy, user-oriented, GUI reporting tool, you need What's Up by Ipswitch.

http://www.whatsupgold.com/
0
 
LVL 3

Expert Comment

by:nickoarg
Comment Utility
You can also try using a transparent proxy such as Squid that will log the requests. Most users will not know the proxy is there.
0
 

Author Comment

by:PeppeLaPew
Comment Utility
What you mean , "read out for web activity" ?
 You can save all activity in cap file or save it in csv format
 Could you explain it in more detail ? Probably, wireshark is really popular


By read out.... I mean the information as it is displayed to the user. The information displayed by wireshark requires a person with some technical ability to Comprehend/Filter/Analyze.

He needs a program/router/something that will give him a easy to read report.
Something like:
These are the devices detected, these are the web requests from that device, this many times, on these dates.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 90

Accepted Solution

by:
John Hurst earned 500 total points
Comment Utility
Try What's Up.
0
 

Author Comment

by:PeppeLaPew
Comment Utility
Sorry for the delay.... What's up would work, but was too expensive of a solution for my client.
Changed the routers DNS servers to Open DNS
Opened an account on open DNS with his external IP.
Turned on logging.

Now the client can see WiFi traffic (at least DNS requests) and block web sites at a global level.
Unfortunately its not able to tell him which computer generated the request, but it's free.

Thanks all!
0
 

Author Closing Comment

by:PeppeLaPew
Comment Utility
Whats Up would have probably have been a more complete solution than the OpenDNS, so you get the points.
Sometimes those $$ make a client settle for less than a complete solution
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
@PeppeLaPew  - Thanks for the update. I have used Whats Up where the client was willing to entertain the cost, but they got what they wanted.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now