Solved

Identify bandwidth hog on network.  Billion BiPAC router.

Posted on 2015-02-09
4
139 Views
Last Modified: 2015-03-05
I have a customer with a small network which connects to the Internet via a Billion BiPAC 7800DXL router and a metered connection - they pay per Gigabyte.

Internet data usage is rather high, and I'd like to identify the IP addresses of the device(s) that are responsible for the bulk of the Internet traffic, so that I can then investigate further on those particular devices.

The Billion router has a bandwidth graphing feature in its Web interface, so it's possible to see overall upload/download statistics in real-time.  However, what I really want is a breakdown by IP address over a longer time period - say a day or two.  Cisco routers apparently have a feature called NetFlow which can be used for this.  Is there anything comparable on the 7800DXL?  Could some kind of logging software be used on a PC, which would extract information over a couple of days from the router via SNMP?  Something like that?

I know I could insert a PC with a couple of bridged network cards and a copy of Wireshark or similar to achieve this, and I could do that if I had to, but I haven't got the hardware to hand, unfortunately.  If there were some way to extract this kind of info from the router, it'd be preferable!

Any ideas, please?
0
Comment
Question by:wakatashi
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:Bryant Schaper
Comment Utility
does not look like it, that router is basically a soho DSL modem/wireless router bundle.

You would have to look down stream, what kind of switch is after it?
0
 
LVL 1

Author Comment

by:wakatashi
Comment Utility
Actually I don't know, but I'd be surprised if it were anything other than a dumb/unmanaged switch.
0
 
LVL 11

Accepted Solution

by:
Bryant Schaper earned 500 total points
Comment Utility
machine with two nics is probably easiest option.
0
 
LVL 1

Author Comment

by:wakatashi
Comment Utility
Any other creative solutions, anyone?  As I said, I don't have the hardware to hand to set up a machine with two NICs.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now