Solved

Network Packet Analyzer Solar Winds

Posted on 2016-11-20
3
100 Views
Last Modified: 2016-11-27
Hi All,

Has anyone tested the Network Packet Analyzer , with Solar Winds. Could you kindly help with steps , if we need to set up monitoring based on different protocols ?

Thanks,
T
0
Comment
Question by:TiazfaD
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Assisted Solution

by:Tomas Valenta
Tomas Valenta earned 250 total points
ID: 41895531
I am using Wireshark packet analyzer (www.wireshark.org) which is free and well documented. Available in Windows or Linux binaries.
I can help you with configuration.
1
 
LVL 22

Accepted Solution

by:
eeRoot earned 250 total points
ID: 41899179
Packet Analyzer is an add-on tool that works with NPM (Network Performance Monitor).  Once you have NPM up and running, you add the Packet Analyzer to it.  Check out this video and blog from SolarWinds.


http://www.solarwinds.com/resources/videos/deploying-packet-analysis-sensors-in-solarwinds-network-performance-monitor.html


https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2014/07/16/npm-11--packet-analysis-sensor-deployment-considerations
0
 

Author Closing Comment

by:TiazfaD
ID: 41902855
Thank you eeRoot and Tomas for your inputs.  The links were truly helpful!

Regards,
T
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Mapping network drive with 'net use' 1 55
Router assigned IP addresses 18 103
Can't ping New Linux Servers 40 99
SIP / Streaming - real time communications testing 8 124
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question